Quantum Cloning Machines and the Applications
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Theory and Application of Fermi Pseudo-Potential in One Dimension
Theory and application of Fermi pseudo-potential in one dimension The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Wu, Tai Tsun, and Ming Lun Yu. 2002. “Theory and Application of Fermi Pseudo-Potential in One Dimension.” Journal of Mathematical Physics 43 (12): 5949–76. https:// doi.org/10.1063/1.1519940. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:41555821 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA CERN-TH/2002-097 Theory and application of Fermi pseudo-potential in one dimension Tai Tsun Wu Gordon McKay Laboratory, Harvard University, Cambridge, Massachusetts, U.S.A., and Theoretical Physics Division, CERN, Geneva, Switzerland and Ming Lun Yu 41019 Pajaro Drive, Fremont, California, U.S.A.∗ Abstract The theory of interaction at one point is developed for the one-dimensional Schr¨odinger equation. In analog with the three-dimensional case, the resulting interaction is referred to as the Fermi pseudo-potential. The dominant feature of this one-dimensional problem comes from the fact that the real line becomes disconnected when one point is removed. The general interaction at one point is found to be the sum of three terms, the well-known delta-function potential arXiv:math-ph/0208030v1 21 Aug 2002 and two Fermi pseudo-potentials, one odd under space reflection and the other even. -
Arxiv:1707.06910V2 [Physics.Hist-Ph] 22 Feb 2018 Xlntoscnenn H Eei Ftebte-Nw Pa Better-Known the of Genesis D the Park’S Concerning Analyze Explanations I States
Twelve years before the quantum no-cloning theorem Juan Ortigoso∗ Instituto de Estructura de la Materia, CSIC, Serrano 121, 28006 Madrid, Spain (Dated: January 22, 2018) Abstract The celebrated quantum no-cloning theorem establishes the impossibility of making a perfect copy of an unknown quantum state. The discovery of this important theorem for the field of quantum information is currently dated 1982. I show here that an article published in 1970 [J. L. Park, Foundations of Physics, 1, 23-33 (1970)] contained an explicit mathematical proof of the impossibility of cloning quantum states. I analyze Park’s demonstration in the light of published explanations concerning the genesis of the better-known papers on no-cloning. arXiv:1707.06910v2 [physics.hist-ph] 22 Feb 2018 1 I. INTRODUCTION The no-cloning theorem of quantum mechanics establishes that an arbitrary unknown quantum state cannot be copied.1 A modern proof,2 based on the linearity of quantum mechanics, takes two lines. Suppose that a device can implement a transformation T for copying two orthogonal states ψ and φ of a qubit: T ψ 0 = ψ ψ and T φ 0 = φ φ , | i | i | i| i | i| i | i| i | i| i where 0 is the ready state of the target system. It follows, from linearity, that | i T (a ψ + b φ ) 0 = aT ψ 0 + bT φ 0 = a ψ ψ + b φ φ . (1) | i | i | i | i| i | i| i | i| i | i| i But if the transformation T can clone arbitrary states, it should give, for any a, b values T (a ψ +b φ ) 0 =(a ψ +b φ )(a ψ +b φ )= a2 ψ ψ +b2 φ φ +ab ψ φ +ab φ ψ , (2) | i | i | i | i | i | i | i | i| i | i| i | i| i | i| i which is different from Eq. -
Quantum Cryptography: from Theory to Practice
Quantum cryptography: from theory to practice by Xiongfeng Ma A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto Copyright °c 2008 by Xiongfeng Ma Abstract Quantum cryptography: from theory to practice Xiongfeng Ma Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto 2008 Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptog- raphy was proven in the last decade. Many security analyses are based on the assumption that QKD system components are idealized. In practice, inevitable device imperfections may compromise security unless these imperfections are well investigated. A highly attenuated laser pulse which gives a weak coherent state is widely used in QKD experiments. A weak coherent state has multi-photon components, which opens up a security loophole to the sophisticated eavesdropper. With a small adjustment of the hardware, we will prove that the decoy state method can close this loophole and substantially improve the QKD performance. We also propose a few practical decoy state protocols, study statistical fluctuations and perform experimental demonstrations. Moreover, we will apply the methods from entanglement distillation protocols based on two-way classical communication to improve the decoy state QKD performance. Fur- thermore, we study the decoy state methods for other single photon sources, such as triggering parametric down-conversion (PDC) source. Note that our work, decoy state protocol, has attracted a lot of scienti¯c and media interest. The decoy state QKD becomes a standard technique for prepare-and-measure QKD schemes. -
Quantum Computing a New Paradigm in Science and Technology
Quantum computing a new paradigm in science and technology Part Ib: Quantum computing. General documentary. A stroll in an incompletely explored and known world.1 Dumitru Dragoş Cioclov 3. Quantum Computer and its Architecture It is fair to assert that the exact mechanism of quantum entanglement is, nowadays explained on the base of elusive A quantum computer is a machine conceived to use quantum conjectures, already evoked in the previous sections, but mechanics effects to perform computation and simulation this state-of- art it has not impeded to illuminate ideas and of behavior of matter, in the context of natural or man-made imaginative experiments in quantum information theory. On this interactions. The drive of the quantum computers are the line, is worth to mention the teleportation concept/effect, deeply implemented quantum algorithms. Although large scale general- purpose quantum computers do not exist in a sense of classical involved in modern cryptography, prone to transmit quantum digital electronic computers, the theory of quantum computers information, accurately, in principle, over very large distances. and associated algorithms has been studied intensely in the last Summarizing, quantum effects, like interference and three decades. entanglement, obviously involve three states, assessable by The basic logic unit in contemporary computers is a bit. It is zero, one and both indices, similarly like a numerical base the fundamental unit of information, quantified, digitally, by the two (see, e.g. West Jacob (2003). These features, at quantum, numbers 0 or 1. In this format bits are implemented in computers level prompted the basic idea underlying the hole quantum (hardware), by a physic effect generated by a macroscopic computation paradigm. -
A Paradox Regarding Monogamy of Entanglement
A paradox regarding monogamy of entanglement Anna Karlsson1;2 1Institute for Advanced Study, School of Natural Sciences 1 Einstein Drive, Princeton, NJ 08540, USA 2Division of Theoretical Physics, Department of Physics, Chalmers University of Technology, 412 96 Gothenburg, Sweden Abstract In density matrix theory, entanglement is monogamous. However, we show that qubits can be arbitrarily entangled in a different, recently constructed model of qubit entanglement [1]. We illustrate the differences between these two models, analyse how the density matrix property of monogamy of entanglement originates in assumptions of classical correlations in the construc- tion of that model, and explain the counterexample to monogamy in the alternative model. We conclude that monogamy of entanglement is a theoretical assumption, not necessarily a phys- ical property, and discuss how contemporary theory relies on that assumption. The properties of entanglement entropy are very different in the two models — a priori, the entropy in the alternative model is classical. arXiv:1911.09226v2 [hep-th] 7 Feb 2020 Contents 1 Introduction 1 1.1 Indications of a presence of general entanglement . .2 1.2 Non-signalling and detection of general entanglement . .3 1.3 Summary and overview . .4 2 Analysis of the partial trace 5 3 A counterexample to monogamy of entanglement 5 4 Implications for entangled systems 7 A More details on the different correlation models 9 B Entropy in the orthogonal information model 11 C Correlations vs entanglement: a tolerance for deviations 14 1 Introduction The topic of this article is how to accurately model quantum correlations. In quantum theory, quan- tum systems are currently modelled by density matrices (ρ) and entanglement is recognized to be monogamous [2]. -
A Theoretical Study of Quantum Memories in Ensemble-Based Media
A theoretical study of quantum memories in ensemble-based media Karl Bruno Surmacz St. Hugh's College, Oxford A thesis submitted to the Mathematical and Physical Sciences Division for the degree of Doctor of Philosophy in the University of Oxford Michaelmas Term, 2007 Atomic and Laser Physics, University of Oxford i A theoretical study of quantum memories in ensemble-based media Karl Bruno Surmacz, St. Hugh's College, Oxford Michaelmas Term 2007 Abstract The transfer of information from flying qubits to stationary qubits is a fundamental component of many quantum information processing and quantum communication schemes. The use of photons, which provide a fast and robust platform for encoding qubits, in such schemes relies on a quantum memory in which to store the photons, and retrieve them on-demand. Such a memory can consist of either a single absorber, or an ensemble of absorbers, with a ¤-type level structure, as well as other control ¯elds that a®ect the transfer of the quantum signal ¯eld to a material storage state. Ensembles have the advantage that the coupling of the signal ¯eld to the medium scales with the square root of the number of absorbers. In this thesis we theoretically study the use of ensembles of absorbers for a quantum memory. We characterize a general quantum memory in terms of its interaction with the signal and control ¯elds, and propose a ¯gure of merit that measures how well such a memory preserves entanglement. We derive an analytical expression for the entanglement ¯delity in terms of fluctuations in the stochastic Hamiltonian parameters, and show how this ¯gure could be measured experimentally. -
Do Black Holes Create Polyamory?
Do black holes create polyamory? Andrzej Grudka1;4, Michael J. W. Hall2, Michał Horodecki3;4, Ryszard Horodecki3;4, Jonathan Oppenheim5, John A. Smolin6 1Faculty of Physics, Adam Mickiewicz University, 61-614 Pozna´n,Poland 2Centre for Quantum Computation and Communication Technology (Australian Research Council), Centre for Quantum Dynamics, Griffith University, Brisbane, QLD 4111, Australia 3Institute of Theoretical Physics and Astrophysics, University of Gda´nsk,Gda´nsk,Poland 4National Quantum Information Center of Gda´nsk,81–824 Sopot, Poland 5University College of London, Department of Physics & Astronomy, London, WC1E 6BT and London Interdisciplinary Network for Quantum Science and 6IBM T. J. Watson Research Center, 1101 Kitchawan Road, Yorktown Heights, NY 10598 Of course not, but if one believes that information cannot be destroyed in a theory of quantum gravity, then we run into apparent contradictions with quantum theory when we consider evaporating black holes. Namely that the no-cloning theorem or the principle of entanglement monogamy is violated. Here, we show that neither violation need hold, since, in arguing that black holes lead to cloning or non-monogamy, one needs to assume a tensor product structure between two points in space-time that could instead be viewed as causally connected. In the latter case, one is violating the semi-classical causal structure of space, which is a strictly weaker implication than cloning or non-monogamy. This is because both cloning and non-monogamy also lead to a breakdown of the semi-classical causal structure. We show that the lack of monogamy that can emerge in evaporating space times is one that is allowed in quantum mechanics, and is very naturally related to a lack of monogamy of correlations of outputs of measurements performed at subsequent instances of time of a single system. -
Operation-Induced Decoherence by Nonrelativistic Scattering from a Quantum Memory
INSTITUTE OF PHYSICS PUBLISHING JOURNAL OF PHYSICS A: MATHEMATICAL AND GENERAL J. Phys. A: Math. Gen. 39 (2006) 11567–11581 doi:10.1088/0305-4470/39/37/015 Operation-induced decoherence by nonrelativistic scattering from a quantum memory D Margetis1 and J M Myers2 1 Department of Mathematics, and Institute for Physical Science and Technology, University of Maryland, College Park, MD 20742, USA 2 Division of Engineering and Applied Sciences, Harvard University, Cambridge, MA 02138, USA E-mail: [email protected] and [email protected] Received 16 June 2006, in final form 7 August 2006 Published 29 August 2006 Online at stacks.iop.org/JPhysA/39/11567 Abstract Quantum computing involves transforming the state of a quantum memory. We view this operation as performed by transmitting nonrelativistic (massive) particles that scatter from the memory. By using a system of (1+1)- dimensional, coupled Schrodinger¨ equations with point interaction and narrow- band incoming pulse wavefunctions, we show how the outgoing pulse becomes entangled with a two-state memory. This effect necessarily induces decoherence, i.e., deviations of the memory content from a pure state. We describe incoming pulses that minimize this decoherence effect under a constraint on the duration of their interaction with the memory. PACS numbers: 03.65.−w, 03.67.−a, 03.65.Nk, 03.65.Yz, 03.67.Lx 1. Introduction Quantum computing [1–4] relies on a sequence of operations, each of which transforms a pure quantum state to, ideally, another pure state. These states describe a physical system, usually called memory. A central problem in quantum computing is decoherence, in which the pure state degrades to a mixed state, with deleterious effects for the computation. -
Firewalls and the Quantum Properties of Black Holes
Firewalls and the Quantum Properties of Black Holes A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science degree in Physics from the College of William and Mary by Dylan Louis Veyrat Advisor: Marc Sher Senior Research Coordinator: Gina Hoatson Date: May 10, 2015 1 Abstract With the proposal of black hole complementarity as a solution to the information paradox resulting from the existence of black holes, a new problem has become apparent. Complementarity requires a vio- lation of monogamy of entanglement that can be avoided in one of two ways: a violation of Einstein’s equivalence principle, or a reworking of Quantum Field Theory [1]. The existence of a barrier of high-energy quanta - or “firewall” - at the event horizon is the first of these two resolutions, and this paper aims to discuss it, for Schwarzschild as well as Kerr and Reissner-Nordstr¨omblack holes, and to compare it to alternate proposals. 1 Introduction, Hawking Radiation While black holes continue to present problems for the physical theories of today, quite a few steps have been made in the direction of understanding the physics describing them, and, consequently, in the direction of a consistent theory of quantum gravity. Two of the most central concepts in the effort to understand black holes are the black hole information paradox and the existence of Hawking radiation [2]. Perhaps the most apparent result of black holes (which are a consequence of general relativity) that disagrees with quantum principles is the possibility of information loss. Since the only possible direction in which to pass through the event horizon is in, toward the singularity, it would seem that information 2 entering a black hole could never be retrieved. -
Experimental Kernel-Based Quantum Machine Learning in Finite Feature
www.nature.com/scientificreports OPEN Experimental kernel‑based quantum machine learning in fnite feature space Karol Bartkiewicz1,2*, Clemens Gneiting3, Antonín Černoch2*, Kateřina Jiráková2, Karel Lemr2* & Franco Nori3,4 We implement an all‑optical setup demonstrating kernel‑based quantum machine learning for two‑ dimensional classifcation problems. In this hybrid approach, kernel evaluations are outsourced to projective measurements on suitably designed quantum states encoding the training data, while the model training is processed on a classical computer. Our two-photon proposal encodes data points in a discrete, eight-dimensional feature Hilbert space. In order to maximize the application range of the deployable kernels, we optimize feature maps towards the resulting kernels’ ability to separate points, i.e., their “resolution,” under the constraint of fnite, fxed Hilbert space dimension. Implementing these kernels, our setup delivers viable decision boundaries for standard nonlinear supervised classifcation tasks in feature space. We demonstrate such kernel-based quantum machine learning using specialized multiphoton quantum optical circuits. The deployed kernel exhibits exponentially better scaling in the required number of qubits than a direct generalization of kernels described in the literature. Many contemporary computational problems (like drug design, trafc control, logistics, automatic driving, stock market analysis, automatic medical examination, material engineering, and others) routinely require optimiza- tion over huge amounts of data1. While these highly demanding problems can ofen be approached by suitable machine learning (ML) algorithms, in many relevant cases the underlying calculations would last prohibitively long. Quantum ML (QML) comes with the promise to run these computations more efciently (in some cases exponentially faster) by complementing ML algorithms with quantum resources. -
The QBIT Theory of Consciousness
Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 26 August 2019 doi:10.20944/preprints201905.0352.v4 The QBIT theory of consciousness Majid Beshkar Tehran University of Medical Sciences [email protected] [email protected] Abstract The QBIT theory is an attempt toward solving the problem of consciousness based on empirical evidence provided by various scientific disciplines including quantum mechanics, biology, information theory, and thermodynamics. This theory formulates the problem of consciousness in the following four questions, and provides preliminary answers for each question: Question 1: What is the nature of qualia? Answer: A quale is a superdense pack of quantum information encoded in maximally entangled pure states. Question 2: How are qualia generated? Answer: When a pack of quantum information is compressed beyond a certain threshold, a quale is generated. Question 3: Why are qualia subjective? Answer: A quale is subjective because a pack of information encoded in maximally entangled pure states are essentially private and unshareable. Question 4: Why does a quale have a particular meaning? Answer: A pack of information within a cognitive system gradually obtains a particular meaning as it undergoes a progressive process of interpretation performed by an internal model installed in the system. This paper introduces the QBIT theory of consciousness, and explains its basic assumptions and conjectures. Keywords: Coherence; Compression; Computation; Consciousness; Entanglement; Free-energy principle; Generative model; Information; Qualia; Quantum; Representation 1 © 2019 by the author(s). Distributed under a Creative Commons CC BY license. Preprints (www.preprints.org) | NOT PEER-REVIEWED | Posted: 26 August 2019 doi:10.20944/preprints201905.0352.v4 Introduction The problem of consciousness is one of the most difficult problems in biology, which has remained unresolved despite several decades of scientific research. -
Reliably Distinguishing States in Qutrit Channels Using One-Way LOCC
Reliably distinguishing states in qutrit channels using one-way LOCC Christopher King Department of Mathematics, Northeastern University, Boston MA 02115 Daniel Matysiak College of Computer and Information Science, Northeastern University, Boston MA 02115 July 15, 2018 Abstract We present numerical evidence showing that any three-dimensional subspace of C3 ⊗ Cn has an orthonormal basis which can be reliably dis- tinguished using one-way LOCC, where a measurement is made first on the 3-dimensional part and the result used to select an optimal measure- ment on the n-dimensional part. This conjecture has implications for the LOCC-assisted capacity of certain quantum channels, where coordinated measurements are made on the system and environment. By measuring first in the environment, the conjecture would imply that the environment- arXiv:quant-ph/0510004v1 1 Oct 2005 assisted classical capacity of any rank three channel is at least log 3. Sim- ilarly by measuring first on the system side, the conjecture would imply that the environment-assisting classical capacity of any qutrit channel is log 3. We also show that one-way LOCC is not symmetric, by providing an example of a qutrit channel whose environment-assisted classical capacity is less than log 3. 1 1 Introduction and statement of results The noise in a quantum channel arises from its interaction with the environment. This viewpoint is expressed concisely in the Lindblad-Stinespring representation [6, 8]: Φ(|ψihψ|)= Tr U(|ψihψ|⊗|ǫihǫ|)U ∗ (1) E Here E is the state space of the environment, which is assumed to be initially prepared in a pure state |ǫi.