-
Geometry of entanglement and separability in Hilbert subspaces of dimension up to three
Authors:
Rotem Liss,
Tal Mor,
Andreas Winter
Abstract:
We present a complete classification of the geometry of the mutually complementary sets of entangled and separable states in three-dimensional Hilbert subspaces of bipartite and multipartite quantum systems. Our analysis begins by finding the geometric structure of the pure product states in a given three-dimensional Hilbert subspace, which determines all the possible separable and entangled mixed…
▽ More
We present a complete classification of the geometry of the mutually complementary sets of entangled and separable states in three-dimensional Hilbert subspaces of bipartite and multipartite quantum systems. Our analysis begins by finding the geometric structure of the pure product states in a given three-dimensional Hilbert subspace, which determines all the possible separable and entangled mixed states over the same subspace. In bipartite systems, we characterise the 14 possible qualitatively different geometric shapes for the set of separable states in any three-dimensional Hilbert subspace (5 classes which also appear in two-dimensional subspaces and were found and analysed by Boyer, Liss and Mor [Phys. Rev. A 95:032308, 2017], and 9 novel classes which appear only in three-dimensional subspaces), describe their geometries, and provide figures illustrating them. We also generalise these results to characterise the sets of fully separable states (and hence the complementary sets of somewhat entangled states) in three-dimensional subspaces of multipartite systems. Our results show which geometrical forms quantum entanglement can and cannot take in low-dimensional subspaces.
△ Less
Submitted 21 June, 2024; v1 submitted 10 September, 2023;
originally announced September 2023.
-
Composable Security of Generalized BB84 Protocols Against General Attacks
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
Quantum key distribution (QKD) protocols make it possible for two parties to generate a secret shared key. One of the most important QKD protocols, BB84, was suggested by Bennett and Brassard in 1984. Various proofs of unconditional security for BB84 have been suggested, but the first security proofs were not composable. Here we improve a security proof of BB84 given by [Biham, Boyer, Boykin, Mor,…
▽ More
Quantum key distribution (QKD) protocols make it possible for two parties to generate a secret shared key. One of the most important QKD protocols, BB84, was suggested by Bennett and Brassard in 1984. Various proofs of unconditional security for BB84 have been suggested, but the first security proofs were not composable. Here we improve a security proof of BB84 given by [Biham, Boyer, Boykin, Mor, and Roychowdhury, J. Cryptology, 19(4):381-439, 2006] to be composable and match the state-of-the-art results for BB84, and we extend it to prove unconditional security of several variants of the BB84 protocol. Our composable security proof for BB84 and its variants is mostly self-contained, algebraic, and relatively simple, and it gives tight finite-key bounds.
△ Less
Submitted 25 August, 2022;
originally announced August 2022.
-
Algorithmic cooling for resolving state preparation and measurement errors in quantum computing
Authors:
Raymond Laflamme,
Junan Lin,
Tal Mor
Abstract:
State preparation and measurement errors are commonly regarded as indistinguishable. The problem of distinguishing state preparation (SPAM) errors from measurement errors is important to the field of characterizing quantum processors. In this work, we propose a method to separately characterize SPAM errors using a novel type of algorithmic cooling protocol called measurement-based algorithmic cool…
▽ More
State preparation and measurement errors are commonly regarded as indistinguishable. The problem of distinguishing state preparation (SPAM) errors from measurement errors is important to the field of characterizing quantum processors. In this work, we propose a method to separately characterize SPAM errors using a novel type of algorithmic cooling protocol called measurement-based algorithmic cooling (MBAC). MBAC assumes the ability to perform (potentially imperfect) projective measurements on individual qubits, which is available on many modern quantum processors. We demonstrate that MBAC can significantly reduce state preparation error under realistic assumptions, with a small overhead that can be upper bounded by measurable quantities. Thus, MBAC can be a valuable tool not only for benchmarking near-term quantum processors, but also for improving the performance of quantum processors in an algorithmic manner.
△ Less
Submitted 15 March, 2022;
originally announced March 2022.
-
Digital signatures with Quantum Candies
Authors:
Tal Mor,
Roman Shapira,
Guy Shemesh
Abstract:
Quantum candies (qandies) is a pedagogical simple model which describes many concepts from quantum information processing (QIP) intuitively, without the need to understand or make use of superpositions, and without the need of using complex algebra. One of the topics in quantum cryptography which gains research attention in recent years is quantum digital signatures (QDS), involving protocols to s…
▽ More
Quantum candies (qandies) is a pedagogical simple model which describes many concepts from quantum information processing (QIP) intuitively, without the need to understand or make use of superpositions, and without the need of using complex algebra. One of the topics in quantum cryptography which gains research attention in recent years is quantum digital signatures (QDS), involving protocols to securely sign classical bits using quantum methods. In this paper we show how the "qandy model" can be used to describe three QDS protocols, in order to provide an important and potentially practical example of the power of "superpositionless" quantum information processing, for individuals without background knowledge in the field.
△ Less
Submitted 17 December, 2021;
originally announced December 2021.
-
Non-NP-Hardness of Translationally-Invariant Spin-Model Problems
Authors:
Rotem Liss,
Tal Mor,
Roman Shapira
Abstract:
Finding the ground state energy of the Heisenberg Hamiltonian is an important problem in the field of condensed matter physics. In some configurations, such as the antiferromagnetic translationally-invariant case on the 2D square lattice, its exact ground state energy is still unknown. We show that finding the ground state energy of the Heisenberg model cannot be an NP-Hard problem unless P=NP. We…
▽ More
Finding the ground state energy of the Heisenberg Hamiltonian is an important problem in the field of condensed matter physics. In some configurations, such as the antiferromagnetic translationally-invariant case on the 2D square lattice, its exact ground state energy is still unknown. We show that finding the ground state energy of the Heisenberg model cannot be an NP-Hard problem unless P=NP. We prove this result using a reduction to a sparse set and certain theorems from computational complexity theory. The result hints at the potential tractability of the problem and encourages further research towards a positive complexity result. In addition, we prove similar results for many similarly structured Hamiltonian problems, including certain forms of the Ising, t-J, and Fermi-Hubbard models.
△ Less
Submitted 19 November, 2021;
originally announced November 2021.
-
Quantum information and beyond -- with quantum candies
Authors:
Junan Lin,
Tal Mor,
Roman Shapira
Abstract:
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and greatly expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some basic concepts in quantum information, incl…
▽ More
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and greatly expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some basic concepts in quantum information, including quantum bits, complementarity, the no-cloning principle, and entanglement. Following Jacob's quantum candies description of the well-known quantum key distribution protocol BB84, we explicitly demonstrate additional quantum cryptography protocols and quantum communication protocols, using generalized quantum candies (including correlated pairs of qandies). These demonstrations are done in an approachable manner, that can be explained to high-school students, without using the hard-to-grasp concept of superpositions and its mathematics. The intuitive model we investigate has a fascinating overlap with some of the most basic features of quantum theory. Hence, it can be a valuable tool for science and engineering educators who would like to help the general public to gain more insights into quantum science and technology. For the experts, the model we present, due to not employing quantum superpositions, enables - in some sense - extending far beyond quantum theory. Most remarkably, "quantum" candies of some unique type can be defined, such that non-local boxes (of the Popescu-Rohrlich type) as well as regular (correlated) quantum candies can be generated by a single `"quantum" candies machine.
△ Less
Submitted 20 November, 2021; v1 submitted 30 September, 2021;
originally announced October 2021.
-
Security Proof Against Collective Attacks for an Experimentally Feasible Semiquantum Key Distribution Protocol
Authors:
Walter O. Krawec,
Rotem Liss,
Tal Mor
Abstract:
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQ…
▽ More
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQKD protocol overcoming those drawbacks. The Mirror protocol was proven robust (namely, it was proven secure against a limited class of attacks including all noiseless attacks), but its security in case some noise is allowed (natural or due to eavesdrop**) has not been proved yet. Here we prove security of the Mirror protocol against a wide class of quantum attacks (the "collective attacks"), and we evaluate the allowed noise threshold and the resulting key rate.
△ Less
Submitted 3 July, 2023; v1 submitted 3 December, 2020;
originally announced December 2020.
-
Quantum Candies and Quantum Cryptography
Authors:
Junan Lin,
Tal Mor
Abstract:
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some basic concepts in quantum information, includi…
▽ More
The field of quantum information is becoming more known to the general public. However, effectively demonstrating the concepts underneath quantum science and technology to the general public can be a challenging job. We investigate, extend, and much expand here "quantum candies" (invented by Jacobs), a pedagogical model for intuitively describing some basic concepts in quantum information, including quantum bits, complementarity, the no-cloning principle, and entanglement. Following Jacob's quantum candies description of the well known quantum key distribution protocol BB84, we explicitly demonstrate various additional quantum cryptography protocols using quantum candies in an approachable manner. The model we investigate can be a valuable tool for science and engineering educators who would like to help the general public to gain more insights about quantum science and technology: most parts of this paper, including many protocols for quantum cryptography, are expected to be easily understandable by a layperson without any previous knowledge of mathematics, physics, or cryptography.
△ Less
Submitted 3 November, 2020;
originally announced November 2020.
-
Quantum Communication -- Celebrating the Silver Jubilee of Teleportation
Authors:
Rotem Liss,
Tal Mor
Abstract:
This is an editorial paper presenting the meaning, history, and influence of quantum teleportation.
This is an editorial paper presenting the meaning, history, and influence of quantum teleportation.
△ Less
Submitted 4 November, 2020;
originally announced November 2020.
-
From Practice to Theory: The "Bright Illumination" Attack on Quantum Key Distribution Systems
Authors:
Rotem Liss,
Tal Mor
Abstract:
The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-689 (2010)] is a practical attack, fully implementable against quantum key distribution systems. In contrast to almost all developments in quantum information processing (for example, Shor's factorization algorithm, quantum teleportation, Bennett-Brassard (BB84) quantum key distribution, the "Photon-Number Splitting" attack, an…
▽ More
The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-689 (2010)] is a practical attack, fully implementable against quantum key distribution systems. In contrast to almost all developments in quantum information processing (for example, Shor's factorization algorithm, quantum teleportation, Bennett-Brassard (BB84) quantum key distribution, the "Photon-Number Splitting" attack, and many other examples), for which theory has been proposed decades before a proper implementation, the "Bright Illumination" attack preceded any sign or hint of a theoretical prediction. Here we explain how the "Reversed-Space" methodology of attacks, complementary to the notion of "quantum side-channel attacks" (which is analogous to a similar term in "classical" - namely, non-quantum - computer security), has missed the opportunity of predicting the "Bright Illumination" attack.
△ Less
Submitted 4 November, 2020;
originally announced November 2020.
-
Topological order on the Bloch sphere
Authors:
Rotem Liss,
Tal Mor,
Roman Orus
Abstract:
A Bloch sphere is the geometrical representation of an arbitrary two-dimensional Hilbert space. Possible classes of entanglement and separability for the pure and mixed states on the Bloch sphere were suggested by [M. Boyer, R. Liss, T. Mor, PRA 95, 032308 (2017)]. Here we construct a Bloch sphere for the Hilbert space spanned by one of the ground states of Kitaev's toric code model and one of its…
▽ More
A Bloch sphere is the geometrical representation of an arbitrary two-dimensional Hilbert space. Possible classes of entanglement and separability for the pure and mixed states on the Bloch sphere were suggested by [M. Boyer, R. Liss, T. Mor, PRA 95, 032308 (2017)]. Here we construct a Bloch sphere for the Hilbert space spanned by one of the ground states of Kitaev's toric code model and one of its closest product states. We prove that this sphere contains only one separable state, thus belonging to the fourth class suggested by the said paper. We furthermore study the topological order of the pure states on its surface and conclude that, according to conventional definitions, only one state (the toric code ground state) seems to present non-trivial topological order. We conjecture that most of the states on this Bloch sphere are neither ``trivial'' states (namely, they cannot be generated from a product state using a trivial circuit) nor topologically ordered. In addition, we show that the whole setting can be understood in terms of Grover rotations with gauge symmetry, akin to the quantum search algorithm.
△ Less
Submitted 29 March, 2020; v1 submitted 3 December, 2018;
originally announced December 2018.
-
Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, "classical Alice with a controllable mirror" (the "Mirror protocol"), has recently been presented and prov…
▽ More
A semiquantum key distribution (SQKD) protocol makes it possible for a quantum party and a classical party to generate a secret shared key. However, many existing SQKD protocols are not experimentally feasible in a secure way using current technology. An experimentally feasible SQKD protocol, "classical Alice with a controllable mirror" (the "Mirror protocol"), has recently been presented and proved completely robust, but it is more complicated than other SQKD protocols. Here we prove a simpler variant of the Mirror protocol (the "simplified Mirror protocol") to be completely non-robust by presenting two possible attacks against it. Our results show that the complexity of the Mirror protocol is at least partly necessary for achieving robustness.
△ Less
Submitted 18 July, 2018; v1 submitted 16 June, 2018;
originally announced June 2018.
-
Automated soft tissue lesion detection and segmentation in digital mammography using a u-net deep learning network
Authors:
Timothy de Moor,
Alejandro Rodriguez-Ruiz,
Albert Gubern Mérida,
Ritse Mann,
Jonas Teuwen
Abstract:
Computer-aided detection or decision support systems aim to improve breast cancer screening programs by hel** radiologists to evaluate digital mammography (DM) exams. Commonly such methods proceed in two steps: selection of candidate regions for malignancy, and later classification as either malignant or not. In this study, we present a candidate detection method based on deep learning to automa…
▽ More
Computer-aided detection or decision support systems aim to improve breast cancer screening programs by hel** radiologists to evaluate digital mammography (DM) exams. Commonly such methods proceed in two steps: selection of candidate regions for malignancy, and later classification as either malignant or not. In this study, we present a candidate detection method based on deep learning to automatically detect and additionally segment soft tissue lesions in DM. A database of DM exams (mostly bilateral and two views) was collected from our institutional archive. In total, 7196 DM exams (28294 DM images) acquired with systems from three different vendors (General Electric, Siemens, Hologic) were collected, of which 2883 contained malignant lesions verified with histopathology. Data was randomly split on an exam level into training (50\%), validation (10\%) and testing (40\%) of deep neural network with u-net architecture. The u-net classifies the image but also provides lesion segmentation. Free receiver operating characteristic (FROC) analysis was used to evaluate the model, on an image and on an exam level. On an image level, a maximum sensitivity of 0.94 at 7.93 false positives (FP) per image was achieved. Similarly, per exam a maximum sensitivity of 0.98 at 7.81 FP per image was achieved. In conclusion, the method could be used as a candidate selection model with high accuracy and with the additional information of lesion segmentation.
△ Less
Submitted 8 March, 2018; v1 submitted 19 February, 2018;
originally announced February 2018.
-
Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: collective attacks and joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z…
▽ More
Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: collective attacks and joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous paper (Boyer, Gelles, and Mor, 2009), but it avoids a classical information-theoretical analysis and proves a fully composable security. We show that this modified BB84 protocol is as secure against collective attacks as the original BB84 protocol, and that it requires more bits for testing.
△ Less
Submitted 19 November, 2019; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous pap…
▽ More
The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous paper (Boyer, Gelles, and Mor, 2009), but it avoids the classical information-theoretical analysis that caused problems with composability. We show that this modified BB84 protocol is as secure against collective attacks as the original BB84 protocol, and that it requires more bits for testing.
△ Less
Submitted 5 April, 2017;
originally announced April 2017.
-
Heat-Bath Algorithmic Cooling with correlated qubit-environment interactions
Authors:
Nayeli A. Rodriguez-Briones,
Jun Li,
Xinhua Peng,
Tal Mor,
Yossi Weinstein,
Raymond Laflamme
Abstract:
Controlled preparation of highly pure quantum states is at the core of practical applications of quantum information science, from the state initialization of most quantum algorithms to a reliable supply of ancilla qubits that satisfy the fault-tolerance threshold for quantum error correction. Heat-bath algorithmic cooling has been shown to purify qubits by controlled redistribution of entropy and…
▽ More
Controlled preparation of highly pure quantum states is at the core of practical applications of quantum information science, from the state initialization of most quantum algorithms to a reliable supply of ancilla qubits that satisfy the fault-tolerance threshold for quantum error correction. Heat-bath algorithmic cooling has been shown to purify qubits by controlled redistribution of entropy and multiple contact with a bath, not only for ensemble implementations but also for technologies with strong but imperfect measurements. However, an implicit restriction about the interaction with the bath has been assumed in previous work. In this paper, we show that better purification can be achieved by removing that restriction. More concretely, we include correlations between the system and the bath, and we take advantage of these correlations to pump entropy out of the system into the bath. We introduce a tool for cooling algorithms, which we call "state-reset", obtained when the coupling to the environment is generalized from individual-qubits relaxation to correlated-qubit relaxation. We present improved cooling algorithms which lead to an increase of purity beyond all the previous work, and relate our results to the Nuclear Overhauser Effect.
△ Less
Submitted 8 March, 2017;
originally announced March 2017.
-
Extrapolated Quantum States, Void States, and a Huge Novel Class of Distillable Entangled States
Authors:
Michel Boyer,
Aharon Brodutch,
Tal Mor
Abstract:
A nice and interesting property of any pure tensor-product state is that each such state has distillable entangled states at an arbitrarily small distance $ε$ in its neighborhood. We say that such nearby states are $ε$-entangled, and we call the tensor product state in that case, a "boundary separable state", as there is entanglement at any distance from this "boundary". Here we find a huge class…
▽ More
A nice and interesting property of any pure tensor-product state is that each such state has distillable entangled states at an arbitrarily small distance $ε$ in its neighborhood. We say that such nearby states are $ε$-entangled, and we call the tensor product state in that case, a "boundary separable state", as there is entanglement at any distance from this "boundary". Here we find a huge class of separable states that also share that property mentioned above -- they all have $ε$-entangled states at any small distance in their neighborhood. Furthermore, the entanglement they have is proven to be distillable. We then extend this result to the discordant/classical cut and show that all classical states (correlated and uncorrelated) have discordant states at distance $ε$, and provide a constructive method for finding $ε$-discordant states.
△ Less
Submitted 26 January, 2017;
originally announced January 2017.
-
Experimentally feasible protocol for semiquantum key distribution
Authors:
Michel Boyer,
Matty Katz,
Rotem Liss,
Tal Mor
Abstract:
Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum key distribution (SQKD) protocols, such as "QKD with classical Bob" and "QKD with classical Alice" (that have both been proven robust), achieve this goal even if one of the parties is classical. However, existing SQKD protocols are not experimentally feasible with current…
▽ More
Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum key distribution (SQKD) protocols, such as "QKD with classical Bob" and "QKD with classical Alice" (that have both been proven robust), achieve this goal even if one of the parties is classical. However, existing SQKD protocols are not experimentally feasible with current technology. Here we suggest a new protocol, "Classical Alice with a controllable mirror", that can be experimentally implemented with current technology (using 4-level systems instead of qubits), and we prove it to be robust.
△ Less
Submitted 29 December, 2017; v1 submitted 24 January, 2017;
originally announced January 2017.
-
Geometry of entanglement in the Bloch sphere
Authors:
Michel Boyer,
Rotem Liss,
Tal Mor
Abstract:
Entanglement is an important concept in quantum information, quantum communication, and quantum computing. We provide a geometrical analysis of entanglement and separability for all the rank-2 quantum mixed states: complete analysis for the bipartite states, and partial analysis for the multipartite states. For each rank-2 mixed state, we define its unique Bloch sphere, that is spanned by the eige…
▽ More
Entanglement is an important concept in quantum information, quantum communication, and quantum computing. We provide a geometrical analysis of entanglement and separability for all the rank-2 quantum mixed states: complete analysis for the bipartite states, and partial analysis for the multipartite states. For each rank-2 mixed state, we define its unique Bloch sphere, that is spanned by the eigenstates of its density matrix. We characterize those Bloch spheres into exactly five classes of entanglement and separability, give examples for each class, and prove that those are the only classes.
△ Less
Submitted 8 March, 2017; v1 submitted 2 August, 2016;
originally announced August 2016.
-
Entanglement and deterministic quantum computing with one qubit
Authors:
Michel Boyer,
Aharon Brodutch,
Tal Mor
Abstract:
The role of entanglement and quantum correlations in complex physical systems and quantum information processing devices has become a topic of intense study in the past two decades. In this work we present new tools for learning about entanglement and quantum correlations in dynamical systems where the quantum states are mixed and the eigenvalue spectrum is highly degenerate. We apply these result…
▽ More
The role of entanglement and quantum correlations in complex physical systems and quantum information processing devices has become a topic of intense study in the past two decades. In this work we present new tools for learning about entanglement and quantum correlations in dynamical systems where the quantum states are mixed and the eigenvalue spectrum is highly degenerate. We apply these results to the Deterministic quantum computing with one qubit (DQC1) computation model and show that the states generated in a DQC1 circuit have an eigenvalue structure that makes them difficult to entangle, even when they are relatively far from the completely mixed state. Our results strengthen the conjecture that it may be possible to find quantum algorithms that do not generate entanglement and yet still have an exponential advantage over their classical counterparts.
△ Less
Submitted 3 January, 2017; v1 submitted 16 June, 2016;
originally announced June 2016.
-
Comments on: Asymptotic Bound for Heat-Bath Algorithmic Cooling
Authors:
Nayeli Azucena Rodriguez-Briones,
Jun Li,
Xinhua Peng,
Tal Mor,
Yossi Weinstein,
Raymond Laflamme
Abstract:
In a recent paper, PRL 114 100404, 2015, Raeisi and Mosca gave a limit for cooling with Heat-Bath Algorithmic Cooling (HBAC). Here we show how to exceed that limit by having correlation in the qubits-bath interaction.
In a recent paper, PRL 114 100404, 2015, Raeisi and Mosca gave a limit for cooling with Heat-Bath Algorithmic Cooling (HBAC). Here we show how to exceed that limit by having correlation in the qubits-bath interaction.
△ Less
Submitted 16 November, 2015; v1 submitted 5 June, 2015;
originally announced June 2015.
-
Algorithmic Cooling in Liquid State NMR
Authors:
Yosi Atia,
Yuval Elias,
Tal Mor,
Yossi Weinstein
Abstract:
Algorithmic cooling is a method that employs thermalization to increase qubit purification level, namely it reduces the qubit-system's entropy. We utilized gradient ascent pulse engineering (GRAPE), an optimal control algorithm, to implement algorithmic cooling in liquid state nuclear magnetic resonance. Various cooling algorithms were applied onto the three qubits of $^{13}$C$_2$-trichloroethylen…
▽ More
Algorithmic cooling is a method that employs thermalization to increase qubit purification level, namely it reduces the qubit-system's entropy. We utilized gradient ascent pulse engineering (GRAPE), an optimal control algorithm, to implement algorithmic cooling in liquid state nuclear magnetic resonance. Various cooling algorithms were applied onto the three qubits of $^{13}$C$_2$-trichloroethylene, cooling the system beyond Shannon's entropy bound in several different ways. In particular, in one experiment a carbon qubit was cooled by a factor of 4.61. This work is a step towards potentially integrating tools of NMR quantum computing into in vivo magnetic resonance spectroscopy.
△ Less
Submitted 8 November, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
Experimental Heat-Bath Cooling of Spins
Authors:
Gilles Brassard,
Yuval Elias,
José M. Fernandez,
Haggai Gilboa,
Jonathan A. Jones,
Tal Mor,
Yossi Weinstein,
Li Xiao
Abstract:
Algorithmic cooling (AC) is a method to purify quantum systems, such as ensembles of nuclear spins, or cold atoms in an optical lattice. When applied to spins, AC produces ensembles of highly polarized spins, which enhance the signal strength in nuclear magnetic resonance (NMR). According to this cooling approach, spin-half nuclei in a constant magnetic field are considered as bits, or more precis…
▽ More
Algorithmic cooling (AC) is a method to purify quantum systems, such as ensembles of nuclear spins, or cold atoms in an optical lattice. When applied to spins, AC produces ensembles of highly polarized spins, which enhance the signal strength in nuclear magnetic resonance (NMR). According to this cooling approach, spin-half nuclei in a constant magnetic field are considered as bits, or more precisely, quantum bits, in a known probability distribution. Algorithmic steps on these bits are then translated into specially designed NMR pulse sequences using common NMR quantum computation tools. The $algorithmic$ cooling of spins is achieved by alternately combining reversible, entropy-preserving manipulations (borrowed from data compression algorithms) with $selective$ $reset$, the transfer of entropy from selected spins to the environment. In theory, applying algorithmic cooling to sufficiently large spin systems may produce polarizations far beyond the limits due to conservation of Shannon entropy.
Here, only selective reset steps are performed, hence we prefer to call this process "heat-bath" cooling, rather than algorithmic cooling. We experimentally implement here two consecutive steps of selective reset that transfer entropy from two selected spins to the environment. We performed such cooling experiments with commercially-available labeled molecules, on standard liquid-state NMR spectrometers. Our experiments yielded polarizations that $bypass$ $Shannon's$ $entropy$-$conservation$ $bound$, so that the entire spin-system was cooled. This paper was initially submitted in 2005, first to Science and then to PNAS, and includes additional results from subsequent years (e.g. for resubmission in 2007). The Postscriptum includes more details.
△ Less
Submitted 28 April, 2014;
originally announced April 2014.
-
Prospects and Limitations of Algorithmic Cooling
Authors:
Gilles Brassard,
Yuval Elias,
Tal Mor,
Yossi Weinstein
Abstract:
Heat-bath algorithmic cooling (AC) of spins is a theoretically powerful effective cooling approach, that (ideally) cools spins with low polarization exponentially better than cooling by reversible entropy manipulations alone. Here, we investigate the limitations and prospects of AC. For non-ideal and semioptimal AC, we study the impact of finite relaxation times of reset and computation spins on t…
▽ More
Heat-bath algorithmic cooling (AC) of spins is a theoretically powerful effective cooling approach, that (ideally) cools spins with low polarization exponentially better than cooling by reversible entropy manipulations alone. Here, we investigate the limitations and prospects of AC. For non-ideal and semioptimal AC, we study the impact of finite relaxation times of reset and computation spins on the achievable effective cooling. We derive, via simulations, the attainable cooling levels for given ratios of relaxation times using two semioptimal practicable algorithms. We expect this analysis to be valuable for the planning of future experiments. For ideal and optimal AC, we make use of lower bounds on the number of required reset steps, based on entropy considerations, to present important consequences of using AC as a tool for improving signal-to-noise ratio in liquid-state magnetic resonance spectroscopy. We discuss the potential use of AC for noninvasive clinical diagnosis and drug monitoring, where it may have significantly lower specific absorption rate (SAR) with respect to currently used methods.
△ Less
Submitted 27 April, 2014;
originally announced April 2014.
-
Attacks on Fixed Apparatus Quantum Key Distribution Schemes
Authors:
Michel Boyer,
Ran Gelles,
Tal Mor
Abstract:
We consider quantum key distribution implementations in which the receiver's apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver's equipment. The attack we presen…
▽ More
We consider quantum key distribution implementations in which the receiver's apparatus is fixed and does not depend on his choice of basis at each qubit transmission. We show that, although theoretical quantum key distribution is proven secure, such implementations are totally insecure against a strong eavesdropper that has one-time (single) access to the receiver's equipment. The attack we present here, the "fixed-apparatus attack" causes a potential risk to the usefulness of several recent implementations.
△ Less
Submitted 3 December, 2013;
originally announced December 2013.
-
Quantum Computing Gates via Optimal Control
Authors:
Yosi Atia,
Yuval Elias,
Tal Mor,
Yossi Weinstein
Abstract:
We demonstrate the use of optimal control to design two entropy-manipulating quantum gates which are more complex than the corresponding, commonly used, gates, such as CNOT and Toffoli (CCNOT): A 2-qubit gate called PE (polarization exchange) and a 3-qubit gate called COMP (polarization compression) were designed using GRAPE, an optimal control algorithm. Both gates were designed for a three-spin…
▽ More
We demonstrate the use of optimal control to design two entropy-manipulating quantum gates which are more complex than the corresponding, commonly used, gates, such as CNOT and Toffoli (CCNOT): A 2-qubit gate called PE (polarization exchange) and a 3-qubit gate called COMP (polarization compression) were designed using GRAPE, an optimal control algorithm. Both gates were designed for a three-spin system. Our design provided efficient and robust NMR radio frequency (RF) pulses for 13C2-trichloroethylene (TCE), our chosen three-spin system. We then experimentally applied these two quantum gates onto TCE at the NMR lab. Such design of these gates and others could be relevant for near-future applications of quantum computing devices.
△ Less
Submitted 1 September, 2013; v1 submitted 21 August, 2013;
originally announced August 2013.
-
Reversed Space Attacks
Authors:
Ran Gelles,
Tal Mor
Abstract:
Many quantum key distribution (QKD) schemes are based on sending and measuring qubits -- two-dimensional quantum systems. Yet, in practical realizations and experiments, the measuring devices at the receiver's (Bob) site commonly do not measure a two-dimensional system but rather a quantum space of a larger dimension. Such an enlargement sometimes results from imperfect devices. However, in variou…
▽ More
Many quantum key distribution (QKD) schemes are based on sending and measuring qubits -- two-dimensional quantum systems. Yet, in practical realizations and experiments, the measuring devices at the receiver's (Bob) site commonly do not measure a two-dimensional system but rather a quantum space of a larger dimension. Such an enlargement sometimes results from imperfect devices. However, in various QKD protocols such enlargement exists even in the ideal scenario when all devices are assumed to be perfect. This issue is common, for instance, in QKD schemes implemented via photons, where the parties' devices are based on Mach-Zehnder interferometers, as these inherently enlarge the quantum space in use.
We show how space enlargement at Bob's site exposes the implemented protocol to new kinds of attacks, attacks that have not yet been explicitly pinpointed nor rigorously analyzed. We name these the "reversed space attacks". A key insight in formalizing our attacks, is the idea of taking all states defining Bob's (large) measured space and reversing them in time in order to identify precisely the space that an eavesdropper may attack. We employ such attacks on two variants of intereferometric-based QKD recently experimented by several groups, and show how to get full information on the qubit sent by Alice, while inducing no errors at all. The technique we develop here has subsequently been used in a closely related work (Boyer, Gelles, and Mor, Physical Review A, 2014) to demonstrate a (weaker variant of) reversed-space attack on both interferometric-based and polarization-based QKD.
△ Less
Submitted 20 May, 2016; v1 submitted 29 October, 2011;
originally announced October 2011.
-
Semi-optimal Practicable Algorithmic Cooling
Authors:
Yuval Elias,
Tal Mor,
Yossi Weinstein
Abstract:
Algorithmic Cooling (AC) of spins applies entropy manipulation algorithms in open spin-systems in order to cool spins far beyond Shannon's entropy bound. AC of nuclear spins was demonstrated experimentally, and may contribute to nuclear magnetic resonance (NMR) spectroscopy. Several cooling algorithms were suggested in recent years, including practicable algorithmic cooling (PAC) and exhaustive AC…
▽ More
Algorithmic Cooling (AC) of spins applies entropy manipulation algorithms in open spin-systems in order to cool spins far beyond Shannon's entropy bound. AC of nuclear spins was demonstrated experimentally, and may contribute to nuclear magnetic resonance (NMR) spectroscopy. Several cooling algorithms were suggested in recent years, including practicable algorithmic cooling (PAC) and exhaustive AC. Practicable algorithms have simple implementations, yet their level of cooling is far from optimal; Exhaustive algorithms, on the other hand, cool much better, and some even reach (asymptotically) an optimal level of cooling, but they are not practicable. We introduce here semi-optimal practicable AC (SOPAC), wherein few cycles (typically 2-6) are performed at each recursive level. Two classes of SOPAC algorithms are proposed and analyzed. Both attain cooling levels significantly better than PAC, and are much more efficient than the exhaustive algorithms. The new algorithms are shown to bridge the gap between PAC and exhaustive AC. In addition, we calculated the number of spins required by SOPAC in order to purify qubits for quantum computation. As few as 12 and 7 spins are required (in an ideal scenario) to yield a mildly pure spin (60% polarized) from initial polarizations of 1% and 10%, respectively. In the latter case, about five more spins are sufficient to produce a highly pure spin (99.99% polarized), which could be relevant for fault-tolerant quantum computing.
△ Less
Submitted 26 October, 2011;
originally announced October 2011.
-
Heat-Bath Cooling of Spins in Two Amino Acids
Authors:
Yuval Elias,
Haggai Gilboa,
Tal Mor,
Yossi Weinstein
Abstract:
Heat-bath cooling is a component of practicable algorithmic cooling of spins, an approach which might be useful for in vivo 13C spectroscopy, in particular for prolonged metabolic processes where substrates that are hyperpolarized ex-vivo are not effective. We applied heat-bath cooling to 1,2-13C2-amino acids, using the alpha protons to shift entropy from selected carbons to the environment. For g…
▽ More
Heat-bath cooling is a component of practicable algorithmic cooling of spins, an approach which might be useful for in vivo 13C spectroscopy, in particular for prolonged metabolic processes where substrates that are hyperpolarized ex-vivo are not effective. We applied heat-bath cooling to 1,2-13C2-amino acids, using the alpha protons to shift entropy from selected carbons to the environment. For glutamate and glycine, both carbons were cooled by about 2.5-fold, and in other experiments the polarization of C1 nearly doubled while all other spins had equilibrium polarization, indicating reduction in total entropy. The effect of adding Magnevist, a gadolinium contrast agent, on heat-bath cooling of glutamate was investigated.
△ Less
Submitted 26 October, 2011; v1 submitted 25 August, 2011;
originally announced August 2011.
-
On the Robustness of (Photonic) Quantum Key Distribution with Classical Alice
Authors:
Michel Boyer,
Tal Mor
Abstract:
Quantum Key Distribution (QKD) with classical Bob has recently been suggested and proven robust. Following this work, QKD with classical Alice was also suggested and proven robust. The above protocols are ideal in the sense that they make use of qubits. However, in the past, well-known QKD protocols that were proven robust and even proven unconditionally secure, when qubits are used, were found to…
▽ More
Quantum Key Distribution (QKD) with classical Bob has recently been suggested and proven robust. Following this work, QKD with classical Alice was also suggested and proven robust. The above protocols are ideal in the sense that they make use of qubits. However, in the past, well-known QKD protocols that were proven robust and even proven unconditionally secure, when qubits are used, were found to be totally insecure when photons are used. This is due to sensitivity to photon losses (e.g., Bennett's two-state protocol) or sensitivity to losses combined with multi-photon states (e.g., the photon-number-splitting attack on the weak-pulse Bennett-Brassard protocol, BB84). Here we prove that QKD with classical Alice is still robust when photon losses and even multi-photon states are taken into account.
△ Less
Submitted 13 December, 2010; v1 submitted 10 December, 2010;
originally announced December 2010.
-
Comment on "Semiquantum-key distribution using less than four quantum states"
Authors:
Michel Boyer,
Tal Mor
Abstract:
Comment on Phys. Rev. A 79, 052312 (2009), http://pra.aps.org/abstract/PRA/v79/i5/e052312
Comment on Phys. Rev. A 79, 052312 (2009), http://pra.aps.org/abstract/PRA/v79/i5/e052312
△ Less
Submitted 30 October, 2010; v1 submitted 11 October, 2010;
originally announced October 2010.
-
Semi-Quantum Key Distribution
Authors:
Michel Boyer,
Ran Gelles,
Dan Kenigsberg,
Tal Mor
Abstract:
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob)…
▽ More
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob) has only classical capabilities? Recently, a semi-quantum key distribution protocol was presented (Boyer, Kenigsberg and Mor, Physical Review Letters, 2007), in which one of the parties (Bob) is classical, and yet, the protocol is proven to be completely robust against an eavesdrop** attempt.
Here we extend that result much further. We present two protocols with this constraint, and prove their robustness against attacks: we prove that any attempt of an adversary to obtain information (and even a tiny amount of information) necessarily induces some errors that the legitimate parties could notice. One protocol presented here is identical to the one referred to above, however, its robustness is proven here in a much more general scenario. The other protocol is very different as it is based on randomization.
△ Less
Submitted 28 December, 2008;
originally announced December 2008.
-
Quantum-Space Attacks
Authors:
Ran Gelles,
Tal Mor
Abstract:
Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security ca…
▽ More
Theoretical quantum key distribution (QKD) protocols commonly rely on the use of qubits (quantum bits). In reality, however, due to practical limitations, the legitimate users are forced to employ a larger quantum (Hilbert) space, say a quhexit (quantum six-dimensional) space, or even a much larger quantum Hilbert space. Various specific attacks exploit of these limitations. Although security can still be proved in some very special cases, a general framework that considers such realistic QKD protocols, as well as} attacks on such protocols, is still missing.
We describe a general method of attacking realistic QKD protocols, which we call the `quantum-space attack'. The description is based on assessing the enlarged quantum space actually used by a protocol, the `quantum space of the protocol'. We demonstrate these new methods by classifying various (known) recent attacks against several QKD schemes, and by analyzing a novel attack on interferometry-based QKD.
△ Less
Submitted 25 November, 2007; v1 submitted 19 November, 2007;
originally announced November 2007.
-
Optimal Algorithmic Cooling of Spins
Authors:
Yuval Elias,
José M. Fernandez,
Tal Mor,
Yossi Weinstein
Abstract:
Algorithmic Cooling (AC) of Spins is potentially the first near-future application of quantum computing devices. Straightforward quantum algorithms combined with novel entropy manipulations can result in a method to improve the identification of molecules. We introduce here several new exhaustive cooling algorithms, such as the Tribonacci and k-bonacci algorithms. In particular, we present the `…
▽ More
Algorithmic Cooling (AC) of Spins is potentially the first near-future application of quantum computing devices. Straightforward quantum algorithms combined with novel entropy manipulations can result in a method to improve the identification of molecules. We introduce here several new exhaustive cooling algorithms, such as the Tribonacci and k-bonacci algorithms. In particular, we present the ``all-bonacci'' algorithm, which appears to reach the maximal degree of cooling obtainable by the optimal AC approach.
△ Less
Submitted 19 November, 2007;
originally announced November 2007.
-
Quantum Key Distribution with Classical Bob
Authors:
Michel Boyer,
Dan Kenigsberg,
Tal Mor
Abstract:
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum.
What is possible when only one party (Alice) is quantum, yet the other (Bo…
▽ More
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum.
What is possible when only one party (Alice) is quantum, yet the other (Bob) has only classical capabilities? We present a protocol with this constraint, and prove its robustness against attacks: we prove that any attempt of an adversary to obtain information (and even a tiny amount of information) necessarily induces some errors that the legitimate users could notice.
△ Less
Submitted 13 March, 2007;
originally announced March 2007.
-
"Quantumness" versus "Classicality" of Quantum States
Authors:
Berry Groisman,
Dan Kenigsberg,
Tal Mor
Abstract:
Entanglement is one of the pillars of quantum mechanics and quantum information processing, and as a result the quantumness of nonentangled states has typically been overlooked and unrecognized. We give a robust definition for the classicality versus quantumness of a single multipartite quantum state, a set of states, and a protocol using quantum states. We show a variety of nonentangled (separa…
▽ More
Entanglement is one of the pillars of quantum mechanics and quantum information processing, and as a result the quantumness of nonentangled states has typically been overlooked and unrecognized. We give a robust definition for the classicality versus quantumness of a single multipartite quantum state, a set of states, and a protocol using quantum states. We show a variety of nonentangled (separable) states that exhibit interesting quantum properties, and we explore the ``zoo'' of separable states; several interesting subclasses are defined based on their diagonalizing bases, and their non-classical behavior is investigated.
△ Less
Submitted 13 March, 2007;
originally announced March 2007.
-
Secure Controlled Teleportation
Authors:
Dan Kenigsberg,
Tal Mor
Abstract:
Several protocols for controlled teleportation were suggested by Yang, Chu, and Han [PRA 70, 022329 (2004)]. In these protocols, Alice teleports qubits (in an unknown state) to Bob iff a controller allows it. We view this problem in the perspective of secure multi-party quantum computation. We show that the suggested entanglement-efficient protocols for $m$-qubit controlled teleportation are ope…
▽ More
Several protocols for controlled teleportation were suggested by Yang, Chu, and Han [PRA 70, 022329 (2004)]. In these protocols, Alice teleports qubits (in an unknown state) to Bob iff a controller allows it. We view this problem in the perspective of secure multi-party quantum computation. We show that the suggested entanglement-efficient protocols for $m$-qubit controlled teleportation are open to cheating; Alice and Bob may teleport $(m-1)$-qubits of quantum information, out of the controllers' control. We conjecture that the straightforward protocol for controlled teleportation, which requires each controller to hold $m$ entangled qubits, is optimal. We prove this conjecture for a limited, but interesting, subset of protocols.
△ Less
Submitted 4 September, 2006;
originally announced September 2006.
-
Methods for scalable optical quantum computation
Authors:
Tal Mor,
Nadav Yoran
Abstract:
We propose a scalable method for implementing linear optics quantum computation using the ``linked-state'' approach. Our method avoids the two-dimensional spread of errors occurring in the preparation of the linked-state. Consequently, a proof is given for the scalability of this modified linked-state model, and an exact expression for the efficiency of the method is obtained. Moreover, a consid…
▽ More
We propose a scalable method for implementing linear optics quantum computation using the ``linked-state'' approach. Our method avoids the two-dimensional spread of errors occurring in the preparation of the linked-state. Consequently, a proof is given for the scalability of this modified linked-state model, and an exact expression for the efficiency of the method is obtained. Moreover, a considerable improvement in the efficiency, relative to the original linked-state method, is achieved. The proposed method is applicable to Nielsen's optical ``cluster-state'' approach as well.
△ Less
Submitted 14 March, 2006;
originally announced March 2006.
-
Quantum Advantage without Entanglement
Authors:
Dan Kenigsberg,
Tal Mor,
Gil Ratsaby
Abstract:
We study the advantage of pure-state quantum computation without entanglement over classical computation. For the Deutsch-Jozsa algorithm we present the maximal subproblem that can be solved without entanglement, and show that the algorithm still has an advantage over the classical ones. We further show that this subproblem is of greater significance, by proving that it contains all the Boolean…
▽ More
We study the advantage of pure-state quantum computation without entanglement over classical computation. For the Deutsch-Jozsa algorithm we present the maximal subproblem that can be solved without entanglement, and show that the algorithm still has an advantage over the classical ones. We further show that this subproblem is of greater significance, by proving that it contains all the Boolean functions whose quantum phase-oracle is non-entangling. For Simon's and Grover's algorithms we provide simple proofs that no non-trivial subproblems can be solved by these algorithms without entanglement.
△ Less
Submitted 30 November, 2005;
originally announced November 2005.
-
A Proof of the Security of Quantum Key Distribution
Authors:
Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury
Abstract:
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.
△ Less
Submitted 17 November, 2005;
originally announced November 2005.
-
On Classical Teleportation and Classical Nonlocality
Authors:
Tal Mor
Abstract:
An interesting protocol for classical teleportation of an unknown classical state was recently suggested by Cohen, and by Gour and Meyer. In that protocol, Bob can sample from a probability distribution P that is given to Alice, even if Alice has absolutely no knowledge about P. Pursuing a similar line of thought, we suggest here a limited form of nonlocality - "classical nonlocality". Our nonlo…
▽ More
An interesting protocol for classical teleportation of an unknown classical state was recently suggested by Cohen, and by Gour and Meyer. In that protocol, Bob can sample from a probability distribution P that is given to Alice, even if Alice has absolutely no knowledge about P. Pursuing a similar line of thought, we suggest here a limited form of nonlocality - "classical nonlocality". Our nonlocality is the (somewhat limited) classical analogue of the Hughston-Jozsa-Wootters (HJW) quantum nonlocality. The HJW nonlocality tells us how, for a given density matrix rho, Alice can generate any rho-ensemble on the North Star. This is done using surprisingly few resources - one shared entangled state (prepared in advance), one generalized quantum measurement, and no communication. Similarly, our classical nonlocality presents how, for a given probability distribution P, Alice can generate any P-ensemble on the North Star, using only one correlated state (prepared in advance), one (generalized) classical measurement, and no communication.
It is important to clarify that while the classical teleportation and the classical non-locality protocols are probably rather insignificant from a classical information processing point of view, they significantly contribute to our understanding of what exactly is quantum in their well established and highly famous quantum analogues.
△ Less
Submitted 13 March, 2007; v1 submitted 17 November, 2005;
originally announced November 2005.
-
Experimental Heat-Bath Cooling of Spins
Authors:
Gilles Brassard,
Yuval Elias,
Jose M. Fernandez,
Haggai Gilboa,
Jonathan A. Jones,
Tal Mor,
Yossi Weinstein,
Li Xiao
Abstract:
Algorithmic cooling is a novel technique to generate ensembles of highly polarized spins, which could significantly improve the signal strength in Nuclear Magnetic Resonance (NMR) spectroscopy. It combines reversible (entropy-preserving) manipulations and irreversible controlled interactions with the environment, using simple quantum computing techniques to increase spin polarization far beyond…
▽ More
Algorithmic cooling is a novel technique to generate ensembles of highly polarized spins, which could significantly improve the signal strength in Nuclear Magnetic Resonance (NMR) spectroscopy. It combines reversible (entropy-preserving) manipulations and irreversible controlled interactions with the environment, using simple quantum computing techniques to increase spin polarization far beyond the Shannon entropy-conservation bound. Notably, thermalization is beneficially employed as an integral part of the cooling scheme, contrary to its ordinary destructive implications. We report the first cooling experiments bypassing Shannon's entropy-conservation bound, performed on a standard liquid-state NMR spectrometer. We believe that this experimental success could pave the way for the first near-future application of quantum computing devices.
△ Less
Submitted 16 November, 2005;
originally announced November 2005.
-
Paramagnetic Materials and Practical Algorithmic Cooling for NMR Quantum Computing
Authors:
Jose M. Fernandez,
Tal Mor,
Yossi Weinstein
Abstract:
Algorithmic Cooling is a method that uses novel data compression techniques and simplecquantum computing devices to improve NMR spectroscopy, and to offer scalable NMR quantum computers. The algorithm recursively employs two steps. A reversible entropy compression of the computation quantum-bits (qubits) of the system and an irreversible heat transfer from the system to the environment through a…
▽ More
Algorithmic Cooling is a method that uses novel data compression techniques and simplecquantum computing devices to improve NMR spectroscopy, and to offer scalable NMR quantum computers. The algorithm recursively employs two steps. A reversible entropy compression of the computation quantum-bits (qubits) of the system and an irreversible heat transfer from the system to the environment through a set of reset qubits that reach thermal relaxation rapidly.
Is it possible to experimentally demonstrate algorithmic cooling using existing technology? To allow experimental algorithmic cooling, the thermalization time of the reset qubits must be much shorter than the thermalization time of the computation qubits. However such thermalization-times ratios have yet to be reported.
We investigate here the effect of a paramagnetic salt on the thermalization-times ratio of computation qubits (carbons) and a reset qubit (hydrogen). We show that the thermalization-times ratio is improved by approximately three-fold. Based on this result, an experimental demonstration of algorithmic cooling by thermalization and magnetic ions is currently performed by our group and collaborators.
△ Less
Submitted 16 November, 2005;
originally announced November 2005.
-
Algorithmic Cooling of Spins: A Practicable Method for Increasing Polarization
Authors:
Jose M. Fernandez,
Seth Lloyd,
Tal Mor,
Vwani Roychowdhury
Abstract:
An efficient technique to generate ensembles of spins that are highly polarized by external magnetic fields is the Holy Grail in Nuclear Magnetic Resonance (NMR) spectroscopy. Since spin-half nuclei have steady-state polarization biases that increase inversely with temperature, spins exhibiting high polarization biases are considered cool, even when their environment is warm. Existing spin-cooli…
▽ More
An efficient technique to generate ensembles of spins that are highly polarized by external magnetic fields is the Holy Grail in Nuclear Magnetic Resonance (NMR) spectroscopy. Since spin-half nuclei have steady-state polarization biases that increase inversely with temperature, spins exhibiting high polarization biases are considered cool, even when their environment is warm. Existing spin-cooling techniques are highly limited in their efficiency and usefulness. Algorithmic cooling is a promising new spin-cooling approach that employs data compression methods in open systems. It reduces the entropy of spins on long molecules to a point far beyond Shannon's bound on reversible entropy manipulations (an information-theoretic version of the 2nd Law of Thermodynamics), thus increasing their polarization. Here we present an efficient and experimentally feasible algorithmic cooling technique that cools spins to very low temperatures even on short molecules. This practicable algorithmic cooling could lead to breakthroughs in high-sensitivity NMR spectroscopy in the near future, and to the development of scalable NMR quantum computers in the far future. Moreover, while the cooling algorithm itself is classical, it uses quantum gates in its implementation, thus representing the first short-term application of quantum computing devices.
△ Less
Submitted 23 January, 2004; v1 submitted 21 January, 2004;
originally announced January 2004.
-
Quantum Computing Without Entanglement
Authors:
Eli Biham,
Gilles Brassard,
Dan Kenigsberg,
Tal Mor
Abstract:
It is generally believed that entanglement is essential for quantum computing. We present here a few simple examples in which quantum computing without entanglement is better than anything classically achievable, in terms of the reliability of the outcome after a xed number of oracle calls. Using a separable (that is, unentangled) n-qubit state, we show that the Deutsch-Jozsa problem and the Sim…
▽ More
It is generally believed that entanglement is essential for quantum computing. We present here a few simple examples in which quantum computing without entanglement is better than anything classically achievable, in terms of the reliability of the outcome after a xed number of oracle calls. Using a separable (that is, unentangled) n-qubit state, we show that the Deutsch-Jozsa problem and the Simon problem can be solved more reliably by a quantum computer than by the best possible classical algorithm, even probabilistic. We conclude that: (a) entanglement is not essential for quantum computing; and (b) some advantage of quantum algorithms over classical algorithms persists even when the quantum state contains an arbitrarily small amount of information|that is, even when the state is arbitrarily close to being totally mixed.
△ Less
Submitted 26 June, 2003;
originally announced June 2003.
-
Algorithmic Cooling and Scalable NMR Quantum Computers
Authors:
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury,
Farrokh Vatan,
Rutger Vrijen
Abstract:
We present here algorithmic cooling (via polarization-heat-bath)- a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, algorithmic cooling cleans dirty bits beyond the Shannon's bound on data compression, by employing a set of rapidly thermal-relaxing bits. Such auxilia…
▽ More
We present here algorithmic cooling (via polarization-heat-bath)- a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, algorithmic cooling cleans dirty bits beyond the Shannon's bound on data compression, by employing a set of rapidly thermal-relaxing bits. Such auxiliary bits could be implemented using spins that rapidly get into thermal equilibrium with the environment, e.g., electron spins.
Cooling spins to a very low temperature without cooling the environment could lead to a breakthrough in nuclear magnetic resonance experiments, and our ``spin-refrigerating'' method suggests that this is possible.
The scaling of NMR ensemble computers is probably the main obstacle to building useful quantum computing devices, and our spin-refrigerating method suggests that this problem can be resolved.
△ Less
Submitted 18 June, 2001;
originally announced June 2001.
-
A Proof of the Security of Quantum Key Distribution
Authors:
Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury
Abstract:
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.
△ Less
Submitted 10 December, 1999;
originally announced December 1999.
-
Security Aspects of Practical Quantum Cryptography
Authors:
Gilles Brassard,
Norbert Lütkenhaus,
Tal Mor,
Barry C. Sanders
Abstract:
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes can be totally insecure. We provide a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, a realistic detection process, and modifications of the ``qubits'' sent from t…
▽ More
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes can be totally insecure. We provide a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, a realistic detection process, and modifications of the ``qubits'' sent from the sender to the receiver. We first show that even quantum key distribution with perfect qubits cannot be achieved over long distances when fixed channel losses and fixed dark count errors are taken into account. Then we show that existing experimental schemes (based on ``weak-pulse'') are usually totally insecure. Finally we show that parametric downconversion offers enhanced performance compared to its weak coherent pulse counterpart.
△ Less
Submitted 12 November, 1999;
originally announced November 1999.
-
Unextendible Product Bases, Uncompletable Product Bases and Bound Entanglement
Authors:
David P. DiVincenzo,
Tal Mor,
Peter W. Shor,
John A. Smolin,
Barbara M. Terhal
Abstract:
We report new results and generalizations of our work on unextendible product bases (UPB), uncompletable product bases and bound entanglement. We present a new construction for bound entangled states based on product bases which are only completable in a locally extended Hilbert space. We introduce a very useful representation of a product basis, an orthogonality graph. Using this representation…
▽ More
We report new results and generalizations of our work on unextendible product bases (UPB), uncompletable product bases and bound entanglement. We present a new construction for bound entangled states based on product bases which are only completable in a locally extended Hilbert space. We introduce a very useful representation of a product basis, an orthogonality graph. Using this representation we give a complete characterization of unextendible product bases for two qutrits. We present several generalizations of UPBs to arbitrary high dimensions and multipartite systems. We present a sufficient condition for sets of orthogonal product states to be distinguishable by separable superoperators. We prove that bound entangled states cannot help increase the distillable entanglement of a state beyond its regularized entanglement of formation assisted by bound entanglement.
△ Less
Submitted 6 November, 2000; v1 submitted 22 August, 1999;
originally announced August 1999.
-
Algorithms on Ensemble Quantum Computers
Authors:
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury,
Farrokh Vatan
Abstract:
In ensemble (or bulk) quantum computation, measurements of qubits in an individual computer cannot be performed. Instead, only expectation values can be measured. As a result of this limitation on the model of computation, various important algorithms cannot be processed directly on such computers, and must be modified. We provide modifications of various existing protocols, including algorithms…
▽ More
In ensemble (or bulk) quantum computation, measurements of qubits in an individual computer cannot be performed. Instead, only expectation values can be measured. As a result of this limitation on the model of computation, various important algorithms cannot be processed directly on such computers, and must be modified. We provide modifications of various existing protocols, including algorithms for universal fault--tolerant computation, Shor's factorization algorithm (which can be extended to any algorithm computing an NP function), and some search algorithms to enable processing them on ensemble quantum computers.
△ Less
Submitted 21 July, 1999;
originally announced July 1999.