-
Challenges for extensions of the process matrix formalism to quantum field theory
Authors:
Nikola Paunkovic,
Marko Vo**ovic
Abstract:
We discuss the issues with tentative generalisations of the process matrix formalism from finite-dimensional mechanical systems all the way to quantum field theory. We present a detailed overview of possible open problems that arise when one attempts to move from particle ontology into the realm of field ontology, i.e., when one transitions from mechanics to field theory framework. These issues ne…
▽ More
We discuss the issues with tentative generalisations of the process matrix formalism from finite-dimensional mechanical systems all the way to quantum field theory. We present a detailed overview of possible open problems that arise when one attempts to move from particle ontology into the realm of field ontology, i.e., when one transitions from mechanics to field theory framework. These issues need to be addressed, and problems solved, if one aims to expand the scope of applicability of the process matrix formalism, and therefore its usefulness. This is far from a trivial and straightforward endeavour, but rather a task for a whole future research programme.
△ Less
Submitted 6 October, 2023;
originally announced October 2023.
-
Quantum Kolmogorov complexity and quantum correlations in deterministic-control quantum Turing machines
Authors:
Mariano Lemus,
Ricardo Faleiro,
Paulo Mateus,
Nikola Paunković,
André Souto
Abstract:
This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it…
▽ More
This work presents a study of Kolmogorov complexity for general quantum states from the perspective of deterministic-control quantum Turing Machines (dcq-TM). We extend the dcq-TM model to incorporate mixed state inputs and outputs, and define dcq-computable states as those that can be approximated by a dcq-TM. Moreover, we introduce (conditional) Kolmogorov complexity of quantum states and use it to study three particular aspects of the algorithmic information contained in a quantum state: a comparison of the information in a quantum state with that of its classical representation as an array of real numbers, an exploration of the limits of quantum state copying in the context of algorithmic complexity, and study of the complexity of correlations in quantum systems, resulting in a correlation-aware definition for algorithmic mutual information that satisfies symmetry of information property.
△ Less
Submitted 15 January, 2024; v1 submitted 23 May, 2023;
originally announced May 2023.
-
Equivalence Principle in Classical and Quantum Gravity
Authors:
Nikola Paunkovic,
Marko Vo**ovic
Abstract:
We give a general overview of various flavors of the equivalence principle in classical and quantum physics, with special emphasis on the so-called weak equivalence principle, and contrast its validity in mechanics versus field theory. We also discuss its generalisation to a theory of quantum gravity. Our analysis suggests that only the strong equivalence principle can be considered fundamental en…
▽ More
We give a general overview of various flavors of the equivalence principle in classical and quantum physics, with special emphasis on the so-called weak equivalence principle, and contrast its validity in mechanics versus field theory. We also discuss its generalisation to a theory of quantum gravity. Our analysis suggests that only the strong equivalence principle can be considered fundamental enough to be generalised to a quantum gravity context, since all other flavors of equivalence principle hold only approximately already at the classical level.
△ Less
Submitted 12 November, 2022; v1 submitted 30 September, 2022;
originally announced October 2022.
-
Operational verification of the existence of a spacetime manifold
Authors:
Nikola Paunkovic,
Marko Vo**ovic
Abstract:
We argue that there exists an operational way to establish the objective reality of the notions of space and time. Specifically, we propose a theory-independent protocol for a gedanken-experiment, whose outcome is a signal establishing the observability of the spacetime manifold, without a priori assuming its existence. The experimental signal contains the information about the dimension and the t…
▽ More
We argue that there exists an operational way to establish the objective reality of the notions of space and time. Specifically, we propose a theory-independent protocol for a gedanken-experiment, whose outcome is a signal establishing the observability of the spacetime manifold, without a priori assuming its existence. The experimental signal contains the information about the dimension and the topology of spacetime (with the currently achievable precision), and establishes its manifold structure, while respecting its underlying diffeomorphism symmetry. We also introduce and discuss appropriate criteria for the concept of emergence of spacetime, which any tentative theoretical model of physics must satisfy in order to claim that spacetime does emerge from some more fundamental concepts.
△ Less
Submitted 9 February, 2024; v1 submitted 11 September, 2022;
originally announced September 2022.
-
Information geometry of quantum critical submanifolds: relevant, marginal and irrelevant operators
Authors:
Bruno Mera,
Nikola Paunković,
Syed Tahir Amin,
Vítor R. Vieira
Abstract:
We analyze the thermodynamical limit of the quantum metric along critical submanifolds of theory space. Building upon various results previously known in the literature, we relate its singular behavior to normal directions, which are naturally associated with relevant operators in the renormalization group sense. We formulate these results in the language of information theory and differential geo…
▽ More
We analyze the thermodynamical limit of the quantum metric along critical submanifolds of theory space. Building upon various results previously known in the literature, we relate its singular behavior to normal directions, which are naturally associated with relevant operators in the renormalization group sense. We formulate these results in the language of information theory and differential geometry. We exemplify our theory through the paradigmatic examples of the XY and Haldane models, where the normal directions to the critical submanifolds are seen to be precisely those along which the metric has singular behavior, while for the tangent ones it vanishes -- these directions lie in the kernel of the metric.
△ Less
Submitted 3 October, 2022; v1 submitted 4 January, 2022;
originally announced January 2022.
-
Operational interpretation of the vacuum and process matrices for identical particles
Authors:
Ricardo Faleiro,
Nikola Paunkovic,
Marko Vo**ovic
Abstract:
This work overviews the single-particle two-way communication protocol recently introduced by del Santo and Dakić (dSD), and analyses it using the process matrix formalism. We give a detailed account of the importance and the operational meaning of the interaction of an agent with the vacuum -- in particular its role in the process matrix description. Our analysis shows that the interaction with t…
▽ More
This work overviews the single-particle two-way communication protocol recently introduced by del Santo and Dakić (dSD), and analyses it using the process matrix formalism. We give a detailed account of the importance and the operational meaning of the interaction of an agent with the vacuum -- in particular its role in the process matrix description. Our analysis shows that the interaction with the vacuum should be treated as an operation, on equal footing with all other interactions. This raises the issue of counting such operations in an operational manner. Motivated by this analysis, we apply the process matrix formalism to capped Fock spaces using the framework of second quantisation, in order to characterise protocols with an indefinite number of identical particles.
△ Less
Submitted 14 April, 2023; v1 submitted 29 October, 2020;
originally announced October 2020.
-
Interferometric geometry from symmetry-broken Uhlmann gauge group with applications to topological phase transitions
Authors:
Hector Silva,
Bruno Mera,
Nikola Paunković
Abstract:
We provide a natural generalization of a Riemannian structure, i.e., a metric, recently introduced by Sjöqvist for the space of non degenerate density matrices, to the degenerate case, i.e., the case in which the eigenspaces have dimension greater than or equal to 1. We present a physical interpretation of the metric in terms of an interferometric measurement. We apply this metric, physically inte…
▽ More
We provide a natural generalization of a Riemannian structure, i.e., a metric, recently introduced by Sjöqvist for the space of non degenerate density matrices, to the degenerate case, i.e., the case in which the eigenspaces have dimension greater than or equal to 1. We present a physical interpretation of the metric in terms of an interferometric measurement. We apply this metric, physically interpreted as an interferometric susceptibility, to the study of topological phase transitions at finite temperatures for band insulators. We compare the behaviors of this susceptibility and the one coming from the well-known Bures metric, showing them to be dramatically different. While both infer zero temperature phase transitions, only the former predicts finite temperature phase transitions as well. The difference in behaviors can be traced back to a symmetry breaking mechanism, akin to Landau-Ginzburg theory, by which the Uhlmann gauge group is broken down to a subgroup determined by the type of the system's density matrix (i.e., the ranks of its spectral projectors).
△ Less
Submitted 19 February, 2021; v1 submitted 13 October, 2020;
originally announced October 2020.
-
Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
Authors:
Mariano Lemus,
Mariana F. Ramos,
Preeti Yadav,
Nuno A. Silva,
Nelson J. Muga,
Andre Souto,
Nikola Paunkovic,
Paulo Mateus,
Armando N. Pinto
Abstract:
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments us…
▽ More
The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based only on classical cryptography is severely limited by the security and efficiency of the oblivious transfer implementation. We present a method to efficiently and securely generate and distribute oblivious keys by exchanging qubits and by performing commitments using classical hash functions. With the presented hybrid approach, quantum and classical, we obtain a practical and high-speed oblivious transfer protocol, secure even against quantum computer attacks. The oblivious distributed keys allow implementing a fast and secure oblivious transfer protocol, which can pave the way for the widespread of applications based on secure multiparty computation.
△ Less
Submitted 17 June, 2020; v1 submitted 25 September, 2019;
originally announced September 2019.
-
Experimental Semi-quantum Key Distribution With Classical Users
Authors:
Francesco Massa,
Preeti Yadav,
Amir Moqanaki,
Walter O. Krawec,
Paulo Mateus,
Nikola Paunković,
André Souto,
Philip Walther
Abstract:
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanic…
▽ More
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanics and therefore requires the users to be capable of performing quantum operations, such as state preparation or measurements in multiple bases. A natural question is whether and to what extent these requirements can be relaxed and the quantum capabilities of the users reduced. Here we demonstrate a novel quantum key distribution scheme, where users are fully classical. In our protocol, the quantum operations are performed by an untrusted third party acting as a server, which gives the users access to a superimposed single photon, and the key exchange is achieved via interaction-free measurements on the shared state. We also provide a full security proof of the protocol by computing the secret key rate in the realistic scenario of finite-resources, as well as practical experimental conditions of imperfect photon source and detectors. Our approach deepens the understanding of the fundamental principles underlying quantum key distribution and, at the same time, opens up new interesting possibilities for quantum cryptography networks
△ Less
Submitted 18 September, 2022; v1 submitted 5 August, 2019;
originally announced August 2019.
-
Causal orders, quantum circuits and spacetime: distinguishing between definite and superposed causal orders
Authors:
Nikola Paunkovic,
Marko Vo**ovic
Abstract:
We study the notion of causal orders for the cases of (classical and quantum) circuits and spacetime events. We show that every circuit can be immersed into a classical spacetime, preserving the compatibility between the two causal structures. Using the process matrix formalism, we analyse the realisations of the quantum switch using 4 and 3 spacetime events in classical spacetimes with fixed caus…
▽ More
We study the notion of causal orders for the cases of (classical and quantum) circuits and spacetime events. We show that every circuit can be immersed into a classical spacetime, preserving the compatibility between the two causal structures. Using the process matrix formalism, we analyse the realisations of the quantum switch using 4 and 3 spacetime events in classical spacetimes with fixed causal orders, and the realisation of a gravitational switch with only 2 spacetime events that features superpositions of different gravitational field configurations and their respective causal orders. We show that the current quantum switch experimental implementations do not feature superpositions of causal orders between spacetime events, and that these superpositions can only occur in the context of superposed gravitational fields. We also discuss a recently introduced operational notion of an event, which does allow for superpositions of respective causal orders in flat spacetime quantum switch implementations. We construct two observables that can distinguish between the quantum switch realisations in classical spacetimes, and gravitational switch implementations in superposed spacetimes. Finally, we discuss our results in the light of the modern relational approach to physics.
△ Less
Submitted 23 May, 2020; v1 submitted 23 May, 2019;
originally announced May 2019.
-
Information geometric analysis of long range topological superconductors
Authors:
Syed Tahir Amin,
Bruno Mera,
Nikola Paunković,
Vítor R. Vieira
Abstract:
The Uhlmann connection is a mixed state generalisation of the Berry connection. The latter has a very important role in the study of topological phases at zero temperature. Closely related, the quantum fidelity is an information theoretical quantity which is a measure of distinguishability of quantum states. Moreover, it has been extensively used in the analysis of quantum phase transitions. In th…
▽ More
The Uhlmann connection is a mixed state generalisation of the Berry connection. The latter has a very important role in the study of topological phases at zero temperature. Closely related, the quantum fidelity is an information theoretical quantity which is a measure of distinguishability of quantum states. Moreover, it has been extensively used in the analysis of quantum phase transitions. In this work, we study topological phase transitions in 1D and 2D topological superconductors with long-range hop** and pairing amplitudes, using the fidelity and the quantity $Δ$ closely related to the Uhlmann connection. The drop in the fidelity and the departure of $Δ$ from zero signal the topological phase transitions in the models considered. The analysis of the ground state fidelity susceptibility and its associated critical exponents are also applied to the study of the aforementioned topological phase transitions.
△ Less
Submitted 28 August, 2019; v1 submitted 8 April, 2019;
originally announced April 2019.
-
Vanishing k-space fidelity and phase diagram's bulk-edge-bulk correspondence
Authors:
P. D. Sacramento,
B. Mera,
N. Paunkovic
Abstract:
The fidelity between two infinitesimally close states or the fidelity susceptibility of a system are known to detect quantum phase transitions. Here we show that the k-space fidelity between two states far from each other and taken deep inside (bulk) of two phase s, generically vanishes at the k-points where there are gapless points in the energy spectrum that give origin to the lines (edges) sepa…
▽ More
The fidelity between two infinitesimally close states or the fidelity susceptibility of a system are known to detect quantum phase transitions. Here we show that the k-space fidelity between two states far from each other and taken deep inside (bulk) of two phase s, generically vanishes at the k-points where there are gapless points in the energy spectrum that give origin to the lines (edges) separating the phases in the phase diagram. We consider a general case of two-band models and present a sufficient condition for the existence of gapless points, given there are pairs of parameter points for which the fidelity between the corresponding states is zero. By presenting an explicit counter-example, we showed that the sufficient condition is not necessary. Further, we showed that, unless the set of parameter points is suitably constrained, the existence of gapless points generically imply the accompanied pairs of parameter points with vanishing fidelity. Also, we showed the connection between the vanishing fidelity and gapless points on a number of concrete examples (topological triplet superconductor, topological insulator, 1d Kitaev model of spinless fermions, BCS superconductor, Ising model in a transverse field, graphene and Haldane Chern insulator), as well as for the more general case of Dirac-like Hamiltonians. We also briefly discuss the relation between the vanishing fidelity and gapless points at finite temperatures.
△ Less
Submitted 19 August, 2018;
originally announced August 2018.
-
Fidelity and Uhlmann connection analysis of topological phase transitions in two dimensions
Authors:
S. T. Amin,
B. Mera,
C. Vlachou,
N. Paunković,
V. R. Vieira
Abstract:
We study the behaviour of the fidelity and the Uhlmann connection in two-dimensional systems of free fermions that exhibit non-trivial topological behavior. In particular, we use the fidelity and a quantity closely related to the Uhlmann factor in order to detect phase transitions at zero and finite temperature for topological insulators and superconductors. We show that at zero temperature both q…
▽ More
We study the behaviour of the fidelity and the Uhlmann connection in two-dimensional systems of free fermions that exhibit non-trivial topological behavior. In particular, we use the fidelity and a quantity closely related to the Uhlmann factor in order to detect phase transitions at zero and finite temperature for topological insulators and superconductors. We show that at zero temperature both quantities predict quantum phase transitions: a sudden drop of fidelity indicates an abrupt change of the spectrum of the state, while the behavior of the Uhlmann connection signals equally rapid change in its eigenbasis. At finite temperature, the topological features are gradually smeared out, indicating the absence of finite-temperature phase transitions, which we further confirm by performing a detailed analysis of the edge states. Moreover, we performed both analytical and numerical analysis of the fidelity susceptibility in the thermodynamic limit, providing an explicit quantitative criterion for the existence of phase transitions. The critical behaviour at zero temperature is further analysed through the numerical computation of critical exponents.
△ Less
Submitted 20 September, 2018; v1 submitted 13 March, 2018;
originally announced March 2018.
-
Entanglement-induced deviation from the geodesic motion in quantum gravity
Authors:
Francisco Pipa,
Nikola Paunkovic,
Marko Vo**ovic
Abstract:
We study the derivation of the effective equation of motion for a pointlike particle in the framework of quantum gravity. Just like the geodesic motion of a classical particle is a consequence of classical field theory coupled to general relativity, we introduce the similar notion of an effective equation of motion, but starting from an abstract quantum gravity description. In the presence of enta…
▽ More
We study the derivation of the effective equation of motion for a pointlike particle in the framework of quantum gravity. Just like the geodesic motion of a classical particle is a consequence of classical field theory coupled to general relativity, we introduce the similar notion of an effective equation of motion, but starting from an abstract quantum gravity description. In the presence of entanglement between gravity and matter, quantum effects give rise to modifications of the geodesic trajectory, primarily as a consequence of the nonzero overlap between various coherent states of the gravity-matter system. Finally, we discuss the status of the weak equivalence principle in quantum gravity and its possible violation due to the nongeodesic motion.
△ Less
Submitted 27 September, 2019; v1 submitted 9 January, 2018;
originally announced January 2018.
-
Dynamical phase transitions at finite temperature from fidelity and interferometric Loschmidt echo induced metrics
Authors:
Bruno Mera,
Chrysoula Vlachou,
Nikola Paunković,
Vítor R. Vieira,
Oscar Viyuela
Abstract:
We study finite-temperature Dynamical Quantum Phase Transitions (DQPTs) by means of the fidelity and the interferometric Loschmidt Echo (LE) induced metrics. We analyse the associated dynamical susceptibilities (Riemannian metrics), and derive analytic expressions for the case of two-band Hamiltonians. At zero temperature the two quantities are identical, nevertheless, at finite temperatures they…
▽ More
We study finite-temperature Dynamical Quantum Phase Transitions (DQPTs) by means of the fidelity and the interferometric Loschmidt Echo (LE) induced metrics. We analyse the associated dynamical susceptibilities (Riemannian metrics), and derive analytic expressions for the case of two-band Hamiltonians. At zero temperature the two quantities are identical, nevertheless, at finite temperatures they behave very differently. Using the fidelity LE, the zero temperature DQPTs are gradually washed away with temperature, while the interferometric counterpart exhibits finite-temperature Phase Transitions (PTs). We analyse the physical differences between the two finite-temperature LE generalisations, and argue that, while the interferometric one is more sensitive and can therefore provide more information when applied to genuine quantum (microscopic) systems, when analysing many-body macroscopic systems, the fidelity-based counterpart is a more suitable quantity to study. Finally, we apply the previous results to two representative models of topological insulators in 1D and 2D.
△ Less
Submitted 13 April, 2018; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Quantum contract signing with entangled pairs
Authors:
P. Yadav,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can o…
▽ More
We present a quantum scheme for signing contracts between two clients (Alice and Bob) using entangled states and the services of a third trusted party (Trent). The trusted party is only contacted for the initialization of the protocol, and possibly at the end, to verify clients' honesty and deliver signed certificates. The protocol is {\em fair}, i.e., the probability that a client, say Bob, can obtain a signed copy of the contract, while Alice cannot, can be made arbitrarily small, and scales as $N^{-1/2}$, where $4N$ is the total number of rounds (communications between the two clients) of the protocol. Thus, the protocol is {\em optimistic}, as the cheating is not successful, and the clients rarely have to contact Trent to confirm their honesty by delivering the actual signed certificates of the contract. Unlike the previous protocol [Paunković, et al., 2017], in the present proposal, a single client can obtain the signed contract alone, without the need for the other client's presence. When first contacting Trent, the clients do not have to agree upon a definitive contract. Moreover, even upon terminating the protocol, the clients do not reveal the actual contract to Trent. Finally, the protocol is based on the laws of physics, rather than on mathematical conjectures and the exchange of a large number of signed authenticated messages during the actual contract signing process. Therefore, it is {\em abuse-free}, as Alice and Bob cannot prove they are involved in the contract signing process.
△ Less
Submitted 3 September, 2019; v1 submitted 27 November, 2017;
originally announced November 2017.
-
Entanglement swap** via three-step quantum walk-like protocol
Authors:
Xiao-Man Li,
Ming Yang,
Nikola Paunkovic,
Da-Chuang Li,
Zhuo-Liang Cao
Abstract:
We present an entanglement swap** process for unknown nonmaximally entangled photonic states, where the standard Bell-state measurement is replaced by a three-step quantum walk-like state discrimination process, i.e., the practically nontrivial coupling element of two photons is replaced by manipulating their trajectories, which will greatly enrich the dynamics of the coupling between photons in…
▽ More
We present an entanglement swap** process for unknown nonmaximally entangled photonic states, where the standard Bell-state measurement is replaced by a three-step quantum walk-like state discrimination process, i.e., the practically nontrivial coupling element of two photons is replaced by manipulating their trajectories, which will greatly enrich the dynamics of the coupling between photons in realizing quantum computation, and reduce the integration complexity of optical quantum processing. In addition, the output state can be maximally entangled, which allows for entanglement concentration as well.
△ Less
Submitted 26 October, 2017;
originally announced October 2017.
-
Quantum key distribution with quantum walks
Authors:
Chrysoula Vlachou,
Walter Krawec,
Paulo Mateus,
Nikola Paunkovic,
Andre Souto
Abstract:
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle att…
▽ More
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle attacks. Furthermore, we present a one-way protocol and prove its security. Finally, we propose a semi-quantum variation and prove its robustness against eavesdrop**.
△ Less
Submitted 3 October, 2018; v1 submitted 22 October, 2017;
originally announced October 2017.
-
Gauge protected entanglement between gravity and matter
Authors:
Nikola Paunkovic,
Marko Vo**ovic
Abstract:
We show that gravity and matter fields are generically entangled, as a consequence of the local Poincaré symmetry. First, we present a general argument, applicable to any particular theory of quantum gravity with matter, by performing the analysis in the abstract nonperturbative canonical framework, demonstrating the nonseparability of the scalar constraint, thus promoting the entangled states as…
▽ More
We show that gravity and matter fields are generically entangled, as a consequence of the local Poincaré symmetry. First, we present a general argument, applicable to any particular theory of quantum gravity with matter, by performing the analysis in the abstract nonperturbative canonical framework, demonstrating the nonseparability of the scalar constraint, thus promoting the entangled states as the physical ones. Also, within the covariant framework, we show explicitly that the Hartle-Hawking state in the Regge model of quantum gravity is necessarily entangled. Our result is potentially relevant for the quantum-to-classical transition, taken within the framework of the decoherence programme: due to the gauge symmetry requirements, the matter does not decohere, it is by default decohered by gravity. Generically, entanglement is a consequence of interaction. This new entanglement could potentially, in form of an "effective interaction", bring about corrections to the weak equivalence principle, further confirming that spacetime as a smooth four-dimensional manifold is an emergent phenomenon. Finally, the existence of the gauge-protected entanglement between gravity and matter could be seen as a criterion for a plausible theory of quantum gravity, and in the case of perturbative quantisation approaches, a confirmation of the persistence of the manifestly broken gauge symmetry.
△ Less
Submitted 29 August, 2018; v1 submitted 24 February, 2017;
originally announced February 2017.
-
The Uhlmann connection in fermionic systems undergoing phase transitions
Authors:
Bruno Mera,
Chrysoula Vlachou,
Nikola Paunković,
Vítor R. Vieira
Abstract:
We study the behaviour of the Uhlmann connection in systems of fermions undergoing phase transitions. In particular, we analyse some of the paradigmatic cases of topological insulators and superconductors in dimension one, as well as the BCS theory of superconductivity in three dimensions. We show that the Uhlmann connection signals phase transitions in which the eigenbasis of the state of the sys…
▽ More
We study the behaviour of the Uhlmann connection in systems of fermions undergoing phase transitions. In particular, we analyse some of the paradigmatic cases of topological insulators and superconductors in dimension one, as well as the BCS theory of superconductivity in three dimensions. We show that the Uhlmann connection signals phase transitions in which the eigenbasis of the state of the system changes. Moreover, using the established fidelity approach and the study of the edge states, we show the absence of thermally driven phase transitions in the case of topological insulators and superconductors. We clarify what is the relevant parameter space associated with the Uhlmann connection so that it signals the existence of order in mixed states.
△ Less
Submitted 14 June, 2017; v1 submitted 23 February, 2017;
originally announced February 2017.
-
Security of two-state and four-state practical quantum bit-commitment protocols
Authors:
Ricardo Loura,
Dušan Arsenović,
Nikola Paunković,
Duška B. Popović,
Slobodan Prvanović
Abstract:
We study cheating strategies against a practical four-state quantum bit-commitment protocol and its two-state variant when the underlying quantum channels are noisy and the cheating party is constrained to using single-qubit measurements only. We show that simply inferring the transmitted photons' states by using the Breidbart basis, optimal for ambiguous (minimum-error) state discrimination, does…
▽ More
We study cheating strategies against a practical four-state quantum bit-commitment protocol and its two-state variant when the underlying quantum channels are noisy and the cheating party is constrained to using single-qubit measurements only. We show that simply inferring the transmitted photons' states by using the Breidbart basis, optimal for ambiguous (minimum-error) state discrimination, does not directly produce an optimal cheating strategy for this bit-commitment protocol. We introduce a new strategy, based on certain post-measurement processes, and show it to have better chances at cheating than the direct approach. We also study to what extent sending forged geographical coordinates helps a dishonest party in breaking the binding security requirement. Finally, we investigate the impact of imperfect single-photon sources in the protocols. Our study shows that, in terms of the resources used, the four-state protocol is advantageous over the two-state version. The analysis performed can be straightforwardly generalised to any finite-qubit measurement, with the same qualitative results.
△ Less
Submitted 28 December, 2016; v1 submitted 27 September, 2016;
originally announced September 2016.
-
Quantum key distribution by phase flip** of coherent states of light
Authors:
G. A. Barbosa,
J. van de Graaf,
P. Mateus,
N. Paunković
Abstract:
In this paper we present quantum key distribution protocol that, instead of single qubits, uses mesoscopic coherent states of light $|α\rangle$ to encode bit values of a randomly generated key. Given the reference value $α\in\mathbb C$, and a string of phase rotations each randomly taken from a set of $2M$ equidistant phases, Alice prepares a quantum state given by a product of coherent states of…
▽ More
In this paper we present quantum key distribution protocol that, instead of single qubits, uses mesoscopic coherent states of light $|α\rangle$ to encode bit values of a randomly generated key. Given the reference value $α\in\mathbb C$, and a string of phase rotations each randomly taken from a set of $2M$ equidistant phases, Alice prepares a quantum state given by a product of coherent states of light, such that a complex phase of each pulse is rotated by the corresponding phase rotation. The encoding of $i$-th bit of the key $r=r_1 \dots r_\ell$ is done by further performing phase rotation $r_i π$ (with $r_i = 0,1$) on the $i$-th coherent state pulse. In order to protect the protocol against the man-in-the-middle attack, we introduce a verification procedure, and analyse the protocol's security using the Holevo bound. We also analyse the possibility of beam splitting-like and of collective attacks, showing the impossibility of the former and, in the case of our protocol, the inadequacy of the latter. While we cannot prove full perfect security against the most general attacks allowed by the laws of quantum mechanics, our protocol achieves faster quantum key distribution, over larger distances and with lower costs, than the single-photon counterparts, maintaining at least practical security against the current and the near future technologies.
△ Less
Submitted 3 May, 2017; v1 submitted 22 September, 2016;
originally announced September 2016.
-
Boltzmann-Gibbs states in topological quantum walks and associated many-body systems: Fidelity and Uhlmann parallel transport analysis of Phase Transitions
Authors:
Bruno Mera,
Chrysoula Vlachou,
Nikola Paunković,
Vítor R. Vieira
Abstract:
We perform the fidelity analysis for Boltzmann-Gibbs-like states in order to investigate whether the topological order of 1D fermionic systems at zero temperature is maintained at finite temperatures. We use quantum walk protocols that are known to simulate topological phases and the respective quantum phase transitions for chiral symmetric Hamiltonians. Using the standard approaches of the fideli…
▽ More
We perform the fidelity analysis for Boltzmann-Gibbs-like states in order to investigate whether the topological order of 1D fermionic systems at zero temperature is maintained at finite temperatures. We use quantum walk protocols that are known to simulate topological phases and the respective quantum phase transitions for chiral symmetric Hamiltonians. Using the standard approaches of the fidelity analysis and the study of edge states, we conclude that no thermal-like phase transitions occur as temperature increases, i.e., the topological behaviour is washed out gradually. We also show that the behaviour of the Uhlmann geometric factor associated to the considered fidelity exhibits the same behaviour as the latter, thus confirming the results obtained using the previously established approaches.
△ Less
Submitted 8 September, 2017; v1 submitted 2 September, 2016;
originally announced September 2016.
-
Quantum walks public key cryptographic system
Authors:
C. Vlachou,
J. Rodrigues,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
Quantum Cryptography is a rapidly develo** field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol t…
▽ More
Quantum Cryptography is a rapidly develo** field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public-key generation and encryption/decryption procedures.
△ Less
Submitted 3 February, 2016;
originally announced February 2016.
-
Gravity-Matter Entanglement in Regge Quantum Gravity
Authors:
Nikola Paunković,
Marko Vo**ović
Abstract:
We argue that Hartle-Hawking states in the Regge quantum gravity model generically contain non-trivial entanglement between gravity and matter fields. Generic impossibility to talk about "matter in a point of space" is in line with the idea of an emergent spacetime, and as such could be taken as a possible candidate for a criterion for a plausible theory of quantum gravity. Finally, this new entan…
▽ More
We argue that Hartle-Hawking states in the Regge quantum gravity model generically contain non-trivial entanglement between gravity and matter fields. Generic impossibility to talk about "matter in a point of space" is in line with the idea of an emergent spacetime, and as such could be taken as a possible candidate for a criterion for a plausible theory of quantum gravity. Finally, this new entanglement could be seen as an additional "effective interaction", which could possibly bring corrections to the weak equivalence principle.
△ Less
Submitted 22 January, 2016;
originally announced January 2016.
-
Oblivious transfer based on single-qubit rotations
Authors:
J. Rodrigues,
P. Mateus,
N. Paunković,
A. Souto
Abstract:
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing o…
▽ More
We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations. Our protocol is built upon a previously proposed quantum public-key protocol and its practical security relies on the laws of Quantum Mechanics. Practical security is reflected in the fact that, due to technological limitations, the receiver (Bob) of the transferred bit-string is restricted to performing only "few-qubit" coherent measurements. We also present a single-bit oblivious transfer based on the proposed bit-string protocol. The protocol can be implemented with current technology based on optics.
△ Less
Submitted 4 September, 2017; v1 submitted 30 July, 2014;
originally announced July 2014.
-
Noise and measurement errors in a practical two-state quantum bit commitment protocol
Authors:
Ricardo Loura,
Álvaro J. Almeida,
Paulo S. André,
Armando N. Pinto,
Paulo Mateus,
Nikola Paunković
Abstract:
We present a two-state practical quantum bit commitment protocol, the security of which is based on the current technological limitations, namely the nonexistence of either stable long-term quantum memories or nondemolition measurements. For an optical realization of the protocol, we model the errors, which occur due to the noise and equipment (source, fibers, and detectors) imperfections, accumul…
▽ More
We present a two-state practical quantum bit commitment protocol, the security of which is based on the current technological limitations, namely the nonexistence of either stable long-term quantum memories or nondemolition measurements. For an optical realization of the protocol, we model the errors, which occur due to the noise and equipment (source, fibers, and detectors) imperfections, accumulated during emission, transmission, and measurement of photons. The optical part is modeled as a combination of a depolarizing channel (white noise), unitary evolution (e.g., systematic rotation of the polarization axis of photons), and two other basis-dependent channels, namely the phase- and bit-flip channels. We analyze quantitatively the effects of noise using two common information-theoretic measures of probability distribution distinguishability: the fidelity and the relative entropy. In particular, we discuss the optimal cheating strategy and show that it is always advantageous for a cheating agent to add some amount of white noise - the particular effect not being present in standard quantum security protocols. We also analyze the protocol's security when the use of (im)perfect nondemolition measurements and noisy or bounded quantum memories is allowed. Finally, we discuss errors occurring due to a finite detector efficiency, dark counts, and imperfect single-photon sources, and we show that the effects are the same as those of standard quantum cryptography.
△ Less
Submitted 2 June, 2014;
originally announced June 2014.
-
Oblivious transfer based on quantum state computational distinguishability
Authors:
A. Souto,
P. Mateus,
P. Adão,
N. Paunković
Abstract:
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not.
Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that fa…
▽ More
Oblivious transfer protocol is a basic building block in cryptography and is used to transfer information from a sender to a receiver in such a way that, at the end of the protocol, the sender does not know if the receiver got the message or not.
Since Shor's quantum algorithm appeared, the security of most of classical cryptographic schemes has been compromised, as they rely on the fact that factoring is unfeasible. To overcome this, quantum mechanics has been used intensively in the past decades, and alternatives resistant to quantum attacks have been developed in order to fulfill the (potential) lack of security of a significant number of classical schemes.
In this paper, we present a quantum computationally secure protocol for oblivious transfer between two parties, under the assumption of quantum hardness of state distinguishability. The protocol is feasible, in the sense that it is implementable in polynomial time.
△ Less
Submitted 24 March, 2014;
originally announced March 2014.
-
Fidelity spectrum and phase transitions of quantum systems
Authors:
P. D. Sacramento,
N. Paunkovic,
V. R. Vieira
Abstract:
Quantum fidelity between two density matrices, $F(ρ_1,ρ_2)$ is usually defined as the trace of the operator ${\cal F}=\sqrt{\sqrt{ρ_1} ρ_2 \sqrt{ρ_1}}$. We study the logarithmic spectrum of this operator, which we denote by {\it fidelity spectrum}, in the cases of the $XX$ spin chain in a magnetic field, a magnetic impurity inserted in a conventional superconductor and a bulk superconductor at fin…
▽ More
Quantum fidelity between two density matrices, $F(ρ_1,ρ_2)$ is usually defined as the trace of the operator ${\cal F}=\sqrt{\sqrt{ρ_1} ρ_2 \sqrt{ρ_1}}$. We study the logarithmic spectrum of this operator, which we denote by {\it fidelity spectrum}, in the cases of the $XX$ spin chain in a magnetic field, a magnetic impurity inserted in a conventional superconductor and a bulk superconductor at finite temperature. When the density matrices are equal, $ρ_1=ρ_2$, the fidelity spectrum reduces to the entanglement spectrum. We find that the fidelity spectrum can be a useful tool in giving a detailed characterization of different phases of many-body quantum systems.
△ Less
Submitted 29 July, 2011;
originally announced July 2011.
-
Secure $N$-dimensional Simultaneous Dense Coding and Applications
Authors:
Haozhen Situ,
Daowen Qiu,
Paulo Mateus,
Nikola Paunković
Abstract:
Simultaneous dense coding guarantees that Bob and Charlie simultaneously receive their respective information from Alice in their respective processes of dense coding. The idea is to use the so-called locking operation to "lock" the entanglement channels, thus requiring a joint unlocking operation by Bob and Charlie in order to simultaneously obtain the information sent by Alice. We present some n…
▽ More
Simultaneous dense coding guarantees that Bob and Charlie simultaneously receive their respective information from Alice in their respective processes of dense coding. The idea is to use the so-called locking operation to "lock" the entanglement channels, thus requiring a joint unlocking operation by Bob and Charlie in order to simultaneously obtain the information sent by Alice. We present some new results on simultaneous dense coding: (1) We propose three simultaneous dense coding protocols, which use different $N$-dimensional entanglement (Bell state, W state and GHZ state). (2) Besides the quantum Fourier transform, two new locking operators are introduced (the double controlled-NOT operator and the SWAP operator). (3) In the case that spatially distant Bob and Charlie have to finalise the protocol by implementing the unlocking operation through communication, we improve our protocol's fairness, with respect to Bob and Charlie, by implementing the unlocking operation in series of steps. (4) We improve the security of simultaneous dense coding against the intercept-resend attack. (5) We show that simultaneous dense coding can be used to implement a fair contract signing protocol. (6) We also show that the $N$-dimensional quantum Fourier transform can act as the locking operator in simultaneous teleportation of $N$-level quantum systems.
△ Less
Submitted 23 February, 2016; v1 submitted 20 June, 2011;
originally announced June 2011.
-
Fair and optimistic quantum contract signing
Authors:
N. Paunkovic,
J. Bouda,
P. Mateus
Abstract:
We present a fair and optimistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N^{-1/2}, where N is the number of messages exchanged be…
▽ More
We present a fair and optimistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N^{-1/2}, where N is the number of messages exchanged between the clients. Our protocol is not based on the exchange of signed messages: its fairness is based on the laws of quantum mechanics. Thus, it is abuse-free, and the clients do not have to generate new keys for each message during the Exchange phase. We discuss a real-life scenario when the measurement errors and qubit state corruption due to noisy channels occur and argue that for real, good enough measurement apparatus and transmission channels, our protocol would still be fair. Our protocol could be implemented by today's technology, as it requires in essence the same type of apparatus as the one needed for BB84 cryptographic protocol. Finally, we briefly discuss two alternative versions of the protocol, one that uses only two states (based on B92 protocol) and the other that uses entangled pairs, and show that it is possible to generalize our protocol to an arbitrary number of clients.
△ Less
Submitted 18 October, 2011; v1 submitted 15 June, 2011;
originally announced June 2011.
-
Fidelity Between Partial States as Signature of Quantum Phase Transitions
Authors:
N. Paunkovic,
P. D. Sacramento,
P. Nogueira,
V. R. Vieira,
V. K. Dugaev
Abstract:
We introduce a partial state fidelity approach to quantum phase transitions. We consider a superconducting lattice with a magnetic impurity inserted at its centre, and look at the fidelity between partial (either one-site or two-site) quantum states. In the vicinity of the point of the quantum phase transition, we observe a sudden drop of the fidelity between two one-site partial states correspo…
▽ More
We introduce a partial state fidelity approach to quantum phase transitions. We consider a superconducting lattice with a magnetic impurity inserted at its centre, and look at the fidelity between partial (either one-site or two-site) quantum states. In the vicinity of the point of the quantum phase transition, we observe a sudden drop of the fidelity between two one-site partial states corresponding to the impurity location and its close vicinity. In the case of two-site states, the fidelity reveals the transition point as long as one of the two electron sites is located at the impurity, while the other lies elsewhere in the lattice. We also determine the Uhlmann mixed state geometric phase, recently introduced in the study of the structural change of the system state eigenvectors in the vicinity of the lines of thermal phase transitions, and find it to be trivial, both for one- and two-site partial states, except when an electron site is at the impurity. This means that the system partial state eigenvectors do not contribute significantly to the enhanced state distinguishability around the point of this quantum phase transition. Finally, we use the fidelity to analyze the total amount of correlations contained within a composite system, showing that, even for the smallest two-site states, it features an abrupt quantitative change in the vicinity of the point of the quantum phase transition.
△ Less
Submitted 26 August, 2007;
originally announced August 2007.
-
Macroscopic Distinguishability Between Quantum States Defining Different Phases of Matter: Fidelity and the Uhlmann Geometric Phase
Authors:
Nikola Paunkovic,
Vitor Rocha Vieira
Abstract:
We study the fidelity approach to quantum phase transitions (QPTs) and apply it to general thermal phase transitions (PTs). We analyze two particular cases: the Stoner-Hubbard itinerant electron model of magnetism and the BCS theory of superconductivity. In both cases we show that the sudden drop of the mixed state fidelity marks the line of the phase transition. We conduct a detailed analysis o…
▽ More
We study the fidelity approach to quantum phase transitions (QPTs) and apply it to general thermal phase transitions (PTs). We analyze two particular cases: the Stoner-Hubbard itinerant electron model of magnetism and the BCS theory of superconductivity. In both cases we show that the sudden drop of the mixed state fidelity marks the line of the phase transition. We conduct a detailed analysis of the general case of systems given by mutually commuting Hamiltonians, where the non-analyticity of the fidelity is directly related to the non-analyticity of the relevant response functions (susceptibility and heat capacity), for the case of symmetry-breaking transitions. Further, on the case of BCS theory of superconductivity, given by mutually non-commuting Hamiltonians, we analyze the structure of the system's eigenvectors in the vicinity of the line of the phase transition showing that their sudden change is quantified by the emergence of a generically non-trivial Uhlmann mixed state geometric phase.
△ Less
Submitted 6 February, 2008; v1 submitted 31 July, 2007;
originally announced July 2007.
-
Ground state overlap and quantum phase transitions
Authors:
Paolo Zanardi,
Nikola Paunković
Abstract:
We present a characterization of quantum phase transitions in terms of the the overlap function between two ground states obtained for two different values of external parameters. On the examples of the Dicke and XY models, we show that the regions of criticality of a system are marked by the extremal points of the overlap and functions closely related to it. Further, we discuss the connections…
▽ More
We present a characterization of quantum phase transitions in terms of the the overlap function between two ground states obtained for two different values of external parameters. On the examples of the Dicke and XY models, we show that the regions of criticality of a system are marked by the extremal points of the overlap and functions closely related to it. Further, we discuss the connections between this approach and the Anderson orthogonality catastrophe as well as with the dynamical study of the Loschmidt echo for critical systems.
△ Less
Submitted 17 July, 2006; v1 submitted 29 December, 2005;
originally announced December 2005.
-
Entanglement-assisted Orientation in Space
Authors:
Caslav Brukner,
Nikola Paunkovic,
Terry Rudolph,
Vlatko Vedral
Abstract:
We demonstrate that quantum entanglement can help separated individuals in making decisions if their goal is to find each other in the absence of any communication between them. We derive a Bell-like inequality that the efficiency of every classical solution for our problem has to obey, and demonstrate its violation by the quantum efficiency. This proves that no classical strategy can be more ef…
▽ More
We demonstrate that quantum entanglement can help separated individuals in making decisions if their goal is to find each other in the absence of any communication between them. We derive a Bell-like inequality that the efficiency of every classical solution for our problem has to obey, and demonstrate its violation by the quantum efficiency. This proves that no classical strategy can be more efficient than the quantum one.
△ Less
Submitted 19 September, 2005;
originally announced September 2005.
-
Quantum Walk on a Line with Two Entangled Particles
Authors:
Y. Omar,
N. Paunkovic,
L. Sheridan,
S. Bose
Abstract:
We introduce the concept of a quantum walk with two particles and study it for the case of a discrete time walk on a line. A quantum walk with more than one particle may contain entanglement, thus offering a resource unavailable in the classical scenario and which can present interesting advantages. In this work, we show how the entanglement and the relative phase between the states describing t…
▽ More
We introduce the concept of a quantum walk with two particles and study it for the case of a discrete time walk on a line. A quantum walk with more than one particle may contain entanglement, thus offering a resource unavailable in the classical scenario and which can present interesting advantages. In this work, we show how the entanglement and the relative phase between the states describing the coin degree of freedom of each particle will influence the evolution of the quantum walk. In particular, the probability to find at least one particle in a certain position after $N$ steps of the walk, as well as the average distance between the two particles, can be larger or smaller than the case of two unentangled particles, depending on the initial conditions we choose. This resource can then be tuned according to our needs, in particular to enhance a given application (algorithmic or other) based on a quantum walk. Experimental implementations are briefly discussed.
△ Less
Submitted 9 November, 2004;
originally announced November 2004.
-
Optimal State Discrimination Using Particle Statistics
Authors:
S. Bose,
A. Ekert,
Y. Omar,
N. Paunkovic,
V. Vedral
Abstract:
We present an application of particle statistics to the problem of optimal ambiguous discrimination of quantum states. The states to be discriminated are encoded in the internal degrees of freedom of identical particles, and we use the bunching and antibunching of the external degrees of freedom to discriminate between various internal states. We show that we can achieve the optimal single-shot…
▽ More
We present an application of particle statistics to the problem of optimal ambiguous discrimination of quantum states. The states to be discriminated are encoded in the internal degrees of freedom of identical particles, and we use the bunching and antibunching of the external degrees of freedom to discriminate between various internal states. We show that we can achieve the optimal single-shot discrimination probability using only the effects of particle statistics. We discuss interesting applications of our method to detecting entanglement and purifying mixed states. Our scheme can easily be implemented with the current technology.
△ Less
Submitted 10 September, 2003;
originally announced September 2003.
-
Entanglement Concentration Using Quantum Statistics
Authors:
N. Paunkovic,
Y. Omar,
S. Bose,
V. Vedral
Abstract:
We propose an entanglement concentration scheme which uses only the effects of quantum statistics of indistinguishable particles. This establishes the fact that useful quantum information processing can be accomplished by quantum statistics alone. Due to the basis independence of statistical effects, our protocol requires less knowledge of the initial state than most entanglement concentration s…
▽ More
We propose an entanglement concentration scheme which uses only the effects of quantum statistics of indistinguishable particles. This establishes the fact that useful quantum information processing can be accomplished by quantum statistics alone. Due to the basis independence of statistical effects, our protocol requires less knowledge of the initial state than most entanglement concentration schemes. Moreover, no explicit controlled operation is required at any stage.
△ Less
Submitted 1 December, 2001;
originally announced December 2001.
-
Spin-Space Entanglement Transfer and Quantum Statistics
Authors:
Y. Omar,
N. Paunkovic,
S. Bose,
V. Vedral
Abstract:
Both the topics of entanglement and particle statistics have aroused enormous research interest since the advent of quantum mechanics. Using two pairs of entangled particles we show that indistinguishability enforces a transfer of entanglement from the internal to the spatial degrees of freedom without any interaction between these degrees of freedom. Moreover, sub-ensembles selected by local me…
▽ More
Both the topics of entanglement and particle statistics have aroused enormous research interest since the advent of quantum mechanics. Using two pairs of entangled particles we show that indistinguishability enforces a transfer of entanglement from the internal to the spatial degrees of freedom without any interaction between these degrees of freedom. Moreover, sub-ensembles selected by local measurements of the path will in general have different amounts of entanglement in the internal degrees of freedom depending on the statistics (either fermionic or bosonic) of the particles involved.
△ Less
Submitted 5 March, 2002; v1 submitted 23 May, 2001;
originally announced May 2001.