Skip to main content

Showing 1–50 of 68 results for author: Mor, T

.
  1. Geometry of entanglement and separability in Hilbert subspaces of dimension up to three

    Authors: Rotem Liss, Tal Mor, Andreas Winter

    Abstract: We present a complete classification of the geometry of the mutually complementary sets of entangled and separable states in three-dimensional Hilbert subspaces of bipartite and multipartite quantum systems. Our analysis begins by finding the geometric structure of the pure product states in a given three-dimensional Hilbert subspace, which determines all the possible separable and entangled mixed… ▽ More

    Submitted 21 June, 2024; v1 submitted 10 September, 2023; originally announced September 2023.

    Comments: 22 pages; 5 figures

    Journal ref: Letters in Mathematical Physics 114, 86 (2024)

  2. arXiv:2208.12154  [pdf, other

    quant-ph cs.CR

    Composable Security of Generalized BB84 Protocols Against General Attacks

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: Quantum key distribution (QKD) protocols make it possible for two parties to generate a secret shared key. One of the most important QKD protocols, BB84, was suggested by Bennett and Brassard in 1984. Various proofs of unconditional security for BB84 have been suggested, but the first security proofs were not composable. Here we improve a security proof of BB84 given by [Biham, Boyer, Boykin, Mor,… ▽ More

    Submitted 25 August, 2022; originally announced August 2022.

    Comments: 51 pages; 1 figure

  3. Algorithmic cooling for resolving state preparation and measurement errors in quantum computing

    Authors: Raymond Laflamme, Junan Lin, Tal Mor

    Abstract: State preparation and measurement errors are commonly regarded as indistinguishable. The problem of distinguishing state preparation (SPAM) errors from measurement errors is important to the field of characterizing quantum processors. In this work, we propose a method to separately characterize SPAM errors using a novel type of algorithmic cooling protocol called measurement-based algorithmic cool… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

    Comments: 9 pages, 5 figures

  4. arXiv:2112.09395  [pdf, other

    quant-ph cs.CR physics.ed-ph

    Digital signatures with Quantum Candies

    Authors: Tal Mor, Roman Shapira, Guy Shemesh

    Abstract: Quantum candies (qandies) is a pedagogical simple model which describes many concepts from quantum information processing (QIP) intuitively, without the need to understand or make use of superpositions, and without the need of using complex algebra. One of the topics in quantum cryptography which gains research attention in recent years is quantum digital signatures (QDS), involving protocols to s… ▽ More

    Submitted 17 December, 2021; originally announced December 2021.

  5. arXiv:2111.10092  [pdf, other

    cs.CC quant-ph

    Non-NP-Hardness of Translationally-Invariant Spin-Model Problems

    Authors: Rotem Liss, Tal Mor, Roman Shapira

    Abstract: Finding the ground state energy of the Heisenberg Hamiltonian is an important problem in the field of condensed matter physics. In some configurations, such as the antiferromagnetic translationally-invariant case on the 2D square lattice, its exact ground state energy is still unknown. We show that finding the ground state energy of the Heisenberg model cannot be an NP-Hard problem unless P=NP. We… ▽ More

    Submitted 19 November, 2021; originally announced November 2021.

  6. arXiv:2110.01402  [pdf, other

    physics.ed-ph cs.CR quant-ph

    Quantum information and beyond -- with quantum candies

    Authors: Junan Lin, Tal Mor, Roman Shapira

    Abstract: The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and greatly expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some basic concepts in quantum information, incl… ▽ More

    Submitted 20 November, 2021; v1 submitted 30 September, 2021; originally announced October 2021.

    Comments: This is the journal version of: Lin, J. and Mor, T., 2020, December. Quantum Candies and Quantum Cryptography. In International Conference on the Theory and Practice of Natural Computing (pp. 69-81). Springer, Cham., arXiv preprint arXiv:2011.02837. Changes in this version: changed title and abstract, added sections on NLB, quaternionic computing and mixed states

  7. Security Proof Against Collective Attacks for an Experimentally Feasible Semiquantum Key Distribution Protocol

    Authors: Walter O. Krawec, Rotem Liss, Tal Mor

    Abstract: Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQ… ▽ More

    Submitted 3 July, 2023; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: 16 pages; 3 figures

    Journal ref: IEEE Transactions on Quantum Engineering, Volume 4, 2023, 2100316

  8. arXiv:2011.02837  [pdf, other

    physics.ed-ph cs.CR quant-ph

    Quantum Candies and Quantum Cryptography

    Authors: Junan Lin, Tal Mor

    Abstract: The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some basic concepts in quantum information, includi… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: To be presented at the 9th International Conference on the Theory and Practice of Natural Computing (TPNC 2020; postponed and merged with TPNC 2021). The final authenticated publication is available online at https://doi.org/10.1007/978-3-030-63000-3_6

  9. arXiv:2011.02232  [pdf, other

    quant-ph cs.ET

    Quantum Communication -- Celebrating the Silver Jubilee of Teleportation

    Authors: Rotem Liss, Tal Mor

    Abstract: This is an editorial paper presenting the meaning, history, and influence of quantum teleportation.

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: 6 pages; 1 figure; editorial paper for the eponymous Special Issue published in Entropy: see https://www.mdpi.com/journal/entropy/special_issues/Quantum_Communication

    Journal ref: Entropy 2020, 22(6), 628

  10. From Practice to Theory: The "Bright Illumination" Attack on Quantum Key Distribution Systems

    Authors: Rotem Liss, Tal Mor

    Abstract: The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-689 (2010)] is a practical attack, fully implementable against quantum key distribution systems. In contrast to almost all developments in quantum information processing (for example, Shor's factorization algorithm, quantum teleportation, Bennett-Brassard (BB84) quantum key distribution, the "Photon-Number Splitting" attack, an… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

    Comments: 17 pages

    Journal ref: In Proceedings of the International Conference on the Theory and Practice of Natural Computing (TPNC 2020), pages 82-94. Lecture Notes in Computer Science, vol 12494. Springer, Cham (2020)

  11. arXiv:1812.00671  [pdf, other

    quant-ph cond-mat.str-el

    Topological order on the Bloch sphere

    Authors: Rotem Liss, Tal Mor, Roman Orus

    Abstract: A Bloch sphere is the geometrical representation of an arbitrary two-dimensional Hilbert space. Possible classes of entanglement and separability for the pure and mixed states on the Bloch sphere were suggested by [M. Boyer, R. Liss, T. Mor, PRA 95, 032308 (2017)]. Here we construct a Bloch sphere for the Hilbert space spanned by one of the ground states of Kitaev's toric code model and one of its… ▽ More

    Submitted 29 March, 2020; v1 submitted 3 December, 2018; originally announced December 2018.

    Comments: 15 pages; 5 figures

    Journal ref: New J. Phys. 22, 033023 (2020)

  12. arXiv:1806.06213  [pdf, other

    quant-ph cs.CR

    Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, "classical Alice with a controllable mirror" (the "Mirror protocol"), has recently been presented and prov… ▽ More

    Submitted 18 July, 2018; v1 submitted 16 June, 2018; originally announced June 2018.

    Comments: 9 pages

    Journal ref: Entropy 2018, 20(7), 536

  13. arXiv:1802.06865  [pdf, other

    cs.CV

    Automated soft tissue lesion detection and segmentation in digital mammography using a u-net deep learning network

    Authors: Timothy de Moor, Alejandro Rodriguez-Ruiz, Albert Gubern Mérida, Ritse Mann, Jonas Teuwen

    Abstract: Computer-aided detection or decision support systems aim to improve breast cancer screening programs by hel** radiologists to evaluate digital mammography (DM) exams. Commonly such methods proceed in two steps: selection of candidate regions for malignancy, and later classification as either malignant or not. In this study, we present a candidate detection method based on deep learning to automa… ▽ More

    Submitted 8 March, 2018; v1 submitted 19 February, 2018; originally announced February 2018.

    Comments: To appear in IWBI 2018

  14. Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: collective attacks and joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z… ▽ More

    Submitted 19 November, 2019; v1 submitted 27 November, 2017; originally announced November 2017.

    Comments: 24 pages; 1 figure; this is an improved version of arXiv:1704.01388 [quant-ph], extended to make the security proof (against collective attacks) fully composable

    Journal ref: Theoretical Computer Science 801, 96-109 (2020)

  15. Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous pap… ▽ More

    Submitted 5 April, 2017; originally announced April 2017.

    Comments: 6 pages; 1 figure

    Journal ref: In Proceedings of the 2nd International Conference on Complexity, Future Information Systems and Risk - Volume 1: COMPLEXIS, pages 23-29, Porto, Portugal (2017)

  16. Heat-Bath Algorithmic Cooling with correlated qubit-environment interactions

    Authors: Nayeli A. Rodriguez-Briones, Jun Li, Xinhua Peng, Tal Mor, Yossi Weinstein, Raymond Laflamme

    Abstract: Controlled preparation of highly pure quantum states is at the core of practical applications of quantum information science, from the state initialization of most quantum algorithms to a reliable supply of ancilla qubits that satisfy the fault-tolerance threshold for quantum error correction. Heat-bath algorithmic cooling has been shown to purify qubits by controlled redistribution of entropy and… ▽ More

    Submitted 8 March, 2017; originally announced March 2017.

  17. arXiv:1701.07757  [pdf, other

    quant-ph math-ph

    Extrapolated Quantum States, Void States, and a Huge Novel Class of Distillable Entangled States

    Authors: Michel Boyer, Aharon Brodutch, Tal Mor

    Abstract: A nice and interesting property of any pure tensor-product state is that each such state has distillable entangled states at an arbitrarily small distance $ε$ in its neighborhood. We say that such nearby states are $ε$-entangled, and we call the tensor product state in that case, a "boundary separable state", as there is entanglement at any distance from this "boundary". Here we find a huge class… ▽ More

    Submitted 26 January, 2017; originally announced January 2017.

    Comments: A preliminary version of this work was presented at the 3rd International Conference on the Theory and Practice of Natural Computing TPNC 2014 (Boyer and Mor (2014))

  18. Experimentally feasible protocol for semiquantum key distribution

    Authors: Michel Boyer, Matty Katz, Rotem Liss, Tal Mor

    Abstract: Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum key distribution (SQKD) protocols, such as "QKD with classical Bob" and "QKD with classical Alice" (that have both been proven robust), achieve this goal even if one of the parties is classical. However, existing SQKD protocols are not experimentally feasible with current… ▽ More

    Submitted 29 December, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

    Comments: 6 pages

    Journal ref: Phys. Rev. A 96, 062335 (2017)

  19. Geometry of entanglement in the Bloch sphere

    Authors: Michel Boyer, Rotem Liss, Tal Mor

    Abstract: Entanglement is an important concept in quantum information, quantum communication, and quantum computing. We provide a geometrical analysis of entanglement and separability for all the rank-2 quantum mixed states: complete analysis for the bipartite states, and partial analysis for the multipartite states. For each rank-2 mixed state, we define its unique Bloch sphere, that is spanned by the eige… ▽ More

    Submitted 8 March, 2017; v1 submitted 2 August, 2016; originally announced August 2016.

    Comments: 7 pages; 5 figures

    Journal ref: Phys. Rev. A 95, 032308 (2017)

  20. Entanglement and deterministic quantum computing with one qubit

    Authors: Michel Boyer, Aharon Brodutch, Tal Mor

    Abstract: The role of entanglement and quantum correlations in complex physical systems and quantum information processing devices has become a topic of intense study in the past two decades. In this work we present new tools for learning about entanglement and quantum correlations in dynamical systems where the quantum states are mixed and the eigenvalue spectrum is highly degenerate. We apply these result… ▽ More

    Submitted 3 January, 2017; v1 submitted 16 June, 2016; originally announced June 2016.

    Comments: Many changes in the structure of the paper. Comments welcome

    Journal ref: Phys. Rev. A 95, 022330 (2017)

  21. arXiv:1506.01778  [pdf, ps, other

    quant-ph

    Comments on: Asymptotic Bound for Heat-Bath Algorithmic Cooling

    Authors: Nayeli Azucena Rodriguez-Briones, Jun Li, Xinhua Peng, Tal Mor, Yossi Weinstein, Raymond Laflamme

    Abstract: In a recent paper, PRL 114 100404, 2015, Raeisi and Mosca gave a limit for cooling with Heat-Bath Algorithmic Cooling (HBAC). Here we show how to exceed that limit by having correlation in the qubits-bath interaction.

    Submitted 16 November, 2015; v1 submitted 5 June, 2015; originally announced June 2015.

  22. Algorithmic Cooling in Liquid State NMR

    Authors: Yosi Atia, Yuval Elias, Tal Mor, Yossi Weinstein

    Abstract: Algorithmic cooling is a method that employs thermalization to increase qubit purification level, namely it reduces the qubit-system's entropy. We utilized gradient ascent pulse engineering (GRAPE), an optimal control algorithm, to implement algorithmic cooling in liquid state nuclear magnetic resonance. Various cooling algorithms were applied onto the three qubits of $^{13}$C$_2$-trichloroethylen… ▽ More

    Submitted 8 November, 2015; v1 submitted 17 November, 2014; originally announced November 2014.

    Comments: 6 pages, 7 figures

    Journal ref: Phys. Rev. A 93, 012325 (2016)

  23. arXiv:1404.6885  [pdf, ps, other

    quant-ph

    Experimental Heat-Bath Cooling of Spins

    Authors: Gilles Brassard, Yuval Elias, José M. Fernandez, Haggai Gilboa, Jonathan A. Jones, Tal Mor, Yossi Weinstein, Li Xiao

    Abstract: Algorithmic cooling (AC) is a method to purify quantum systems, such as ensembles of nuclear spins, or cold atoms in an optical lattice. When applied to spins, AC produces ensembles of highly polarized spins, which enhance the signal strength in nuclear magnetic resonance (NMR). According to this cooling approach, spin-half nuclei in a constant magnetic field are considered as bits, or more precis… ▽ More

    Submitted 28 April, 2014; originally announced April 2014.

    Comments: 20 pages, 8 figures, replaces quant-ph/0511156

  24. arXiv:1404.6824  [pdf, other

    quant-ph

    Prospects and Limitations of Algorithmic Cooling

    Authors: Gilles Brassard, Yuval Elias, Tal Mor, Yossi Weinstein

    Abstract: Heat-bath algorithmic cooling (AC) of spins is a theoretically powerful effective cooling approach, that (ideally) cools spins with low polarization exponentially better than cooling by reversible entropy manipulations alone. Here, we investigate the limitations and prospects of AC. For non-ideal and semioptimal AC, we study the impact of finite relaxation times of reset and computation spins on t… ▽ More

    Submitted 27 April, 2014; originally announced April 2014.

    Comments: 12 pages, 5 figures

  25. Attacks on Fixed Apparatus Quantum Key Distribution Schemes

    Authors: Michel Boyer, Ran Gelles, Tal Mor

    Abstract: We consider quantum key distribution implementations in which the receiver's apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver's equipment. The attack we presen… ▽ More

    Submitted 3 December, 2013; originally announced December 2013.

    Comments: 10 pages, 3 figure, 8 tables. A preliminary version of this manuscript appeared in TPNC '12: Proceedings of the 1st International Conference on Theory and Practice of Natural Computing, LNCS, Vol. 7505 (2012)

    Journal ref: Physical Review A 90, 012329 (2014)

  26. arXiv:1308.4615  [pdf, other

    quant-ph cond-mat.other

    Quantum Computing Gates via Optimal Control

    Authors: Yosi Atia, Yuval Elias, Tal Mor, Yossi Weinstein

    Abstract: We demonstrate the use of optimal control to design two entropy-manipulating quantum gates which are more complex than the corresponding, commonly used, gates, such as CNOT and Toffoli (CCNOT): A 2-qubit gate called PE (polarization exchange) and a 3-qubit gate called COMP (polarization compression) were designed using GRAPE, an optimal control algorithm. Both gates were designed for a three-spin… ▽ More

    Submitted 1 September, 2013; v1 submitted 21 August, 2013; originally announced August 2013.

    Comments: 15 pages, 5 figures. Submitted to International Journal of Quantum Information

    Journal ref: Int. J. Quant. Inf., 12:1450031, 2014

  27. arXiv:1110.6573  [pdf, ps, other

    quant-ph cs.CR

    Reversed Space Attacks

    Authors: Ran Gelles, Tal Mor

    Abstract: Many quantum key distribution (QKD) schemes are based on sending and measuring qubits -- two-dimensional quantum systems. Yet, in practical realizations and experiments, the measuring devices at the receiver's (Bob) site commonly do not measure a two-dimensional system but rather a quantum space of a larger dimension. Such an enlargement sometimes results from imperfect devices. However, in variou… ▽ More

    Submitted 20 May, 2016; v1 submitted 29 October, 2011; originally announced October 2011.

    Comments: 20 pages, 4 figures; A preliminary version of this work appeared in TPNC 2012: Proceedings of the 1st International Conference on Theory and Practice of Natural Computing, LNCS 7505, pages 133-146, October 2012

  28. arXiv:1110.5892  [pdf, ps, other

    quant-ph cs.ET cs.IT

    Semi-optimal Practicable Algorithmic Cooling

    Authors: Yuval Elias, Tal Mor, Yossi Weinstein

    Abstract: Algorithmic Cooling (AC) of spins applies entropy manipulation algorithms in open spin-systems in order to cool spins far beyond Shannon's entropy bound. AC of nuclear spins was demonstrated experimentally, and may contribute to nuclear magnetic resonance (NMR) spectroscopy. Several cooling algorithms were suggested in recent years, including practicable algorithmic cooling (PAC) and exhaustive AC… ▽ More

    Submitted 26 October, 2011; originally announced October 2011.

    Comments: 13 pages, 5 figures

    Journal ref: Phys. Rev. A 83 (2011) 042340

  29. arXiv:1108.5109  [pdf, ps, other

    quant-ph physics.chem-ph q-bio.BM

    Heat-Bath Cooling of Spins in Two Amino Acids

    Authors: Yuval Elias, Haggai Gilboa, Tal Mor, Yossi Weinstein

    Abstract: Heat-bath cooling is a component of practicable algorithmic cooling of spins, an approach which might be useful for in vivo 13C spectroscopy, in particular for prolonged metabolic processes where substrates that are hyperpolarized ex-vivo are not effective. We applied heat-bath cooling to 1,2-13C2-amino acids, using the alpha protons to shift entropy from selected carbons to the environment. For g… ▽ More

    Submitted 26 October, 2011; v1 submitted 25 August, 2011; originally announced August 2011.

    Comments: 7 pages, 4 figures, presented at the International Society for Magnetic Resonance (ISMAR) in Florence, 2010

    Journal ref: Chem. Phys. Lett. 517, 126-131 (2011)

  30. arXiv:1012.2418  [pdf, ps, other

    quant-ph

    On the Robustness of (Photonic) Quantum Key Distribution with Classical Alice

    Authors: Michel Boyer, Tal Mor

    Abstract: Quantum Key Distribution (QKD) with classical Bob has recently been suggested and proven robust. Following this work, QKD with classical Alice was also suggested and proven robust. The above protocols are ideal in the sense that they make use of qubits. However, in the past, well-known QKD protocols that were proven robust and even proven unconditionally secure, when qubits are used, were found to… ▽ More

    Submitted 13 December, 2010; v1 submitted 10 December, 2010; originally announced December 2010.

  31. Comment on "Semiquantum-key distribution using less than four quantum states"

    Authors: Michel Boyer, Tal Mor

    Abstract: Comment on Phys. Rev. A 79, 052312 (2009), http://pra.aps.org/abstract/PRA/v79/i5/e052312

    Submitted 30 October, 2010; v1 submitted 11 October, 2010; originally announced October 2010.

  32. Semi-Quantum Key Distribution

    Authors: Michel Boyer, Ran Gelles, Dan Kenigsberg, Tal Mor

    Abstract: Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob)… ▽ More

    Submitted 28 December, 2008; originally announced December 2008.

    Comments: 13 pages, 2 figures

  33. arXiv:0711.3019  [pdf, other

    quant-ph

    Quantum-Space Attacks

    Authors: Ran Gelles, Tal Mor

    Abstract: Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security ca… ▽ More

    Submitted 25 November, 2007; v1 submitted 19 November, 2007; originally announced November 2007.

    Comments: 25 pages, 3 figures. An improved and slightly longer version

  34. Optimal Algorithmic Cooling of Spins

    Authors: Yuval Elias, José M. Fernandez, Tal Mor, Yossi Weinstein

    Abstract: Algorithmic Cooling (AC) of Spins is potentially the first near-future application of quantum computing devices. Straightforward quantum algorithms combined with novel entropy manipulations can result in a method to improve the identification of molecules. We introduce here several new exhaustive cooling algorithms, such as the Tribonacci and k-bonacci algorithms. In particular, we present the `… ▽ More

    Submitted 19 November, 2007; originally announced November 2007.

    Comments: 20 pages, 5 figures

    Journal ref: Lecture Notes in Comput. Sci. (LNCS), vol 4618, pp. 2-26, Unconvetional Computation, Springer, 2007

  35. Quantum Key Distribution with Classical Bob

    Authors: Michel Boyer, Dan Kenigsberg, Tal Mor

    Abstract: Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bo… ▽ More

    Submitted 13 March, 2007; originally announced March 2007.

    Comments: 4 and a bit pages, 1 figure, RevTeX

  36. arXiv:quant-ph/0703103  [pdf, ps, other

    quant-ph

    "Quantumness" versus "Classicality" of Quantum States

    Authors: Berry Groisman, Dan Kenigsberg, Tal Mor

    Abstract: Entanglement is one of the pillars of quantum mechanics and quantum information processing, and as a result the quantumness of nonentangled states has typically been overlooked and unrecognized. We give a robust definition for the classicality versus quantumness of a single multipartite quantum state, a set of states, and a protocol using quantum states. We show a variety of nonentangled (separa… ▽ More

    Submitted 13 March, 2007; originally announced March 2007.

    Comments: 4 and a bit pages, RevTeX

  37. arXiv:quant-ph/0609028  [pdf, ps, other

    quant-ph cs.CR

    Secure Controlled Teleportation

    Authors: Dan Kenigsberg, Tal Mor

    Abstract: Several protocols for controlled teleportation were suggested by Yang, Chu, and Han [PRA 70, 022329 (2004)]. In these protocols, Alice teleports qubits (in an unknown state) to Bob iff a controller allows it. We view this problem in the perspective of secure multi-party quantum computation. We show that the suggested entanglement-efficient protocols for $m$-qubit controlled teleportation are ope… ▽ More

    Submitted 4 September, 2006; originally announced September 2006.

    Comments: 3 pages, presented as a poster in AQIS'06, where A. Winter suggested considerable improvements to the main result (these suggestions are not included in this version)

  38. Methods for scalable optical quantum computation

    Authors: Tal Mor, Nadav Yoran

    Abstract: We propose a scalable method for implementing linear optics quantum computation using the ``linked-state'' approach. Our method avoids the two-dimensional spread of errors occurring in the preparation of the linked-state. Consequently, a proof is given for the scalability of this modified linked-state model, and an exact expression for the efficiency of the method is obtained. Moreover, a consid… ▽ More

    Submitted 14 March, 2006; originally announced March 2006.

    Comments: 4 pages, 3 figures

    Journal ref: Phys. Rev. Lett. 97, 090501 (2006)

  39. Quantum Advantage without Entanglement

    Authors: Dan Kenigsberg, Tal Mor, Gil Ratsaby

    Abstract: We study the advantage of pure-state quantum computation without entanglement over classical computation. For the Deutsch-Jozsa algorithm we present the maximal subproblem that can be solved without entanglement, and show that the algorithm still has an advantage over the classical ones. We further show that this subproblem is of greater significance, by proving that it contains all the Boolean… ▽ More

    Submitted 30 November, 2005; originally announced November 2005.

    Comments: 10 pages

    Journal ref: Quantum Information and Computation 6(7), 606--615 (2006)

  40. arXiv:quant-ph/0511175  [pdf, ps, other

    quant-ph cs.CR cs.IT

    A Proof of the Security of Quantum Key Distribution

    Authors: Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury

    Abstract: We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.

    Submitted 17 November, 2005; originally announced November 2005.

    Comments: 64 pages; Accepted for publication in J. of Cryptology; replaces quant-ph/9912053; short version appeared in STOC'2000 pages 715-724

    Journal ref: Journal of cryptology 19, 381-439 (2006)

  41. On Classical Teleportation and Classical Nonlocality

    Authors: Tal Mor

    Abstract: An interesting protocol for classical teleportation of an unknown classical state was recently suggested by Cohen, and by Gour and Meyer. In that protocol, Bob can sample from a probability distribution P that is given to Alice, even if Alice has absolutely no knowledge about P. Pursuing a similar line of thought, we suggest here a limited form of nonlocality - "classical nonlocality". Our nonlo… ▽ More

    Submitted 13 March, 2007; v1 submitted 17 November, 2005; originally announced November 2005.

    Comments: 8 pages, Version 2 is using the term "quantum remote steering" to describe HJW idea, and "classical remote steering" is the main new result of this current paper. Version 2 also has an additional citation (to Gisin's 89 paper)

    Journal ref: Int. J. of Quantum Information 4, 161-172 (2006)

  42. arXiv:quant-ph/0511156  [pdf, ps, other

    quant-ph

    Experimental Heat-Bath Cooling of Spins

    Authors: Gilles Brassard, Yuval Elias, Jose M. Fernandez, Haggai Gilboa, Jonathan A. Jones, Tal Mor, Yossi Weinstein, Li Xiao

    Abstract: Algorithmic cooling is a novel technique to generate ensembles of highly polarized spins, which could significantly improve the signal strength in Nuclear Magnetic Resonance (NMR) spectroscopy. It combines reversible (entropy-preserving) manipulations and irreversible controlled interactions with the environment, using simple quantum computing techniques to increase spin polarization far beyond… ▽ More

    Submitted 16 November, 2005; originally announced November 2005.

    Comments: 11 pages, 6 Figures, submitted version

  43. Paramagnetic Materials and Practical Algorithmic Cooling for NMR Quantum Computing

    Authors: Jose M. Fernandez, Tal Mor, Yossi Weinstein

    Abstract: Algorithmic Cooling is a method that uses novel data compression techniques and simplecquantum computing devices to improve NMR spectroscopy, and to offer scalable NMR quantum computers. The algorithm recursively employs two steps. A reversible entropy compression of the computation quantum-bits (qubits) of the system and an irreversible heat transfer from the system to the environment through a… ▽ More

    Submitted 16 November, 2005; originally announced November 2005.

    Comments: 5 pages, A conference version of this paper appeared in SPIE, volume 5105, pages 185-194 (2003)

    Journal ref: International Journal of Quantum Information, Vol. 3, pp. 281-285 (2005)

  44. arXiv:quant-ph/0401135  [pdf, ps, other

    quant-ph

    Algorithmic Cooling of Spins: A Practicable Method for Increasing Polarization

    Authors: Jose M. Fernandez, Seth Lloyd, Tal Mor, Vwani Roychowdhury

    Abstract: An efficient technique to generate ensembles of spins that are highly polarized by external magnetic fields is the Holy Grail in Nuclear Magnetic Resonance (NMR) spectroscopy. Since spin-half nuclei have steady-state polarization biases that increase inversely with temperature, spins exhibiting high polarization biases are considered cool, even when their environment is warm. Existing spin-cooli… ▽ More

    Submitted 23 January, 2004; v1 submitted 21 January, 2004; originally announced January 2004.

    Comments: 24 pages (with annexes), 3 figures (PS). This version contains no major content changes: fixed bibliography & figures, modified acknowledgements

    Journal ref: International Journal of Quantum Information, v2, n4, pp 461-467, 2004

  45. Quantum Computing Without Entanglement

    Authors: Eli Biham, Gilles Brassard, Dan Kenigsberg, Tal Mor

    Abstract: It is generally believed that entanglement is essential for quantum computing. We present here a few simple examples in which quantum computing without entanglement is better than anything classically achievable, in terms of the reliability of the outcome after a xed number of oracle calls. Using a separable (that is, unentangled) n-qubit state, we show that the Deutsch-Jozsa problem and the Sim… ▽ More

    Submitted 26 June, 2003; originally announced June 2003.

    Comments: 18 pages. Presented at FoCM'02 (Aug 2002, see http://www.cs.technion.ac.il/~danken/pub/QCnoEnt.pdf), QIP'03 (Dec 2002, see http://www.msri.org/publications/ln/msri/2002/qip/brassard/1/), Qubit'03 (Apr 2003, see http://www.cs.technion.ac.il/~talmo/Qubitconf/QUBIT-2003/program/)

    Journal ref: Theoretical Computer Science, Volume 320, Issue 1, Pages 15 - 33, June 2004.

  46. Algorithmic Cooling and Scalable NMR Quantum Computers

    Authors: P. Oscar Boykin, Tal Mor, Vwani Roychowdhury, Farrokh Vatan, Rutger Vrijen

    Abstract: We present here algorithmic cooling (via polarization-heat-bath)- a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, algorithmic cooling cleans dirty bits beyond the Shannon's bound on data compression, by employing a set of rapidly thermal-relaxing bits. Such auxilia… ▽ More

    Submitted 18 June, 2001; originally announced June 2001.

    Comments: 21 pages, 3 figures

  47. arXiv:quant-ph/9912053  [pdf, ps, other

    quant-ph

    A Proof of the Security of Quantum Key Distribution

    Authors: Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury

    Abstract: We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.

    Submitted 10 December, 1999; originally announced December 1999.

  48. Security Aspects of Practical Quantum Cryptography

    Authors: Gilles Brassard, Norbert Lütkenhaus, Tal Mor, Barry C. Sanders

    Abstract: The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes can be totally insecure. We provide a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, a realistic detection process, and modifications of the ``qubits'' sent from t… ▽ More

    Submitted 12 November, 1999; originally announced November 1999.

    Comments: 5 pages, uses multicol

    Journal ref: Phys. Rev. Lett. Vol 85, 1330-1333 (2000).

  49. Unextendible Product Bases, Uncompletable Product Bases and Bound Entanglement

    Authors: David P. DiVincenzo, Tal Mor, Peter W. Shor, John A. Smolin, Barbara M. Terhal

    Abstract: We report new results and generalizations of our work on unextendible product bases (UPB), uncompletable product bases and bound entanglement. We present a new construction for bound entangled states based on product bases which are only completable in a locally extended Hilbert space. We introduce a very useful representation of a product basis, an orthogonality graph. Using this representation… ▽ More

    Submitted 6 November, 2000; v1 submitted 22 August, 1999; originally announced August 1999.

    Comments: 24 pages RevTex, 15 figures; appendix removed, several small corrections, to appear in Comm. Math. Phys

    Journal ref: Comm. Math. Phys. 238, pp. 379--410 (2003)

  50. arXiv:quant-ph/9907067  [pdf, ps, other

    quant-ph

    Algorithms on Ensemble Quantum Computers

    Authors: P. Oscar Boykin, Tal Mor, Vwani Roychowdhury, Farrokh Vatan

    Abstract: In ensemble (or bulk) quantum computation, measurements of qubits in an individual computer cannot be performed. Instead, only expectation values can be measured. As a result of this limitation on the model of computation, various important algorithms cannot be processed directly on such computers, and must be modified. We provide modifications of various existing protocols, including algorithms… ▽ More

    Submitted 21 July, 1999; originally announced July 1999.

    Comments: 16 pages, 4 figures