-
Quantifying non-Hermiticity using single- and many-particle quantum properties
Authors:
Soumik Bandyopadhyay,
Philipp Hauke,
Sudipto Singha Roy
Abstract:
The non-Hermitian paradigm of quantum systems displays salient features drastically different from Hermitian counterparts. In this work, we focus on one such aspect, the difference of evolving quantum ensembles under $H_{\mathrm{nh}}$ (right ensemble) versus its Hermitian conjugate, $H_{\mathrm{nh}}^{\dagger}$ (left ensemble). We propose a formalism that quantifies the (dis-)similarity of these ri…
▽ More
The non-Hermitian paradigm of quantum systems displays salient features drastically different from Hermitian counterparts. In this work, we focus on one such aspect, the difference of evolving quantum ensembles under $H_{\mathrm{nh}}$ (right ensemble) versus its Hermitian conjugate, $H_{\mathrm{nh}}^{\dagger}$ (left ensemble). We propose a formalism that quantifies the (dis-)similarity of these right and left ensembles, for single- as well as many-particle quantum properties. Such a comparison gives us a scope to measure the extent to which non-Hermiticity gets translated from the Hamiltonian into physically observable properties. We test the formalism in two cases: First, we construct a non-Hermitian Hamiltonian using a set of imperfect Bell states, showing that the non-Hermiticity of the Hamiltonian does not automatically comply with the non-Hermiticity at the level of observables. Second, we study the interacting Hatano--Nelson model with asymmetric hop** as a paradigmatic quantum many-body Hamiltonian. Interestingly, we identify situations where the measures of non-Hermiticity computed for the Hamiltonian, for single-, and for many-particle quantum properties behave distinctly from each other. Thus, different notions of non-Hermiticity can become useful in different physical scenarios. Furthermore, we demonstrate that the measures can mark the model's Parity--Time (PT) symmetry-breaking transition. Our findings can be instrumental in unveiling new exotic quantum phases of non-Hermitian quantum many-body systems as well as in preparing resourceful states for quantum technologies.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Toeplitz operators on the proper images of bounded symmetric domains
Authors:
Gargi Ghosh,
Subrata Shyam Roy
Abstract:
Let $Ω$ be a bounded symmetric domain in $\mathbb C^n$ and $f :Ω\to Ω^\prime$ be a proper holomorphic map** factored by (automorphisms) a finite complex reflection group $G.$ We define an appropriate notion of the Hardy space $H^2(Ω^\prime)$ on $Ω^\prime$ which can be realized as a closed subspace of an $L^2$-space on the Šilov boundary of $Ω^\prime$. We study various algebraic properties of Toe…
▽ More
Let $Ω$ be a bounded symmetric domain in $\mathbb C^n$ and $f :Ω\to Ω^\prime$ be a proper holomorphic map** factored by (automorphisms) a finite complex reflection group $G.$ We define an appropriate notion of the Hardy space $H^2(Ω^\prime)$ on $Ω^\prime$ which can be realized as a closed subspace of an $L^2$-space on the Šilov boundary of $Ω^\prime$. We study various algebraic properties of Toeplitz operators (such as the finite zero product property, commutative and semi-commutative property etc.) on $H^2(Ω^\prime)$. We prove a Brown-Halmos type characterization for Toeplitz operators on $H^2(Ω^\prime),$ where $Ω^\prime$ is an image of the open unit polydisc in $\mathbb C^n$ under a proper holomorphic map** factored by an irreducible finite complex reflection group.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
A Kinetic Scheme based on Positivity Preservation with Exact Shock Capture
Authors:
Shashi Shekhar Roy,
S. V. Raghurama Rao
Abstract:
In this paper, we describe a kinetic model with flexible velocities which are set to satisfy positivity preservation conditions for the Euler equations. Our kinetic model in 1D comprises of two velocities, and both the asymmetrical and the symmetrical models are utilized. Switching between the two models is done based on our own version of kinetic relative entropy and an additional criterion, to e…
▽ More
In this paper, we describe a kinetic model with flexible velocities which are set to satisfy positivity preservation conditions for the Euler equations. Our kinetic model in 1D comprises of two velocities, and both the asymmetrical and the symmetrical models are utilized. Switching between the two models is done based on our own version of kinetic relative entropy and an additional criterion, to ensure an accurate, entropic and robust scheme. In 2D, we describe a novel three-velocity kinetic model, defined to ensure a locally 1D formulation for the resulting macroscopic normal flux. For first order accuracy, we also obtain a limit on the time step which ensures positivity preservation. The resulting numerical scheme captures grid-aligned steady shocks exactly. Several benchmark compressible flow test cases are solved in 1D and 2D to demonstrate the efficacy of the proposed solver.
△ Less
Submitted 21 March, 2024;
originally announced March 2024.
-
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography
Authors:
Samuel Pagliarini,
Aikata Aikata,
Malik Imran,
Sujoy Sinha Roy
Abstract:
Significant research efforts have been dedicated to designing cryptographic algorithms that are quantum-resistant. The motivation is clear: robust quantum computers, once available, will render current cryptographic standards vulnerable. Thus, we need new Post-Quantum Cryptography (PQC) algorithms, and, due to the inherent complexity of such algorithms, there is also a demand to accelerate them in…
▽ More
Significant research efforts have been dedicated to designing cryptographic algorithms that are quantum-resistant. The motivation is clear: robust quantum computers, once available, will render current cryptographic standards vulnerable. Thus, we need new Post-Quantum Cryptography (PQC) algorithms, and, due to the inherent complexity of such algorithms, there is also a demand to accelerate them in hardware. In this paper, we show that PQC hardware accelerators can be backdoored by two different adversaries located in the chip supply chain. We propose REPQC, a sophisticated reverse engineering algorithm that can be employed to confidently identify hashing operations (i.e., Keccak) within the PQC accelerator - the location of which serves as an anchor for finding secret information to be leaked. Armed with REPQC, an adversary proceeds to insert malicious logic in the form of a stealthy Hardware Trojan Horse (HTH). Using Dilithium as a study case, our results demonstrate that HTHs that increase the accelerator's layout density by as little as 0.1\% can be inserted without any impact on the performance of the circuit and with a marginal increase in power consumption. An essential aspect is that the entire reverse engineering in REPQC is automated, and so is the HTH insertion that follows it, empowering adversaries to explore multiple HTH designs and identify the most suitable one.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
From Chatbots to PhishBots? -- Preventing Phishing scams created using ChatGPT, Google Bard and Claude
Authors:
Sayak Saha Roy,
Poojitha Thota,
Krishna Vamsi Naragam,
Shirin Nilizadeh
Abstract:
The advanced capabilities of Large Language Models (LLMs) have made them invaluable across various applications, from conversational agents and content creation to data analysis, research, and innovation. However, their effectiveness and accessibility also render them susceptible to abuse for generating malicious content, including phishing attacks. This study explores the potential of using four…
▽ More
The advanced capabilities of Large Language Models (LLMs) have made them invaluable across various applications, from conversational agents and content creation to data analysis, research, and innovation. However, their effectiveness and accessibility also render them susceptible to abuse for generating malicious content, including phishing attacks. This study explores the potential of using four popular commercially available LLMs, i.e., ChatGPT (GPT 3.5 Turbo), GPT 4, Claude, and Bard, to generate functional phishing attacks using a series of malicious prompts. We discover that these LLMs can generate both phishing websites and emails that can convincingly imitate well-known brands and also deploy a range of evasive tactics that are used to elude detection mechanisms employed by anti-phishing systems. These attacks can be generated using unmodified or "vanilla" versions of these LLMs without requiring any prior adversarial exploits such as jailbreaking. We evaluate the performance of the LLMs towards generating these attacks and find that they can also be utilized to create malicious prompts that, in turn, can be fed back to the model to generate phishing scams - thus massively reducing the prompt-engineering effort required by attackers to scale these threats. As a countermeasure, we build a BERT-based automated detection tool that can be used for the early detection of malicious prompts to prevent LLMs from generating phishing content. Our model is transferable across all four commercial LLMs, attaining an average accuracy of 96% for phishing website prompts and 94% for phishing email prompts. We also disclose the vulnerabilities to the concerned LLMs, with Google acknowledging it as a severe issue. Our detection model is available for use at Hugging Face, as well as a ChatGPT Actions plugin.
△ Less
Submitted 9 March, 2024; v1 submitted 29 October, 2023;
originally announced October 2023.
-
Unveiling Eigenstate Thermalization for Non-Hermitian systems
Authors:
Sudipto Singha Roy,
Soumik Bandyopadhyay,
Ricardo Costa de Almeida,
Philipp Hauke
Abstract:
The Eigenstate Thermalization Hypothesis (ETH) has been highly influential in explaining thermodynamic behavior of closed quantum systems. As of yet, it is unclear whether and how the ETH applies to non-Hermitian systems. Here, we introduce a framework that extends the ETH to non-Hermitian systems. It hinges on a suitable choice of basis composed of right eigenvectors of the non-Hermitian model, a…
▽ More
The Eigenstate Thermalization Hypothesis (ETH) has been highly influential in explaining thermodynamic behavior of closed quantum systems. As of yet, it is unclear whether and how the ETH applies to non-Hermitian systems. Here, we introduce a framework that extends the ETH to non-Hermitian systems. It hinges on a suitable choice of basis composed of right eigenvectors of the non-Hermitian model, a choice we motivate based on physical arguments. In this basis, and after correctly accounting for the nonorthogonality of non-Hermitian eigenvectors, expectation values of local operators reproduce the well-known ETH prediction for Hermitian systems. We illustrate the validity of the modified framework on non-Hermitian random-matrix and Sachdev--Ye--Kitaev models. Our results thus generalize the ETH to the non-Hermitian setting, and they illustrate the importance of the correct choice of basis to evaluate physical properties.
△ Less
Submitted 31 August, 2023;
originally announced September 2023.
-
Exploring Gender-Based Toxic Speech on Twitter in Context of the #MeToo movement: A Mixed Methods Approach
Authors:
Sayak Saha Roy,
Ohad Gilbar,
Christina Palantza,
Maxine Davis,
Shirin Nilizadeh
Abstract:
The #MeToo movement has catalyzed widespread public discourse surrounding sexual harassment and assault, empowering survivors to share their stories and holding perpetrators accountable. While the movement has had a substantial and largely positive influence, this study aims to examine the potential negative consequences in the form of increased hostility against women and men on the social media…
▽ More
The #MeToo movement has catalyzed widespread public discourse surrounding sexual harassment and assault, empowering survivors to share their stories and holding perpetrators accountable. While the movement has had a substantial and largely positive influence, this study aims to examine the potential negative consequences in the form of increased hostility against women and men on the social media platform Twitter. By analyzing tweets shared between October 2017 and January 2020 by more than 47.1k individuals who had either disclosed their own sexual abuse experiences on Twitter or engaged in discussions about the movement, we identify the overall increase in gender-based hostility towards both women and men since the start of the movement. We also monitor 16 pivotal real-life events that shaped the #MeToo movement to identify how these events may have amplified negative discussions targeting the opposite gender on Twitter. Furthermore, we conduct a thematic content analysis of a subset of gender-based hostile tweets, which helps us identify recurring themes and underlying motivations driving the expressions of anger and resentment from both men and women concerning the #MeToo movement. This study highlights the need for a nuanced understanding of the impact of social movements on online discourse and underscores the importance of addressing gender-based hostility in the digital sphere.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
REED: Chiplet-Based Accelerator for Fully Homomorphic Encryption
Authors:
Aikata Aikata,
Ahmet Can Mert,
Sunmin Kwon,
Maxim Deryabin,
Sujoy Sinha Roy
Abstract:
Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and has many applications. However, its practical implementation faces massive computation and memory overheads. To address this bottleneck, several Application-Specific Integrated Circuit (ASIC) FHE accelerators have been proposed. All these prior works put every component needed for FHE onto one chip (monolithic), hence of…
▽ More
Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and has many applications. However, its practical implementation faces massive computation and memory overheads. To address this bottleneck, several Application-Specific Integrated Circuit (ASIC) FHE accelerators have been proposed. All these prior works put every component needed for FHE onto one chip (monolithic), hence offering high performance. However, they suffer from practical problems associated with large-scale chip design, such as inflexibility, low yield, and high manufacturing cost.
In this paper, we present the first-of-its-kind multi-chiplet-based FHE accelerator `REED' for overcoming the limitations of prior monolithic designs. To utilize the advantages of multi-chiplet structures while matching the performance of larger monolithic systems, we propose and implement several novel strategies in the context of FHE. These include a scalable chiplet design approach, an effective framework for workload distribution, a custom inter-chiplet communication strategy, and advanced pipelined Number Theoretic Transform and automorphism design to enhance performance.
Experimental results demonstrate that REED 2.5D microprocessor consumes 96.7 mm$^2$ chip area, 49.4 W average power in 7nm technology. It could achieve a remarkable speedup of up to 2,991x compared to a CPU (24-core 2xIntel X5690) and offer 1.9x better performance, along with a 50% reduction in development costs when compared to state-of-the-art ASIC FHE accelerators. Furthermore, our work presents the first instance of benchmarking an encrypted deep neural network (DNN) training. Overall, the REED architecture design offers a highly effective solution for accelerating FHE, thereby significantly advancing the practicality and deployability of FHE in real-world applications.
△ Less
Submitted 1 May, 2024; v1 submitted 5 August, 2023;
originally announced August 2023.
-
Image background assessment as a novel technique for insect microhabitat identification
Authors:
Sesa Singha Roy,
Reid Tingley,
Alan Dorin
Abstract:
The effects of climate change, urbanisation and agriculture are changing the way insects occupy habitats. Some species may utilise anthropogenic microhabitat features for their existence, either because they prefer them to natural features, or because of no choice. Other species are dependent on natural microhabitats. Identifying and analysing these insects' use of natural and anthropogenic microh…
▽ More
The effects of climate change, urbanisation and agriculture are changing the way insects occupy habitats. Some species may utilise anthropogenic microhabitat features for their existence, either because they prefer them to natural features, or because of no choice. Other species are dependent on natural microhabitats. Identifying and analysing these insects' use of natural and anthropogenic microhabitats is important to assess their responses to a changing environment, for improving pollination and managing invasive pests. Traditional studies of insect microhabitat use can now be supplemented by machine learning-based insect image analysis. Typically, research has focused on automatic insect classification, but valuable data in image backgrounds has been ignored. In this research, we analysed the image backgrounds available on the ALA database to determine their microhabitats. We analysed the microhabitats of three insect species common across Australia: Drone flies, European honeybees and European wasps. Image backgrounds were classified as natural or anthropogenic microhabitats using computer vision and machine learning tools benchmarked against a manual classification algorithm. We found flies and honeybees in natural microhabitats, confirming their need for natural havens within cities. Wasps were commonly seen in anthropogenic microhabitats. Results show these insects are well adapted to survive in cities. Management of this invasive pest requires a thoughtful reduction of their access to human-provided resources. The assessment of insect image backgrounds is instructive to document the use of microhabitats by insects. The method offers insight that is increasingly vital for biodiversity management as urbanisation continues to encroach on natural ecosystems and we must consciously provide resources within built environments to maintain insect biodiversity and manage invasive pests.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
Robust and lightweight audio fingerprint for Automatic Content Recognition
Authors:
Anoubhav Agarwaal,
Prabhat Kanaujia,
Sartaki Sinha Roy,
Susmita Ghose
Abstract:
This research paper presents a novel audio fingerprinting system for Automatic Content Recognition (ACR). By using signal processing techniques and statistical transformations, our proposed method generates compact fingerprints of audio segments that are robust to noise degradations present in real-world audio. The system is designed to be highly scalable, with the ability to identify thousands of…
▽ More
This research paper presents a novel audio fingerprinting system for Automatic Content Recognition (ACR). By using signal processing techniques and statistical transformations, our proposed method generates compact fingerprints of audio segments that are robust to noise degradations present in real-world audio. The system is designed to be highly scalable, with the ability to identify thousands of hours of content using fingerprints generated from millions of TVs. The fingerprint's high temporal correlation and utilization of existing GPU-compatible Approximate Nearest Neighbour (ANN) search algorithms make this possible. Furthermore, the fingerprint generation can run on low-power devices with limited compute, making it accessible to a wide range of applications. Experimental results show improvements in our proposed system compared to a min-hash based audio fingerprint on all evaluated metrics, including accuracy on proprietary ACR datasets, retrieval speed, memory usage, and robustness to various noises. For similar retrieval accuracy, our system is 30x faster and uses 6x fewer fingerprints than the min-hash method.
△ Less
Submitted 17 May, 2023; v1 submitted 16 May, 2023;
originally announced May 2023.
-
Generating Phishing Attacks using ChatGPT
Authors:
Sayak Saha Roy,
Krishna Vamsi Naragam,
Shirin Nilizadeh
Abstract:
The ability of ChatGPT to generate human-like responses and understand context has made it a popular tool for conversational agents, content creation, data analysis, and research and innovation. However, its effectiveness and ease of accessibility makes it a prime target for generating malicious content, such as phishing attacks, that can put users at risk. In this work, we identify several malici…
▽ More
The ability of ChatGPT to generate human-like responses and understand context has made it a popular tool for conversational agents, content creation, data analysis, and research and innovation. However, its effectiveness and ease of accessibility makes it a prime target for generating malicious content, such as phishing attacks, that can put users at risk. In this work, we identify several malicious prompts that can be provided to ChatGPT to generate functional phishing websites. Through an iterative approach, we find that these phishing websites can be made to imitate popular brands and emulate several evasive tactics that have been known to avoid detection by anti-phishing entities. These attacks can be generated using vanilla ChatGPT without the need of any prior adversarial exploits (jailbreaking).
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
A study on delta compact spaces
Authors:
Sanjay Roy,
Srabani Mondal,
Shrobana Sinha Roy,
Bobi Mandal
Abstract:
The aim of this paper is to introduce the concept of Delta-Compact spaces along with some basic properties of it. Here, we try to establish the behavior of Delta-Compact spaces under the continuous map**. Finally, we define another concept namely, Locally Delta-Compactness.
The aim of this paper is to introduce the concept of Delta-Compact spaces along with some basic properties of it. Here, we try to establish the behavior of Delta-Compact spaces under the continuous map**. Finally, we define another concept namely, Locally Delta-Compactness.
△ Less
Submitted 4 March, 2023;
originally announced April 2023.
-
A kinetic scheme with variable velocities and relative entropy
Authors:
Shashi Shekhar Roy,
S. V. Raghurama Rao
Abstract:
A new kinetic model is proposed where the equilibrium distribution with bounded support has a range of velocities about two average velocities in 1D. In 2D, the equilibrium distribution function has a range of velocities about four average velocities, one in each quadrant. In the associated finite volume scheme, the average velocities are used to enforce the Rankine-Hugoniot jump conditions for th…
▽ More
A new kinetic model is proposed where the equilibrium distribution with bounded support has a range of velocities about two average velocities in 1D. In 2D, the equilibrium distribution function has a range of velocities about four average velocities, one in each quadrant. In the associated finite volume scheme, the average velocities are used to enforce the Rankine-Hugoniot jump conditions for the numerical diffusion at cell-interfaces, thereby capturing steady discontinuities exactly. The variable range of velocities is used to provide additional diffusion in smooth regions. Further, a novel kinetic theory based expression for relative entropy is presented which, along with an additional criterion, is used to identify expansions and smooth flow regions. Appropriate flow tangency and far-field boundary conditions are formulated for the proposed kinetic model. Several benchmark 1D and 2D compressible flow test cases are solved to demonstrate the efficacy of the proposed solver.
△ Less
Submitted 8 August, 2023; v1 submitted 5 April, 2023;
originally announced April 2023.
-
Unveiling the Risks of NFT Promotion Scams
Authors:
Sayak Saha Roy,
Dipanjan Das,
Priyanka Bose,
Christopher Kruegel,
Giovanni Vigna,
Shirin Nilizadeh
Abstract:
The rapid growth in popularity and hype surrounding digital assets such as art, video, and music in the form of non-fungible tokens (NFTs) has made them a lucrative investment opportunity, with NFT-based sales surpassing $25B in 2021 alone. However, the volatility and general lack of technical understanding of the NFT ecosystem have led to the spread of various scams. The success of an NFT heavily…
▽ More
The rapid growth in popularity and hype surrounding digital assets such as art, video, and music in the form of non-fungible tokens (NFTs) has made them a lucrative investment opportunity, with NFT-based sales surpassing $25B in 2021 alone. However, the volatility and general lack of technical understanding of the NFT ecosystem have led to the spread of various scams. The success of an NFT heavily depends on its online virality. As a result, creators use dedicated promotion services to drive engagement to their projects on social media websites, such as Twitter. However, these services are also utilized by scammers to promote fraudulent projects that attempt to steal users' cryptocurrency assets, thus posing a major threat to the ecosystem of NFT sales.
In this paper, we conduct a longitudinal study of 439 promotion services (accounts) on Twitter that have collectively promoted 823 unique NFT projects through giveaway competitions over a period of two months. Our findings reveal that more than 36% of these projects were fraudulent, comprising of phishing, rug pull, and pre-mint scams. We also found that a majority of accounts engaging with these promotions (including those for fraudulent NFT projects) are bots that artificially inflate the popularity of the fraudulent NFT collections by increasing their likes, followers, and retweet counts. This manipulation results in significant engagement from real users, who then invest in these scams. We also identify several shortcomings in existing anti-scam measures, such as blocklists, browser protection tools, and domain hosting services, in detecting NFT-based scams. We utilized our findings to develop a machine learning classifier tool that was able to proactively detect 382 new fraudulent NFT projects on Twitter.
△ Less
Submitted 11 September, 2023; v1 submitted 23 January, 2023;
originally announced January 2023.
-
A Large-Scale Analysis of Phishing Websites Hosted on Free Web Hosting Domains
Authors:
Sayak Saha Roy,
Unique Karanjit,
Shirin Nilizadeh
Abstract:
Free Website Building services (FWBs) provide individuals with a cost-effective and convenient way to create a website without requiring advanced technical knowledge or coding skills. However, malicious actors often abuse these services to host phishing websites. In this work, we propose FreePhish, a scalable framework to continuously identify phishing websites that are created using FWBs. Using F…
▽ More
Free Website Building services (FWBs) provide individuals with a cost-effective and convenient way to create a website without requiring advanced technical knowledge or coding skills. However, malicious actors often abuse these services to host phishing websites. In this work, we propose FreePhish, a scalable framework to continuously identify phishing websites that are created using FWBs. Using FreePhish, we were able to detect and characterize more than 31.4K phishing URLs that were created using 17 unique free website builder services and shared on Twitter and Facebook over a period of six months. We find that FWBs provide attackers with several features that make it easier to create and maintain phishing websites at scale while simultaneously evading anti-phishing countermeasures. Our study indicates that anti-phishing blocklists and browser protection tools have significantly lower coverage and high detection time against FWB phishing attacks when compared to regular (self-hosted) phishing websites. While our prompt disclosure of these attacks helped some FWBs to remove these attacks, we found several others who were slow at removal or did not remove them outright, with the same also being true for Twitter and Facebook. Finally, we also provide FreePhish as a free Chromium web extension that can be utilized to prevent end-users from accessing potential FWB-based phishing attacks.
△ Less
Submitted 9 January, 2024; v1 submitted 5 December, 2022;
originally announced December 2022.
-
User Engagement and the Toxicity of Tweets
Authors:
Nazanin Salehabadi,
Anne Groggel,
Mohit Singhal,
Sayak Saha Roy,
Shirin Nilizadeh
Abstract:
Twitter is one of the most popular online micro-blogging and social networking platforms. This platform allows individuals to freely express opinions and interact with others regardless of geographic barriers. However, with the good that online platforms offer, also comes the bad. Twitter and other social networking platforms have created new spaces for incivility. With the growing interest on the…
▽ More
Twitter is one of the most popular online micro-blogging and social networking platforms. This platform allows individuals to freely express opinions and interact with others regardless of geographic barriers. However, with the good that online platforms offer, also comes the bad. Twitter and other social networking platforms have created new spaces for incivility. With the growing interest on the consequences of uncivil behavior online, understanding how a toxic comment impacts online interactions is imperative. We analyze a random sample of more than 85,300 Twitter conversations to examine differences between toxic and non-toxic conversations and the relationship between toxicity and user engagement. We find that toxic conversations, those with at least one toxic tweet, are longer but have fewer individual users contributing to the dialogue compared to the non-toxic conversations. However, within toxic conversations, toxicity is positively associated with more individual Twitter users participating in conversations. This suggests that overall, more visible conversations are more likely to include toxic replies.
Additionally, we examine the sequencing of toxic tweets and its impact on conversations. Toxic tweets often occur as the main tweet or as the first reply, and lead to greater overall conversation toxicity. We also find a relationship between the toxicity of the first reply to a toxic tweet and the toxicity of the conversation, such that whether the first reply is toxic or non-toxic sets the stage for the overall toxicity of the conversation, following the idea that hate can beget hate.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Twitter Users' Behavioral Response to Toxic Replies
Authors:
Ana Aleksandric,
Sayak Saha Roy,
Shirin Nilizadeh
Abstract:
Online toxic attacks, such as harassment, trolling, and hate speech have been linked to an increase in offline violence and negative psychological effects on victims. In this paper, we studied the impact of toxicity on users' online behavior. We collected a sample of 79.8k Twitter conversations. Then, through a longitudinal study, for nine weeks, we tracked and compared the behavioral reactions of…
▽ More
Online toxic attacks, such as harassment, trolling, and hate speech have been linked to an increase in offline violence and negative psychological effects on victims. In this paper, we studied the impact of toxicity on users' online behavior. We collected a sample of 79.8k Twitter conversations. Then, through a longitudinal study, for nine weeks, we tracked and compared the behavioral reactions of authors, who were toxicity victims, with those who were not. We found that toxicity victims show a combination of the following behavioral reactions: avoidance, revenge, countermeasures, and negotiation. We performed statistical tests to understand the significance of the contribution of toxic replies toward user behaviors while considering confounding factors, such as the structure of conversations and the user accounts' visibility, identifiability, and activity level. Interestingly, we found that compared to other random authors, victims are more likely to engage in conversations, reply in a toxic way, and unfollow toxicity instigators. Even if the toxicity is directed at other participants, the root authors are more likely to engage in the conversations and reply in a toxic way. However, victims who have verified accounts are less likely to participate in conversations or respond by posting toxic comments. In addition, replies are more likely to be removed in conversations with a larger percentage of toxic nested replies and toxic replies directed at other users. Our results can assist further studies in develo** more effective detection and intervention methods for reducing the negative consequences of toxicity on social media.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
A Unified Cryptoprocessor for Lattice-based Signature and Key-exchange
Authors:
Aikata Aikata,
Ahmet Can Mert,
David Jacquemin,
Amitabh Das,
Donald Matthews,
Santosh Ghosh,
Sujoy Sinha Roy
Abstract:
We propose design methodologies for building a compact, unified and programmable cryptoprocessor architecture that computes post-quantum key agreement and digital signature. Synergies in the two types of cryptographic primitives are used to make the cryptoprocessor compact. As a case study, the cryptoprocessor architecture has been optimized targeting the signature scheme 'CRYSTALS-Dilithium' and…
▽ More
We propose design methodologies for building a compact, unified and programmable cryptoprocessor architecture that computes post-quantum key agreement and digital signature. Synergies in the two types of cryptographic primitives are used to make the cryptoprocessor compact. As a case study, the cryptoprocessor architecture has been optimized targeting the signature scheme 'CRYSTALS-Dilithium' and the key encapsulation mechanism (KEM) 'Saber', both finalists in the NIST's post-quantum cryptography standardization project. The programmable cryptoprocessor executes key generations, encapsulations, decapsulations, signature generations, and signature verifications for all the security levels of Dilithium and Saber. On a Xilinx Ultrascale+ FPGA, the proposed cryptoprocessor consumes 18,406 LUTs, 9,323 FFs, 4 DSPs, and 24 BRAMs. It achieves 200 MHz clock frequency and finishes CCA-secure key-generation/encapsulation/decapsulation operations for LightSaber in 29.6/40.4/58.3$μ$s; for Saber in 54.9/69.7/94.9$μ$s; and for FireSaber in 87.6/108.0/139.4$μ$s, respectively. It finishes key-generation/sign/verify operations for Dilithium-2 in 70.9/151.6/75.2$μ$s; for Dilithium-3 in 114.7/237/127.6$μ$s; and for Dilithium-5 in 194.2/342.1/228.9$μ$s, respectively, for the best-case scenario. On UMC 65nm library for ASIC the latency is improved by a factor of two due to a 2x increase in clock frequency.
△ Less
Submitted 13 October, 2022;
originally announced October 2022.
-
Medha: Microcoded Hardware Accelerator for computing on Encrypted Data
Authors:
Ahmet Can Mert,
Aikata,
Sunmin Kwon,
Youngsam Shin,
Donghoon Yoo,
Yongwoo Lee,
Sujoy Sinha Roy
Abstract:
Homomorphic encryption (HE) enables computation on encrypted data, and hence it has a great potential in privacy-preserving outsourcing of computations to the cloud. Hardware acceleration of HE is crucial as software implementations are very slow. In this paper, we present design methodologies for building a programmable hardware accelerator for speeding up the cloud-side homomorphic evaluations o…
▽ More
Homomorphic encryption (HE) enables computation on encrypted data, and hence it has a great potential in privacy-preserving outsourcing of computations to the cloud. Hardware acceleration of HE is crucial as software implementations are very slow. In this paper, we present design methodologies for building a programmable hardware accelerator for speeding up the cloud-side homomorphic evaluations on encrypted data. First, we propose a divide-and-conquer technique that enables homomorphic evaluations in a large polynomial ring $R_{Q,2N}$ to use a hardware accelerator that has been built for the smaller ring $R_{Q,N}$. The technique makes it possible to use a single hardware accelerator flexibly for supporting several HE parameter sets. Next, we present several architectural design methods that we use to realize the flexible and instruction-set accelerator architecture, which we call `Medha'. At every level of the implementation hierarchy, we explore possibilities for parallel processing. Starting from hardware-friendly parallel algorithms for the basic building blocks, we gradually build heavily parallel RNS polynomial arithmetic units. Next, many of these parallel units are interconnected elegantly so that their interconnections require the minimum number of nets, therefore making the overall architecture placement-friendly on the platform. For Medha, we take a memory-conservative design approach and get rid of any off-chip memory access during homomorphic evaluations. Finally, we implement Medha in a Xilinx Alveo U250 FPGA and measure timing performances of the microcoded homomorphic addition, multiplication, key-switching, and rescaling for the leveled HE scheme RNS-HEAAN at 200 MHz clock frequency. For two large parameter sets, Medha achieves accelerations by up to 68x and 78x times respectively compared to a highly optimized software implementation Microsoft SEAL running at 2.3 GHz.
△ Less
Submitted 12 October, 2022; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Genuine multipartite entanglement in a one-dimensional Bose-Hubbard model with frustrated hop**
Authors:
Sudipto Singha Roy,
Leon Carl,
Philipp Hauke
Abstract:
Frustration and quantum entanglement are two exotic quantum properties in quantum many-body systems. However, despite several efforts, an exact relation between them remains elusive. In this work, we explore the relationship between frustration and quantum entanglement in a physical model describing strongly correlated ultracold bosonic atoms in optical lattices. In particular, we consider the one…
▽ More
Frustration and quantum entanglement are two exotic quantum properties in quantum many-body systems. However, despite several efforts, an exact relation between them remains elusive. In this work, we explore the relationship between frustration and quantum entanglement in a physical model describing strongly correlated ultracold bosonic atoms in optical lattices. In particular, we consider the one-dimensional Bose-Hubbard model comprising both nearest-neighbor ($t_{1}$) and frustrated next-nearest neighbor ($t_{2}$) hop**s and examine how the interplay of onsite interaction ($U$) and hop**s results in different quantum correlations dominating in the ground state of the system. We then analyze the behavior of quantum entanglement in the model. In particular, we compute genuine multipartite entanglement as quantified through the generalized geometric measure and make a comparative study with bipartite entanglement and other relevant order parameters. We observe that genuine multipartite entanglement has a very rich behavior throughout the considered parameter regime and frustration does not necessarily favor generating a high amount of it. Moreover, we show that in the region with strong quantum fluctuations, the particles remain highly delocalized in all momentum modes and share a very low amount of both bipartite and multipartite entanglement. Our work illustrates the necessity to give separate attention to dominating ordering behavior and quantum entanglement in the ground state of strongly correlated systems.
△ Less
Submitted 29 November, 2022; v1 submitted 19 September, 2022;
originally announced September 2022.
-
Entanglement links and the quasiparticle picture
Authors:
Silvia N. Santalla,
Giovanni Ramírez,
Sudipto Singha Roy,
Germán Sierra,
Javier Rodríguez-Laguna
Abstract:
The time evolution of a quantum state with short-range correlations after a quench to a one-dimensional critical Hamiltonian can be understood using the quasi-particle picture, which states that local entanglement spreads as if it was carried by quasi-particles which separate at a fixed speed. We extend the quasi-particle picture using the recently introduced link representation of entanglement, a…
▽ More
The time evolution of a quantum state with short-range correlations after a quench to a one-dimensional critical Hamiltonian can be understood using the quasi-particle picture, which states that local entanglement spreads as if it was carried by quasi-particles which separate at a fixed speed. We extend the quasi-particle picture using the recently introduced link representation of entanglement, allowing us to apply it to initial states presenting long-range correlations. The entanglement links are current correlators, and therefore follow a wave equation on the appropriate configurational space which allows us to predict the time evolution of the entanglement entropies. Our results are checked numerically for free fermionic chains with different initial entanglement patterns.
△ Less
Submitted 5 April, 2023; v1 submitted 7 August, 2022;
originally announced August 2022.
-
On irreducibility of a certain class of homogeneous operators obtained from quotient modules
Authors:
Shibananda Biswas,
Prahllad Deb,
Subrata Shyam Roy
Abstract:
Let $ Ω\subset \mathbb{C}^m $ be an open, connected and bounded set and $\mathcal{A}(Ω)$ be a function algebra of holomorphic functions on $Ω$. Suppose that $\mathcal{M}_q$ is the quotient Hilbert module obtained from a submodule of functions in a Hilbert module $\mathcal{M}$ vanishing to order $k$ along a smooth irreducible complex analytic set $\mathcal{Z}\subsetΩ$ of codimension at least $2$. I…
▽ More
Let $ Ω\subset \mathbb{C}^m $ be an open, connected and bounded set and $\mathcal{A}(Ω)$ be a function algebra of holomorphic functions on $Ω$. Suppose that $\mathcal{M}_q$ is the quotient Hilbert module obtained from a submodule of functions in a Hilbert module $\mathcal{M}$ vanishing to order $k$ along a smooth irreducible complex analytic set $\mathcal{Z}\subsetΩ$ of codimension at least $2$. In this article, we prove that the compression of the multiplication operators onto $\mathcal{M}_q$ is homogeneous with respect to a suitable subgroup of the automorphism group Aut$(Ω)$ of $Ω$ depending upon a subgroup $G$ of Aut$(Ω)$ whenever the tuple of multiplication operators on $\mathcal{M}$ is homogeneous with respect to $G$ and both $\mathcal{M}$ as well as $\mathcal{M}_q$ are in the Cowen-Douglas class. We show that these compression of multiplication operators might be reducible even if the tuple of multiplication operators on $\mathcal{M}$ is irreducible by exhibiting a concrete example. Moreover, the irreducible components of these reducible operators are identified as Generalized Wilkins' operators.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
Exotic correlation spread in free-fermionic states with initial patterns
Authors:
Sudipto Singha Roy,
Giovanni Ramírez,
Silvia N. Santalla,
Germán Sierra,
Javier Rodríguez-Laguna
Abstract:
We describe a relation between the light-cone velocities after a quantum quench and the internal structure of the initial state, in the particular case of free fermions on a chain at half filling. The considered states include short-range valence bond solids, i.e., dimerized states, and long-range states such as the rainbow. In all the considered cases the correlations spread into one or a few wel…
▽ More
We describe a relation between the light-cone velocities after a quantum quench and the internal structure of the initial state, in the particular case of free fermions on a chain at half filling. The considered states include short-range valence bond solids, i.e., dimerized states, and long-range states such as the rainbow. In all the considered cases the correlations spread into one or a few well-defined light cones, each of them presenting an effective velocity which can be read from the form factor. Interestingly, we find that the observed velocities range from zero to the Fermi velocity and may not always be obtained from the dispersion relation for valid momenta.
△ Less
Submitted 17 June, 2022; v1 submitted 26 December, 2021;
originally announced December 2021.
-
Evaluating the effectiveness of Phishing Reports on Twitter
Authors:
Sayak Saha Roy,
Unique Karanjit,
Shirin Nilizadeh
Abstract:
Phishing attacks are an increasingly potent web-based threat, with nearly 1.5 million websites created on a monthly basis. In this work, we present the first study towards identifying such attacks through phishing reports shared by users on Twitter. We evaluated over 16.4k such reports posted by 701 Twitter accounts between June to August 2021, which contained 11.1k unique URLs, and analyzed their…
▽ More
Phishing attacks are an increasingly potent web-based threat, with nearly 1.5 million websites created on a monthly basis. In this work, we present the first study towards identifying such attacks through phishing reports shared by users on Twitter. We evaluated over 16.4k such reports posted by 701 Twitter accounts between June to August 2021, which contained 11.1k unique URLs, and analyzed their effectiveness using various quantitative and qualitative measures. Our findings indicate that not only do these users share a high volume of legitimate phishing URLs, but these reports contain more information regarding the phishing websites (which can expedite the process of identifying and removing these threats), when compared to two popular open-source phishing feeds: PhishTank and OpenPhish. We also notice that the reported websites had very little overlap with the URLs existing in the other feeds, and also remained active for longer periods of time. But despite having these attributes, we found that these reports have very low interaction from other Twitter users, especially from the domains and organizations targeted by the reported URLs. Moreover, nearly 31% of these URLs were still active even after a week of them being reported, with 27% of them being detected by very few anti-phishing tools, suggesting that a large majority of these reports remain undiscovered, despite the majority of the follower base of these accounts being security focused users. Thus, this work highlights the effectiveness of the reports, and the benefits of using them as an open source knowledge base for identifying new phishing websites.
△ Less
Submitted 22 December, 2021; v1 submitted 13 November, 2021;
originally announced November 2021.
-
Design Space Exploration of SABER in 65nm ASIC
Authors:
Malik Imran,
Felipe Almeida,
Jaan Raik,
Andrea Basso,
Sujoy Sinha Roy,
Samuel Pagliarini
Abstract:
This paper presents a design space exploration for SABER, one of the finalists in NIST's quantum-resistant public-key cryptographic standardization effort. Our design space exploration targets a 65nm ASIC platform and has resulted in the evaluation of 6 different architectures. Our exploration is initiated by setting a baseline architecture which is ported from FPGA. In order to improve the clock…
▽ More
This paper presents a design space exploration for SABER, one of the finalists in NIST's quantum-resistant public-key cryptographic standardization effort. Our design space exploration targets a 65nm ASIC platform and has resulted in the evaluation of 6 different architectures. Our exploration is initiated by setting a baseline architecture which is ported from FPGA. In order to improve the clock frequency (the primary goal in our exploration), we have employed several optimizations: (i) use of compiled memories in a 'smart synthesis' fashion, (ii) pipelining, and (iii) logic sharing between SABER building blocks. The most optimized architecture utilizes four register files, achieves a remarkable clock frequency of 1GHz while only requiring an area of 0.314mm2. Moreover, physical synthesis is carried out for this architecture and a tapeout-ready layout is presented. The estimated dynamic power consumption of the high-frequency architecture is approximately 184mW for key generation and 187mW for encapsulation or decapsulation operations. These results strongly suggest that our optimized accelerator architecture is well suited for high-speed cryptographic applications.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.
-
Simulating violation of causality using a topological phase transition
Authors:
Sudipto Singha Roy,
Anindita Bera,
Germán Sierra
Abstract:
We consider a topological Hamiltonian and establish a correspondence between its eigenstates and the resource for a causal order game introduced in Ref. [1] known as process matrix. We show that quantum correlations generated in the quantum many-body energy eigenstates of the model can mimic the statistics that can be obtained by exploiting different quantum measurements on the process matrix of t…
▽ More
We consider a topological Hamiltonian and establish a correspondence between its eigenstates and the resource for a causal order game introduced in Ref. [1] known as process matrix. We show that quantum correlations generated in the quantum many-body energy eigenstates of the model can mimic the statistics that can be obtained by exploiting different quantum measurements on the process matrix of the game. This provides an interpretation of the expectation values of the observables computed for the quantum many-body states in terms of the success probabilities of the game. As a result, we show that the ground state (GS) of the model can be related to the optimal strategy of the causal order game. Subsequently, we observe that at the point of maximum violation of the classical bound in the causal order game, corresponding quantum many-body model undergoes a second-order quantum phase transition (QPT). The correspondence equally holds even when we generalize the game for a higher number of parties.
△ Less
Submitted 21 March, 2022; v1 submitted 20 May, 2021;
originally announced May 2021.
-
Emergent geometry from entanglement structure
Authors:
Sudipto Singha Roy,
Silvia N. Santalla,
Javier Rodríguez-Laguna,
Germán Sierra
Abstract:
We attempt to reveal the geometry, emerged from the entanglement structure of any general $N$-party pure quantum many-body state by representing entanglement entropies corresponding to all $2^N $ bipartitions of the state by means of a generalized adjacency matrix. We show this representation is often exact and may lead to a geometry very different than suggested by the Hamiltonian. Moreover, in a…
▽ More
We attempt to reveal the geometry, emerged from the entanglement structure of any general $N$-party pure quantum many-body state by representing entanglement entropies corresponding to all $2^N $ bipartitions of the state by means of a generalized adjacency matrix. We show this representation is often exact and may lead to a geometry very different than suggested by the Hamiltonian. Moreover, in all the cases, it yields a natural entanglement contour, similar to previous proposals. The formalism is extended for conformal invariant systems, and a more insightful interpretation of entanglement is presented as a flow among different parts of the system.
△ Less
Submitted 8 April, 2021;
originally announced April 2021.
-
Link representation of the entanglement entropies for all bipartitions
Authors:
Sudipto Singha Roy,
Silvia N. Santalla,
Germán Sierra,
Javier Rodríguez-Laguna
Abstract:
We have recently shown that the entanglement entropy of any bipartition of a quantum state can be approximated as the sum of certain link strengths connecting internal and external sites. The representation is useful to unveil the geometry associated with the entanglement structure of a quantum many-body state which may occasionally differ from the one suggested by the Hamiltonian of the system. Y…
▽ More
We have recently shown that the entanglement entropy of any bipartition of a quantum state can be approximated as the sum of certain link strengths connecting internal and external sites. The representation is useful to unveil the geometry associated with the entanglement structure of a quantum many-body state which may occasionally differ from the one suggested by the Hamiltonian of the system. Yet, the obtention of these entanglement links is a complex mathematical problem. In this work, we address this issue and propose several approximation techniques for matrix product states, free fermionic states, or in cases in which contiguous blocks are specially relevant. Along with this, we discuss the accuracy of the approximation for different types of states and partitions. Finally, we employ the link representation to discuss two different physical systems: the spin-1/2 long-range XXZ chain and the spin-1 bilinear biquadratic chain.
△ Less
Submitted 16 March, 2021;
originally announced March 2021.
-
Detecting Entanglement can be More Effective with Inequivalent Mutually Unbiased Bases
Authors:
B. C. Hiesmayr,
D. McNulty,
S. Baek,
S. Singha Roy,
J. Bae,
D. Chruściński
Abstract:
Mutually unbiased bases (MUBs) provide a standard tool in the verification of quantum states, especially when harnessing a complete set for optimal quantum state tomography. In this work, we investigate the detection of entanglement via inequivalent sets of MUBs, with a particular focus on unextendible MUBs. These are bases for which an additional unbiased basis cannot be constructed and, conseque…
▽ More
Mutually unbiased bases (MUBs) provide a standard tool in the verification of quantum states, especially when harnessing a complete set for optimal quantum state tomography. In this work, we investigate the detection of entanglement via inequivalent sets of MUBs, with a particular focus on unextendible MUBs. These are bases for which an additional unbiased basis cannot be constructed and, consequently, are unsuitable for quantum state verification. Here, we show that unextendible MUBs, as well as other inequivalent sets in higher dimensions, can be more effective in the verification of entanglement. Furthermore, we provide an efficient and systematic method to search for inequivalent MUBs and show that such sets occur regularly within the Heisenberg-Weyl MUBs, as the dimension increases. Our findings are particularly useful for experimentalists since adding optimal MUBs to an experimental setup enables a step-by-step approach to detect a larger class of entangled states.
△ Less
Submitted 6 January, 2021; v1 submitted 30 November, 2020;
originally announced November 2020.
-
Audrey: A Personalized Open-Domain Conversational Bot
Authors:
Chung Hoon Hong,
Yuan Liang,
Sagnik Sinha Roy,
Arushi Jain,
Vihang Agarwal,
Ryan Draves,
Zhizhuo Zhou,
William Chen,
Yujian Liu,
Martha Miracky,
Lily Ge,
Nikola Banovic,
David Jurgens
Abstract:
Conversational Intelligence requires that a person engage on informational, personal and relational levels. Advances in Natural Language Understanding have helped recent chatbots succeed at dialog on the informational level. However, current techniques still lag for conversing with humans on a personal level and fully relating to them. The University of Michigan's submission to the Alexa Prize Gra…
▽ More
Conversational Intelligence requires that a person engage on informational, personal and relational levels. Advances in Natural Language Understanding have helped recent chatbots succeed at dialog on the informational level. However, current techniques still lag for conversing with humans on a personal level and fully relating to them. The University of Michigan's submission to the Alexa Prize Grand Challenge 3, Audrey, is an open-domain conversational chat-bot that aims to engage customers on these levels through interest driven conversations guided by customers' personalities and emotions. Audrey is built from socially-aware models such as Emotion Detection and a Personal Understanding Module to grasp a deeper understanding of users' interests and desires. Our architecture interacts with customers using a hybrid approach balanced between knowledge-driven response generators and context-driven neural response generators to cater to all three levels of conversations. During the semi-finals period, we achieved an average cumulative rating of 3.25 on a 1-5 Likert scale.
△ Less
Submitted 11 November, 2020;
originally announced November 2020.
-
Bulk-edge correspondence in the Haldane phase of the bilinear-biquadratic spin-1 Hamiltonian
Authors:
Sudipto Singha Roy,
Silvia N. Santalla,
Javier Rodríguez-Laguna,
Germán Sierra
Abstract:
The Haldane phase is the prototype of symmetry protected topological (SPT) phases of spin chain systems. It can be protected by several symmetries having in common the degeneracy of the entanglement spectrum. Here we explore in depth this degeneracy for the spin-1 AKLT and bilinear-biquadratic Hamiltonians and show the emergence of a bulk-edge correspondence that relates the low energy properties…
▽ More
The Haldane phase is the prototype of symmetry protected topological (SPT) phases of spin chain systems. It can be protected by several symmetries having in common the degeneracy of the entanglement spectrum. Here we explore in depth this degeneracy for the spin-1 AKLT and bilinear-biquadratic Hamiltonians and show the emergence of a bulk-edge correspondence that relates the low energy properties of the entanglement Hamiltonian of a periodic chain and that of the physical Hamiltonian of an open chain. We find that the entanglement spectrum can be described in terms of two spins-1/2 behaving as the effective spins at the end of the open chain. In the case of non-contiguous partitions, we find that the entanglement Hamiltonian is given by the spin-1/2 Heisenberg Hamiltonian, which suggests a relationship between SPT phases and conformal field theory. We finally investigate the string order parameter and the relation with the bulk-edge correspondence.
△ Less
Submitted 22 May, 2021; v1 submitted 10 November, 2020;
originally announced November 2020.
-
Growth of genuine multipartite entanglement in random unitary circuits
Authors:
Anindita Bera,
Sudipto Singha Roy
Abstract:
We study the growth of genuine multipartite entanglement in random quantum circuit models, which include random unitary circuit models and the random Clifford circuit. We find that for the random Clifford circuit, the growth of multipartite entanglement remains slower in comparison to the random unitary case. However, the final saturation value of multipartite entanglement is almost the same in bo…
▽ More
We study the growth of genuine multipartite entanglement in random quantum circuit models, which include random unitary circuit models and the random Clifford circuit. We find that for the random Clifford circuit, the growth of multipartite entanglement remains slower in comparison to the random unitary case. However, the final saturation value of multipartite entanglement is almost the same in both cases. The behavior is then compared to the genuine multipartite entanglement obtained in random matrix product states with a moderately high bond dimension. We then relate the behavior of multipartite entanglement to other global properties of the system, viz. the delocalization of the many-body wavefunctions in Hilbert space. Along with this, we analyze the robustness of such highly entangled quantum states obtained through random unitary dynamics under weak measurements.
△ Less
Submitted 7 January, 2021; v1 submitted 27 March, 2020;
originally announced March 2020.
-
Entanglement as geometry and flow
Authors:
Sudipto Singha Roy,
Silvia N. Santalla,
Javier Rodríguez-Laguna,
Germán Sierra
Abstract:
We explore the connection between the area law for entanglement and geometry by representing the entanglement entropies corresponding to all $2^N$ bipartitions of an $N$-party pure quantum system by means of a (generalized) adjacency matrix. In the cases where the representation is exact, the elements of that matrix coincide with the mutual information between pairs of sites. In others, it provide…
▽ More
We explore the connection between the area law for entanglement and geometry by representing the entanglement entropies corresponding to all $2^N$ bipartitions of an $N$-party pure quantum system by means of a (generalized) adjacency matrix. In the cases where the representation is exact, the elements of that matrix coincide with the mutual information between pairs of sites. In others, it provides a very good approximation, and in all the cases it yields a natural {\em entanglement contour} which is similar to previous proposals.Moreover, for one-dimensional conformal invariant systems, the generalized adjacency matrix is given by the two-point correlator of an {\em entanglement current} operator. We conjecture how this entanglement current may give rise to a metric entirely built from entanglement.
△ Less
Submitted 25 May, 2020; v1 submitted 12 June, 2019;
originally announced June 2019.
-
Nearly Markovian maps and entanglement-based bound on corresponding non-Markovianity
Authors:
Sreetama Das,
Sudipto Singha Roy,
Samyadeb Bhattacharya,
Ujjwal Sen
Abstract:
We identify a set of dynamical maps of open quantum system, and refer to them as "$ ε$-Markovian" maps. It is constituted of maps which, in a higher dimensional system-environment Hilbert space, possibly violate Born approximation but only a "little". We characterize the "$ε$-nonmarkovianity" of a general dynamical map by the minimum distance of that map from the set of $ε$-Markovian maps. We anal…
▽ More
We identify a set of dynamical maps of open quantum system, and refer to them as "$ ε$-Markovian" maps. It is constituted of maps which, in a higher dimensional system-environment Hilbert space, possibly violate Born approximation but only a "little". We characterize the "$ε$-nonmarkovianity" of a general dynamical map by the minimum distance of that map from the set of $ε$-Markovian maps. We analytically derive an inequality which gives a bound on the $ ε$-nonmarkovianity of the dynamical map, in terms of an entanglement-like resource generated between the system and its "immediate" environment. In the special case of a vanishing $ε$, this inequality gives a relation between the $ε$-nonmarkovianity of the reduced dynamical map on the system and the entanglement generated between the system and its immediate environment. We numerically investigate the behavior of the similar distant based measures of non-Markovianity for classes of amplitude dam** and phase dam** channels.
△ Less
Submitted 9 September, 2021; v1 submitted 15 May, 2019;
originally announced May 2019.
-
Trends of information backflow in disordered spin chains
Authors:
Sudipto Singha Roy,
Utkarsh Mishra,
Debraj Rakshit
Abstract:
We investigate the trends of information backflow associated with the dynamics of a sub-part of a disordered spin-1/2 transverse field Heisenberg chain for different regimes of the Hamiltonian. Towards this aim, the decay profile of bipartite entanglement shared between a probe-qubit and a system-qubit (sub-part) of the chain is monitored in time. A clear shift in the trends of the decay profiles…
▽ More
We investigate the trends of information backflow associated with the dynamics of a sub-part of a disordered spin-1/2 transverse field Heisenberg chain for different regimes of the Hamiltonian. Towards this aim, the decay profile of bipartite entanglement shared between a probe-qubit and a system-qubit (sub-part) of the chain is monitored in time. A clear shift in the trends of the decay profiles of the bipartite entanglement from monotonic in the low-disorder limit to non-monotonic in the moderately large disorder limit occurs due to strong information backflow from the environment (complementary-part) to the system-qubit. A connection between environmental interruption caused by the information backflow and the disorder strength is established by examining the entanglement revival frequencies. The growth patterns of the revival frequencies in the localized phase play an instrumental role to effectively distinguish an interacting system (many-body localized) from its non-interacting (Anderson localized) counterpart.
△ Less
Submitted 12 March, 2020; v1 submitted 20 November, 2018;
originally announced November 2018.
-
Reducing submodules of Hilbert Modules and Chevalley-Shephard-Todd Theorem
Authors:
Shibananda Biswas,
Swarnendu Datta,
Gargi Ghosh,
Subrata Shyam Roy
Abstract:
Let $G$ be a finite pseudoreflection group, $Ω\subseteq \mathbb C^n$ be a bounded domain which is a $G$-space and $\mathcal H\subseteq\mathcal O(Ω)$ be an analytic Hilbert module possessing a $G$-invariant reproducing kernel. We study the structure of joint reducing subspaces of the multiplication operator $\mathbf M_{\boldsymbolθ}$ on $\mathcal H,$ where $\{θ_i\}_{i=1}^n$ is a homogeneous system…
▽ More
Let $G$ be a finite pseudoreflection group, $Ω\subseteq \mathbb C^n$ be a bounded domain which is a $G$-space and $\mathcal H\subseteq\mathcal O(Ω)$ be an analytic Hilbert module possessing a $G$-invariant reproducing kernel. We study the structure of joint reducing subspaces of the multiplication operator $\mathbf M_{\boldsymbolθ}$ on $\mathcal H,$ where $\{θ_i\}_{i=1}^n$ is a homogeneous system of parameters associated to $G$ and $\boldsymbolθ= (θ_1, \ldots, θ_n)$ is a polynomial map of $\mathbb C^n$. We show that it admits a family $\{\mathbb P_\varrho\mathcal H:\varrho\in\widehat G\}$ of non-trivial joint reducing subspaces, where $\widehat G$ is the set of all equivalence classes of irreducible representations of $G.$ We prove a generalization of Chevalley-Shephard-Todd theorem for the algebra $\mathcal O(Ω)$ of holomorphic functions on $Ω$. As a consequence, we show that for each $\varrho\in \widehat G,$ the multiplication operator $\mathbf M_{\boldsymbolθ}$ on the reducing subspace $\mathbb P_\varrho \mathcal H$ can be realized as multiplication by the coordinate functions on a reproducing kernel Hilbert space of $\mathbb C^{(\mathrm{deg}\,\varrho)^2}$-valued holomorphic functions on $\boldsymbolθ(Ω)$. This, in turn, provides a description of the structure of joint reducing subspaces of the multiplication operator induced by a representative of a proper holomorphic map from a domain $Ω$ in $\mathbb C^n$ which is factored by automorphisms $G\subseteq {\rm Aut}(Ω).$
△ Less
Submitted 29 October, 2020; v1 submitted 15 November, 2018;
originally announced November 2018.
-
Effect of long-range interactions on multipartite entanglement in Heisenberg chains
Authors:
Sudipto Singha Roy,
Himadri Shekhar Dhar
Abstract:
It is well known that the notions of spatial locality are often lost in quantum systems with long-range interactions, as exhibited by the emergence of phases with exotic long-range order and faster propagation of quantum correlations. We demonstrate here that such induced ``quasinonlocal" effects do not necessarily translate to growth of global entanglement in the quantum system. By investigating…
▽ More
It is well known that the notions of spatial locality are often lost in quantum systems with long-range interactions, as exhibited by the emergence of phases with exotic long-range order and faster propagation of quantum correlations. We demonstrate here that such induced ``quasinonlocal" effects do not necessarily translate to growth of global entanglement in the quantum system. By investigating the ground and quenched states of the variable-range, spin-1/2 Heisenberg Hamiltonian, we observe that the genuine multiparty entanglement in the system can either increase or counterintuitively diminish with a growing range of interactions. The behavior is reflective of the underlying phase structure of the quantum system and provides key insights for generation of multipartite entanglement in experimental atomic, molecular, and optical physics where such variable-range interactions have been implemented.
△ Less
Submitted 17 June, 2019; v1 submitted 7 September, 2018;
originally announced September 2018.
-
Tensor-network approach to compute genuine multisite entanglement in infinite quantum spin chains
Authors:
Sudipto Singha Roy,
Himadri Shekhar Dhar,
Aditi Sen De,
Ujjwal Sen
Abstract:
We devise a method based on the tensor-network formalism to calculate genuine multisite entanglement in ground states of infinite spin chains containing spin-1/2 or spin-1 quantum particles. The ground state is obtained by employing an infinite time-evolving block decimation method acting upon an initial matrix product state for the infinite spin system. We explicitly show how such infinite matrix…
▽ More
We devise a method based on the tensor-network formalism to calculate genuine multisite entanglement in ground states of infinite spin chains containing spin-1/2 or spin-1 quantum particles. The ground state is obtained by employing an infinite time-evolving block decimation method acting upon an initial matrix product state for the infinite spin system. We explicitly show how such infinite matrix product states with translational invariance provide a natural framework to derive the generalized geometric measure, a computable measure of genuine multisite entanglement, in the thermodynamic limit of quantum many-body systems with both spin-1/2 and higher-spin particles.
△ Less
Submitted 6 June, 2019; v1 submitted 11 July, 2018;
originally announced July 2018.
-
Information-Theoretic Meaning of Quantum Information Flow and Its Applications to Amplitude Amplification Algorithms
Authors:
Sudipto Singha Roy,
Joonwoo Bae
Abstract:
The advantages of quantum information processing are in many cases obtained as consequences of quantum interactions, especially for computational tasks where two-qubit interactions are essential. In this work, we establish the framework of analyzing and quantifying loss or gain of information on a quantum system when the system interacts with its environment. We show that the information flow, the…
▽ More
The advantages of quantum information processing are in many cases obtained as consequences of quantum interactions, especially for computational tasks where two-qubit interactions are essential. In this work, we establish the framework of analyzing and quantifying loss or gain of information on a quantum system when the system interacts with its environment. We show that the information flow, the theoretical method of characterizing (non-)Markovianity of quantum dynamics, corresponds to the rate of the minimum uncertainty about the system given quantum side information. Thereafter, we analyze the information exchange among subsystems that are under the performance of quantum algorithms, in particular, the amplitude amplification algorithms where the computational process relies fully on quantum evolution. Different realizations of the algorithm are considered, such as i)quantum circuits, ii) analog computation, and iii) adiabatic computation. It is shown that, in all the cases, our formalism provides insights about the process of amplifying the amplitude from the information flow or leakage on the subsystems.
△ Less
Submitted 3 September, 2019; v1 submitted 14 May, 2018;
originally announced May 2018.
-
Fibonacci sequence and its generalizations in doped quantum spin ladders
Authors:
Sudipto Singha Roy,
Himadri Shekhar Dhar,
Aditi Sen De,
Ujjwal Sen
Abstract:
An interesting aspect of antiferromagnetic quantum spin ladders, with complete dimer coverings, is that the wave function can be recursively generated by estimating the number of coverings in the valence bond basis, which follow the fabled Fibonacci sequence. In this work, we derive generalized forms of this sequence for multi-legged and doped quantum spin ladders, which allow the corresponding di…
▽ More
An interesting aspect of antiferromagnetic quantum spin ladders, with complete dimer coverings, is that the wave function can be recursively generated by estimating the number of coverings in the valence bond basis, which follow the fabled Fibonacci sequence. In this work, we derive generalized forms of this sequence for multi-legged and doped quantum spin ladders, which allow the corresponding dimer-covered state to be recursively generated. We show that these sequences allow for estimation of physically and information-theoretically relevant quantities in large spin lattices without resorting to complex numerical methods. We apply the formalism to calculate the valence bond entanglement entropy, which is an important figure of merit for studying cooperative phenomena in quantum spin systems with SU(2) symmetry. We show that introduction of do** may mitigate, within the quarters of entanglement entropy, the dichotomy between odd- and even- legged quantum spin ladders.
△ Less
Submitted 4 February, 2019; v1 submitted 7 December, 2017;
originally announced December 2017.
-
The Agler-Young Class
Authors:
Tirthankar Bhattacharyya,
Subrata Shyam Roy,
Tapesh Yadav
Abstract:
This note introduces a special class of tuples of bounded operators on a Hilbert space. It is called the Agler Young class. Major results about this class include a Wold decomposition and a dilation theorem. The structure of the dilation is completely spelt out. A characterization of this class using the hereditary functional calculus of Agler is obtained and examples are discussed. Toeplitz opera…
▽ More
This note introduces a special class of tuples of bounded operators on a Hilbert space. It is called the Agler Young class. Major results about this class include a Wold decomposition and a dilation theorem. The structure of the dilation is completely spelt out. A characterization of this class using the hereditary functional calculus of Agler is obtained and examples are discussed. Toeplitz operators play a major role in this note. An Agler-Young pair arising from a truncated Toeplitz operator is characterized. Thus, we extend results obtained in the case of commuting operators by several authors over many decades to the non-commutative situation. The results for the commuting case can be recovered as special cases.
△ Less
Submitted 22 September, 2018; v1 submitted 4 December, 2017;
originally announced December 2017.
-
Benford analysis of quantum critical phenomena: First digit provides high finite-size scaling exponent while first two and further are not much better
Authors:
Anindita Bera,
Utkarsh Mishra,
Sudipto Singha Roy,
Anindya Biswas,
Aditi Sen De,
Ujjwal Sen
Abstract:
Benford's law is an empirical edict stating that the lower digits appear more often than higher ones as the first few significant digits in statistics of natural phenomena and mathematical tables. A marked proportion of such analyses is restricted to the first significant digit. We employ violation of Benford's law, up to the first four significant digits, for investigating magnetization and corre…
▽ More
Benford's law is an empirical edict stating that the lower digits appear more often than higher ones as the first few significant digits in statistics of natural phenomena and mathematical tables. A marked proportion of such analyses is restricted to the first significant digit. We employ violation of Benford's law, up to the first four significant digits, for investigating magnetization and correlation data of paradigmatic quantum many-body systems to detect cooperative phenomena, focusing on the finite-size scaling exponents thereof. We find that for the transverse field quantum XY model, behavior of the very first significant digit of an observable, at an arbitrary point of the parameter space, is enough to capture the quantum phase transition in the model with a relatively high scaling exponent. A higher number of significant digits do not provide an appreciable further advantage, in particular, in terms of an increase in scaling exponents. Since the first significant digit of a physical quantity is relatively simple to obtain in experiments, the results have potential implications for laboratory observations in noisy environments.
△ Less
Submitted 13 July, 2018; v1 submitted 2 November, 2017;
originally announced November 2017.
-
Adiabatic freezing of entanglement with insertion of defects in a one-dimensional Hubbard model
Authors:
Sreetama Das,
Sudipto Singha Roy,
Himadri Shekhar Dhar,
Debraj Rakshit,
Aditi Sen De,
Ujjwal Sen
Abstract:
We report on ground state phases of a doped one-dimensional Hubbard model, which for large onsite interactions is governed by the $t$-$J$ Hamiltonian, where the extant entanglement is immutable under perturbative or sudden changes of system parameters, a phenomenon termed as adiabatic freezing. We observe that in the metallic Luttinger liquid phase of the model bipartite entanglement decays polyno…
▽ More
We report on ground state phases of a doped one-dimensional Hubbard model, which for large onsite interactions is governed by the $t$-$J$ Hamiltonian, where the extant entanglement is immutable under perturbative or sudden changes of system parameters, a phenomenon termed as adiabatic freezing. We observe that in the metallic Luttinger liquid phase of the model bipartite entanglement decays polynomially and is adiabatically frozen, in contrast to the variable, exponential decay in the phase-separation and superconducting spin-gap phases. Significantly, at low fixed electron densities, the spin-gap phase shows remarkable affinity to doped resonating valence bond gas, with multipartite entanglement frozen across all parameter space. We note that entanglement, in general, is sensitive to external perturbation, as observed in several systems, and hitherto, no such invariance or freezing behavior has been reported.
△ Less
Submitted 14 September, 2018; v1 submitted 23 August, 2017;
originally announced August 2017.
-
Reducing sub-modules of the Bergman module $\mathbb A^{(λ)}(\mathbb D^n)$ under the action of the symmetric group
Authors:
Shibananda Biswas,
Gargi Ghosh,
Gadadhar Misra,
Subrata Shyam Roy
Abstract:
The weighted Bergman spaces on the polydisc, $\mathbb A^{(λ)}(\mathbb D^n)$, $λ>0,$ splits into orthogonal direct sum of subspaces $\mathbb P_{\boldsymbol p}\big(\mathbb A^{(λ)}(\mathbb D^n)\big)$ indexed by the partitions $\boldsymbol p$ of $n,$ which are in one to one correspondence with the equivalence classes of the irreducible representations of the symmetric group on $n$ symbols. In this pap…
▽ More
The weighted Bergman spaces on the polydisc, $\mathbb A^{(λ)}(\mathbb D^n)$, $λ>0,$ splits into orthogonal direct sum of subspaces $\mathbb P_{\boldsymbol p}\big(\mathbb A^{(λ)}(\mathbb D^n)\big)$ indexed by the partitions $\boldsymbol p$ of $n,$ which are in one to one correspondence with the equivalence classes of the irreducible representations of the symmetric group on $n$ symbols. In this paper, we prove that each sub-module $\mathbb P_{\boldsymbol p}\big(\mathbb A^{(λ)}(\mathbb D^n)\big)$ is a locally free Hilbert module of rank equal to square of the dimension $χ_{\boldsymbol p}(1)$ of the corresponding irreducible representation. It is shown that given two partitions $\boldsymbol p$ and $\boldsymbol q$, if $χ_{\boldsymbol p}(1) \ne χ_{\boldsymbol q}(1),$ then the sub-modules $\mathbb P_{\boldsymbol p}\big (\mathbb A^{(λ)}(\mathbb D^n)\big )$ and $\mathbb P_{\boldsymbol q}\big (\mathbb A^{(λ)}(\mathbb D^n)\big )$ are not equivalent. We prove that for the trivial and the sign representation corresponding to the partitions $\boldsymbol p = (n)$ and $\boldsymbol p = (1,\ldots,1)$, respectively, the sub-modules $\mathbb P_{(n)}\big(\mathbb A^{(λ)}(\mathbb D^n)\big)$ and $\mathbb P_{(1,\ldots,1)}\big(\mathbb A^{(λ)}(\mathbb D^n)\big)$ are inequivalent. In particular, for $n=3$, we show that all the sub-modules in this decomposition are inequivalent.
△ Less
Submitted 18 July, 2017; v1 submitted 10 July, 2017;
originally announced July 2017.
-
Wave-particle duality employing quantum coherence in superposition with non-orthogonal pointers
Authors:
Sreetama Das,
Chiranjib Mukhopadhyay,
Sudipto Singha Roy,
Samyadeb Bhattacharya,
Aditi Sen De,
Ujjwal Sen
Abstract:
We propose the notion of quantum coherence for superpositions over states which are not necessarily mutually orthogonal. This anticipatedly leads to a resource theory of non-orthogonal coherence. We characterize free states and free operations in this theory, and connect the latter with free operations in the resource theory of quantum coherence for orthogonal bases. We show that the concept of no…
▽ More
We propose the notion of quantum coherence for superpositions over states which are not necessarily mutually orthogonal. This anticipatedly leads to a resource theory of non-orthogonal coherence. We characterize free states and free operations in this theory, and connect the latter with free operations in the resource theory of quantum coherence for orthogonal bases. We show that the concept of non-orthogonal coherence naturally furnishes us with a wave-particle duality in quantum double-slit experiments where the channels beyond the slits are leaky between them. Furthermore, we demonstrate existence of a unique maximally coherent qubit state corresponding to any given purity. In addition, and in contradistinction with the case of orthogonal bases, there appears a non-trivial minimally coherent qubit state for a given purity. We also study the behavior of quantum coherence for some typical configurations of non-orthogonal bases which have no analogs for orthogonal bases. We further investigate the problem of determining the energy cost of creating non-orthogonal coherence, and find that it scales linearly with the non-orthogonal coherence created.
△ Less
Submitted 1 April, 2020; v1 submitted 11 May, 2017;
originally announced May 2017.
-
Quantum discord and its allies: a review
Authors:
Anindita Bera,
Tamoghna Das,
Debasis Sadhukhan,
Sudipto Singha Roy,
Aditi Sen De,
Ujjwal Sen
Abstract:
We review concepts and methods associated with quantum discord and related topics. We also describe their possible connections with other aspects of quantum information and beyond, including quantum communication, quantum computation, many-body physics, and open quantum dynamics. Quantum discord in the multiparty regime and its applications are also discussed.
We review concepts and methods associated with quantum discord and related topics. We also describe their possible connections with other aspects of quantum information and beyond, including quantum communication, quantum computation, many-body physics, and open quantum dynamics. Quantum discord in the multiparty regime and its applications are also discussed.
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
Detecting phase boundaries of quantum spin-1/2 XXZ ladder via bipartite and multipartite entanglement transitions
Authors:
Sudipto Singha Roy,
Himadri Shekhar Dhar,
Debraj Rakshit,
Aditi Sen De,
Ujjwal Sen
Abstract:
Phase transition in quantum many-body systems inevitably causes changes in certain physical properties which then serve as potential indicators of critical phenomena. Besides the traditional order parameters, characterization of quantum entanglement has proven to be a computationally efficient and successful method for detection of phase boundaries, especially in one-dimensional models. Here we de…
▽ More
Phase transition in quantum many-body systems inevitably causes changes in certain physical properties which then serve as potential indicators of critical phenomena. Besides the traditional order parameters, characterization of quantum entanglement has proven to be a computationally efficient and successful method for detection of phase boundaries, especially in one-dimensional models. Here we determine the rich phase diagram of the ground states of a quantum spin-1/2 XXZ ladder by analyzing the variation of bipartite and multipartite entanglements. Our study characterizes the different ground state phases and notes the correspondence with known results, while highlighting the finer details that emerge from the behavior of ground state entanglement. Analysis of entanglement in the ground state provides a clearer picture of the complex ground state phase diagram of the system using only a moderate-size model.
△ Less
Submitted 20 December, 2016;
originally announced December 2016.
-
Effects of cavity-cavity interaction on the entanglement dynamics of a generalized double Jaynes-Cummings model
Authors:
Mahasweta Pandit,
Sreetama Das,
Sudipto Singha Roy,
Himadri Shekhar Dhar,
Ujjwal Sen
Abstract:
We consider a generalized double Jaynes-Cummings model consisting of two isolated two-level atoms, each contained in a lossless cavity, with the cavities interacting with each other through a controlled photon hop** mechanism. The temporal dynamics of entanglement between the two atoms, as the atom-cavity system evolves with time, is investigated for different values of the mediated cavity-cavit…
▽ More
We consider a generalized double Jaynes-Cummings model consisting of two isolated two-level atoms, each contained in a lossless cavity, with the cavities interacting with each other through a controlled photon hop** mechanism. The temporal dynamics of entanglement between the two atoms, as the atom-cavity system evolves with time, is investigated for different values of the mediated cavity-cavity interaction. We analytically show that at low values of such an interaction, entanglement between the atoms evolves under the effects of cavity perturbation and exhibits the well-known phenomenon of entanglement sudden death. Interestingly, using moderately large values of the interaction, a complete preclusion of sudden death of entanglement can be achieved, irrespective of its value in the initial two-atom state. Our results, thus allow us to design a model to sustain bipartite entanglement between two atomic qubits under the adverse effect of cavity induced environmental perturbation, by introducing a non-intrusive inter-cavity photon exchange that can be physically realized through cavity-QED setups in contemporary experiments. For completeness, we also compare the effects of inter-cavity interaction on entanglement with the case of direct spin-exchange interaction between the two isolated atoms.
△ Less
Submitted 3 September, 2017; v1 submitted 4 December, 2016;
originally announced December 2016.
-
Response to defects in multi- and bipartite entanglement of isotropic quantum spin networks
Authors:
Sudipto Singha Roy,
Himadri Shekhar Dhar,
Debraj Rakshit,
Aditi Sen De,
Ujjwal Sen
Abstract:
Quantum networks are an integral component in performing efficient computation and communication tasks that are not accessible using classical systems. A key aspect in designing an effective and scalable quantum network is generating entanglement between its nodes, which is robust against defects in the network. We consider an isotropic quantum network of spin-1/2 particles with a finite fraction…
▽ More
Quantum networks are an integral component in performing efficient computation and communication tasks that are not accessible using classical systems. A key aspect in designing an effective and scalable quantum network is generating entanglement between its nodes, which is robust against defects in the network. We consider an isotropic quantum network of spin-1/2 particles with a finite fraction of defects, where the corresponding wave function of the network is rotationally invariant under the action of local unitaries, and we show that any reduced density matrix also remains unaltered under the local actions. By using quantum information-theoretic concepts like strong subadditivity of von Neumann entropy and approximate quantum telecloning, we prove analytically that in the presence of defects, caused by loss of a finite fraction of spins, the network sustains genuine multisite entanglement, and at the same time may exhibit finite moderate-range bipartite entanglement, in contrast to the network with no defects.
△ Less
Submitted 9 July, 2018; v1 submitted 18 July, 2016;
originally announced July 2016.
-
Analytical recursive method to ascertain multisite entanglement in doped quantum spin ladders
Authors:
Sudipto Singha Roy,
Himadri Shekhar Dhar,
Debraj Rakshit,
Aditi Sen De,
Ujjwal Sen
Abstract:
We formulate an analytical recursive method to generate the wave function of doped short-range resonating valence bond (RVB) states as a tool to efficiently estimate multisite entanglement as well as other physical quantities in doped quantum spin ladders. We prove that doped RVB ladder states are always genuine multipartite entangled. Importantly, our results show that within specific do** conc…
▽ More
We formulate an analytical recursive method to generate the wave function of doped short-range resonating valence bond (RVB) states as a tool to efficiently estimate multisite entanglement as well as other physical quantities in doped quantum spin ladders. We prove that doped RVB ladder states are always genuine multipartite entangled. Importantly, our results show that within specific do** concentration and model parameter regimes, the doped RVB state essentially characterizes the trends of genuine multiparty entanglement in the exact ground states of the Hubbard model with large onsite interactions, in the limit which yields the $t$-$J$ Hamiltonian.
△ Less
Submitted 2 August, 2017; v1 submitted 22 April, 2016;
originally announced April 2016.