-
Reusable Formal Verification of DAG-based Consensus Protocols
Authors:
Nathalie Bertrand,
Pranav Ghorpade,
Sasha Rubin,
Bernhard Scholz,
Pavle Subotic
Abstract:
DAG-based consensus protocols are being adoption by blockchain companies to decrease energy footprints and improve security. A DAG-based consensus protocol collaboratively constructs a partial order of blocks of transactions and produces linearly ordered blocks. The ubiquity and strategic importance of blockchains call for formal proof of the correctness of key components, namely, consensus protoc…
▽ More
DAG-based consensus protocols are being adoption by blockchain companies to decrease energy footprints and improve security. A DAG-based consensus protocol collaboratively constructs a partial order of blocks of transactions and produces linearly ordered blocks. The ubiquity and strategic importance of blockchains call for formal proof of the correctness of key components, namely, consensus protocols. This paper presents a safety-proven formal specification of two DAG-based protocols. Our specification highlights several dissemination, DAG construction, and ordering variations that can be combined to express the two protocols. The formalization requires a refinement approach for modeling the consensus. In an abstract model, we first show the safety of DAG-based consensus on leader blocks and then further refine the specification to encompass all blocks for all processes. The TLA+ specification for a given protocol consists of 492-732 lines, and the proof system TLAPS verifies 2025-2294 obligations in 6-8 minutes.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Cloudprofiler: TSC-based inter-node profiling and high-throughput data ingestion for cloud streaming workloads
Authors:
Shinhyung Yang,
Jiun Jeong,
Bernhard Scholz,
Bernd Burgstaller
Abstract:
To conduct real-time analytics computations, big data stream processing engines are required to process unbounded data streams at millions of events per second. However, current streaming engines exhibit low throughput and high tuple processing latency. Performance engineering is complicated by the fact that streaming engines constitute complex distributed systems consisting of multiple nodes in t…
▽ More
To conduct real-time analytics computations, big data stream processing engines are required to process unbounded data streams at millions of events per second. However, current streaming engines exhibit low throughput and high tuple processing latency. Performance engineering is complicated by the fact that streaming engines constitute complex distributed systems consisting of multiple nodes in the cloud. A profiling technique is required that is capable of measuring time durations at high accuracy across nodes. Standard clock synchronization techniques such as the network time protocol (NTP) are limited to millisecond accuracy, and hence cannot be used.
We propose a profiling technique that relates the time-stamp counters (TSCs) of nodes to measure the duration of events in a streaming framework. The precision of the TSC relation determines the accuracy of the measured duration. The TSC relation is conducted in quiescent periods of the network to achieve accuracy in the tens of microseconds. We propose a throughput-controlled data generator to reliably determine the sustainable throughput of a streaming engine. To facilitate high-throughput data ingestion, we propose a concurrent object factory that moves the deserialization overhead of incoming data tuples off the critical path of the streaming framework. The evaluation of the proposed techniques within the Apache Storm streaming framework on the Google Compute Engine public cloud shows that data ingestion increases from $700$ $\text{k}$ to $4.68$ $\text{M}$ tuples per second, and that time durations can be profiled at a measurement accuracy of $92$ $μ\text{s}$, which is three orders of magnitude higher than the accuracy of NTP, and one order of magnitude higher than prior work.
△ Less
Submitted 10 August, 2023; v1 submitted 19 May, 2022;
originally announced May 2022.
-
Julia Cloud Matrix Machine: Dynamic Matrix Language Acceleration on Multicore Clusters in the Cloud
Authors:
Jay Hwan Lee,
Yeonsoo Kim,
Younghyun Ryu,
Wasuwee Sodsong,
Hyunjun Jeon,
**sik Park,
Bernd Burgstaller,
Bernhard Scholz
Abstract:
In emerging scientific computing environments, matrix computations of increasing size and complexity are increasingly becoming prevalent. However, contemporary matrix language implementations are insufficient in their support for efficient utilization of cloud computing resources, particularly on the user side. We thus developed an extension of the Julia high-performance computation language such…
▽ More
In emerging scientific computing environments, matrix computations of increasing size and complexity are increasingly becoming prevalent. However, contemporary matrix language implementations are insufficient in their support for efficient utilization of cloud computing resources, particularly on the user side. We thus developed an extension of the Julia high-performance computation language such that matrix computations are automatically parallelized in the cloud, where users are separated from directly interacting with complex explicitly-parallel computations. We implement lazy evaluation semantics combined with directed graphs to optimize matrix operations on the fly while dynamic simulation finds the optimal tile size and schedule for a given cluster of cloud nodes. A time model prediction of the cluster's performance capacity is constructed to enable simulations. Automatic configuration of communication and worker processes on the cloud networks allow for the framework to automatically scale up for clusters of heterogeneous nodes. Our framework's experimental evaluation comprises eleven benchmarks on an fourteen node (564 CPUs) cluster in the AWS public cloud, revealing speedups of up to a factor of 5.1, with an average 74.39% of the upper bound for speedups.
△ Less
Submitted 8 December, 2023; v1 submitted 15 May, 2022;
originally announced May 2022.
-
The Choice Construct in the Souffle Language
Authors:
Xiaowen Hu,
Joshua Karp,
David Zhao,
Abdul Zreika,
Xi Wu,
Bernhard Scholz
Abstract:
Datalog has become a popular implementation language for solving large-scale, real-world problems, including bug finders, network analysis tools, and disassemblers. These applications express complex behaviour with hundreds of relations and rules that often require a non-deterministic choice for tuples in relations to express worklist algorithms. This work is an experience report that describes th…
▽ More
Datalog has become a popular implementation language for solving large-scale, real-world problems, including bug finders, network analysis tools, and disassemblers. These applications express complex behaviour with hundreds of relations and rules that often require a non-deterministic choice for tuples in relations to express worklist algorithms. This work is an experience report that describes the implementation of a choice construct in the Datalog engine Souffle. With the choice construct, we can express worklist algorithms such as spanning trees in a few lines of code. We highlight the differences between rule-based choice as described in prior work, and relation-based choice introduced by this work. We show that a choice construct enables certain worklist algorithms to be computed up to 10kx faster than having no choice construct.
△ Less
Submitted 25 August, 2021;
originally announced August 2021.
-
Worst-Case Optimal Radix Triejoin
Authors:
Alan Fekete,
Brody Franks,
Herbert Jordan,
Bernhard Scholz
Abstract:
Relatively recently, the field of join processing has been swayed by the discovery of a new class of multi-way join algorithms. The new algorithms join multiple relations simultaneously rather than perform a series of pairwise joins. The new join algorithms satisfy stronger worst-case runtime complexity guarantees than any of the existing approaches based on pairwise joins -- they are worst-case o…
▽ More
Relatively recently, the field of join processing has been swayed by the discovery of a new class of multi-way join algorithms. The new algorithms join multiple relations simultaneously rather than perform a series of pairwise joins. The new join algorithms satisfy stronger worst-case runtime complexity guarantees than any of the existing approaches based on pairwise joins -- they are worst-case optimal in data complexity. These research efforts have resulted in a flurry of papers documenting theoretical and some practical contributions. However, there is still the quest of making the new worst-case optimal join algorithms truly practical in terms of (1) ease of implementation and (2) secondary index efficiency in terms of number of indexes created to answer a query.
In this paper, we present a simple worst-case optimal multi-way join algorithm called the radix triejoin. Radix triejoin uses a binary encoding for reducing the domain of a database. Our main technical contribution is that domain reduction allows a bit-interleaving of attribute values that gives rise to a query-independent relation representation, permitting the computation of multiple queries over the same relations worst-case optimally without having to construct additional secondary indexes. We also generalise the core algorithm to conjunctive queries with inequality constraints and provide a new proof technique for the worst-case optimal join result.
△ Less
Submitted 29 December, 2019;
originally announced December 2019.
-
The Economics of Smart Contracts
Authors:
Kirk Baird,
Seongho Jeong,
Yeonsoo Kim,
Bernd Burgstaller,
Bernhard Scholz
Abstract:
Ethereum is a distributed blockchain that can execute smart contracts, which inter-communicate and perform transactions automatically. The execution of smart contracts is paid in the form of gas, which is a monetary unit used in the Ethereum blockchain. The Ethereum Virtual Machine (EVM) provides the metering capability for smart contract execution. Instruction costs vary depending on the instruct…
▽ More
Ethereum is a distributed blockchain that can execute smart contracts, which inter-communicate and perform transactions automatically. The execution of smart contracts is paid in the form of gas, which is a monetary unit used in the Ethereum blockchain. The Ethereum Virtual Machine (EVM) provides the metering capability for smart contract execution. Instruction costs vary depending on the instruction type and the approximate computational resources required to execute the instruction on the network. The cost of gas is adjusted using transaction fees to ensure adequate payment of the network. In this work, we highlight the "real" economics of smart contracts. We show that the actual costs of executing smart contracts are disproportionate to the computational costs and that this gap is continuously widening. We show that the gas cost-model of the underlying EVM instruction-set is wrongly modeled. Specifically, the computational cost for the SLOAD instruction increases with the length of the blockchain. Our proposed performance model estimates gas usage and execution time of a smart contract at a given block-height. The new gas-cost model incorporates the block-height to eliminate irregularities in the Ethereum gas calculations. Our findings are based on extensive experiments over the entire history of the EVM blockchain.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Provenance for Large-scale Datalog
Authors:
David Zhao,
Pavle Subotic,
Bernhard Scholz
Abstract:
Logic programming languages such as Datalog have become popular as Domain Specific Languages (DSLs) for solving large-scale, real-world problems, in particular, static program analysis and network analysis. The logic specifications which model analysis problems, process millions of tuples of data and contain hundreds of highly recursive rules. As a result, they are notoriously difficult to debug.…
▽ More
Logic programming languages such as Datalog have become popular as Domain Specific Languages (DSLs) for solving large-scale, real-world problems, in particular, static program analysis and network analysis. The logic specifications which model analysis problems, process millions of tuples of data and contain hundreds of highly recursive rules. As a result, they are notoriously difficult to debug. While the database community has proposed several data-provenance techniques that address the Declarative Debugging Challenge for Databases, in the cases of analysis problems, these state-of-the-art techniques do not scale.
In this paper, we introduce a novel bottom-up Datalog evaluation strategy for debugging: our provenance evaluation strategy relies on a new provenance lattice that includes proof annotations, and a new fixed-point semantics for semi-naive evaluation. A debugging query mechanism allows arbitrary provenance queries, constructing partial proof trees of tuples with minimal height. We integrate our technique into Souffle, a Datalog engine that synthesizes C++ code, and achieve high performance by using specialized parallel data structures. Experiments are conducted with DOOP/DaCapo, producing proof annotations for tens of millions of output tuples. We show that our method has a runtime overhead of 1.27x on average while being more flexible than existing state-of-the-art techniques.
△ Less
Submitted 11 July, 2019;
originally announced July 2019.
-
Computing Quantum Channel Capacities
Authors:
Navneeth Ramakrishnan,
Raban Iten,
Volkher B. Scholz,
Mario Berta
Abstract:
The capacity of noisy quantum channels characterizes the highest rate at which information can be reliably transmitted and it is therefore of practical as well as fundamental importance. Capacities of classical channels are computed using alternating optimization schemes, called Blahut-Arimoto algorithms. In this work, we generalize classical Blahut-Arimoto algorithms to the quantum setting. In pa…
▽ More
The capacity of noisy quantum channels characterizes the highest rate at which information can be reliably transmitted and it is therefore of practical as well as fundamental importance. Capacities of classical channels are computed using alternating optimization schemes, called Blahut-Arimoto algorithms. In this work, we generalize classical Blahut-Arimoto algorithms to the quantum setting. In particular, we give efficient iterative schemes to compute the capacity of channels with classical input and quantum output, the quantum capacity of less noisy channels, the thermodynamic capacity of quantum channels, as well as the entanglement-assisted capacity of quantum channels. We give rigorous a priori and a posteriori bounds on the estimation error by employing quantum entropy inequalities and demonstrate fast convergence of our algorithms in numerical experiments.
△ Less
Submitted 1 July, 2021; v1 submitted 3 May, 2019;
originally announced May 2019.
-
First Observation Of Coherent Elastic Neutrino-Nucleus Scattering
Authors:
Bjorn J. Scholz
Abstract:
Coherent elastic neutrino-nucleus scattering (CE$ν$NS) has the largest predicted cross-section of all low-energy neutrino couplings. However, as a neutral-current interaction, the only experimental signature of CE$ν$NS is a low-energy nuclear recoil, which made its detection challenging. CE$ν$NS remained unobserved for over four decades. This thesis describes the experiment that resulted in a CE…
▽ More
Coherent elastic neutrino-nucleus scattering (CE$ν$NS) has the largest predicted cross-section of all low-energy neutrino couplings. However, as a neutral-current interaction, the only experimental signature of CE$ν$NS is a low-energy nuclear recoil, which made its detection challenging. CE$ν$NS remained unobserved for over four decades. This thesis describes the experiment that resulted in a CE$ν$NS observation at a 6.7-sigma confidence level. A low-background, 14.6-kg CsI[Na] scintillator was exposed to the neutrino emissions from the Spallation Neutron Source at Oak Ridge National Laboratory. Characteristic CE$ν$NS signatures in energy and time, compatible with predictions from the Standard Model, were observed in high signal-to-background conditions. CE$ν$NS provides new opportunities to study neutrino properties, and enables the miniaturization of detectors.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
Vandal: A Scalable Security Analysis Framework for Smart Contracts
Authors:
Lexi Brent,
Anton Jurisevic,
Michael Kong,
Eric Liu,
Francois Gauthier,
Vincent Gramoli,
Ralph Holz,
Bernhard Scholz
Abstract:
The rise of modern blockchains has facilitated the emergence of smart contracts: autonomous programs that live and run on the blockchain. Smart contracts have seen a rapid climb to prominence, with applications predicted in law, business, commerce, and governance.
Smart contracts are commonly written in a high-level language such as Ethereum's Solidity, and translated to compact low-level byteco…
▽ More
The rise of modern blockchains has facilitated the emergence of smart contracts: autonomous programs that live and run on the blockchain. Smart contracts have seen a rapid climb to prominence, with applications predicted in law, business, commerce, and governance.
Smart contracts are commonly written in a high-level language such as Ethereum's Solidity, and translated to compact low-level bytecode for deployment on the blockchain. Once deployed, the bytecode is autonomously executed, usually by a %Turing-complete virtual machine. As with all programs, smart contracts can be highly vulnerable to malicious attacks due to deficient programming methodologies, languages, and toolchains, including buggy compilers. At the same time, smart contracts are also high-value targets, often commanding large amounts of cryptocurrency. Hence, developers and auditors need security frameworks capable of analysing low-level bytecode to detect potential security vulnerabilities.
In this paper, we present Vandal: a security analysis framework for Ethereum smart contracts. Vandal consists of an analysis pipeline that converts low-level Ethereum Virtual Machine (EVM) bytecode to semantic logic relations. Users of the framework can express security analyses in a declarative fashion: a security analysis is expressed in a logic specification written in the \souffle language. We conduct a large-scale empirical study for a set of common smart contract security vulnerabilities, and show the effectiveness and efficiency of Vandal. Vandal is both fast and robust, successfully analysing over 95\% of all 141k unique contracts with an average runtime of 4.15 seconds; outperforming the current state of the art tools---Oyente, EthIR, Mythril, and Rattle---under equivalent conditions.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Confidence Polytopes in Quantum State Tomography
Authors:
**zhao Wang,
Volkher B. Scholz,
Renato Renner
Abstract:
Quantum State Tomography is the task of inferring the state of a quantum system from measurement data. A reliable tomography scheme should not only report an estimate for that state, but also well-justified error bars. These may be specified in terms of confidence regions, i.e., subsets of the state space which contain the system's state with high probability. Here, building upon a quantum general…
▽ More
Quantum State Tomography is the task of inferring the state of a quantum system from measurement data. A reliable tomography scheme should not only report an estimate for that state, but also well-justified error bars. These may be specified in terms of confidence regions, i.e., subsets of the state space which contain the system's state with high probability. Here, building upon a quantum generalisation of Clopper-Pearson confidence intervals--a notion known from classical statistics--we present a simple and reliable scheme for generating confidence regions. These have the shape of a polytope and can be computed efficiently. We provide several examples to demonstrate the practical usability of the scheme in experiments.
△ Less
Submitted 29 August, 2018;
originally announced August 2018.
-
COHERENT Collaboration data release from the first observation of coherent elastic neutrino-nucleus scattering
Authors:
COHERENT Collaboration,
D. Akimov,
J. B. Albert,
P. An,
C. Awe,
P. S. Barbeau,
B. Becker,
V. Belov,
M. A. Blackston,
A. Bolozdynya,
A. Brown,
A. Burenkov,
B. Cabrera-Palmer,
M. Cervantes,
J. I. Collar,
R. J. Cooper,
R. L. Cooper,
C. Cuesta,
J. Daughhetee,
D. J. Dean,
M. del Valle Coello,
J. Detwiler,
M. D'Onofrio,
A. Eberhardt,
Y. Efremenko
, et al. (69 additional authors not shown)
Abstract:
This release includes data and information necessary to perform independent analyses of the COHERENT result presented in Akimov et al., arXiv:1708.01294 [nucl-ex]. Data is shared in a binned, text-based format, including both "signal" and "background" regions, so that counts and associated uncertainties can be quantitatively calculated for the purpose of separate analyses. This document describes…
▽ More
This release includes data and information necessary to perform independent analyses of the COHERENT result presented in Akimov et al., arXiv:1708.01294 [nucl-ex]. Data is shared in a binned, text-based format, including both "signal" and "background" regions, so that counts and associated uncertainties can be quantitatively calculated for the purpose of separate analyses. This document describes the included information and its format, offering some guidance on use of the data. Accompanying code examples show basic interaction with the data using Python.
△ Less
Submitted 25 April, 2018;
originally announced April 2018.
-
COHERENT 2018 at the Spallation Neutron Source
Authors:
D. Akimov,
J. B. Albert,
P. An,
C. Awe,
P. S. Barbeau,
B. Becker,
V. Belov,
M. A. Blackston,
A. Bolozdynya,
A. Brown,
A. Burenkov,
B. Cabrera-Palmer,
M. Cervantes,
J. I. Collar,
R. J. Cooper,
R. L. Cooper,
J. Daughhetee,
D. J. Dean,
M. del Valle Coello,
J. A. Detwiler,
M. D'Onofrio,
Y. Efremenko,
S. R. Elliott,
E. Erkela,
A. Etenko
, et al. (54 additional authors not shown)
Abstract:
The primary goal of the COHERENT collaboration is to measure and study coherent elastic neutrino-nucleus scattering (CEvNS) using the high-power, few-tens-of-MeV, pulsed source of neutrinos provided by the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory (ORNL). The COHERENT collaboration reported the first detection of CEvNS [Akimov:2017ade] using a CsI[Na] detector. At present th…
▽ More
The primary goal of the COHERENT collaboration is to measure and study coherent elastic neutrino-nucleus scattering (CEvNS) using the high-power, few-tens-of-MeV, pulsed source of neutrinos provided by the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory (ORNL). The COHERENT collaboration reported the first detection of CEvNS [Akimov:2017ade] using a CsI[Na] detector. At present the collaboration is deploying four detector technologies: a CsI[Na] scintillating crystal, p-type point-contact germanium detectors, single-phase liquid argon, and NaI[Tl] crystals. All detectors are located in the neutron-quiet basement of the SNS target building at distances 20-30 m from the SNS neutrino source. The simultaneous measurement in all four COHERENT detector subsystems will test the $N^2$ dependence of the cross section and search for new physics. In addition, COHERENT is measuring neutrino-induced neutrons from charged- and neutral-current neutrino interactions on nuclei in shielding materials, which represent a non-negligible background for CEvNS as well as being of intrinsic interest. The Collaboration is planning as well to look for charged-current interactions of relevance to supernova and weak-interaction physics. This document describes concisely the COHERENT physics motivations, sensitivity, and next plans for measurements at the SNS to be accomplished on a few-year timescale.
△ Less
Submitted 2 April, 2018; v1 submitted 24 March, 2018;
originally announced March 2018.
-
SPARK: Static Program Analysis Reasoning and Retrieving Knowledge
Authors:
Wasuwee Sodsong,
Bernhard Scholz,
Sanjay Chawla
Abstract:
Program analysis is a technique to reason about programs without executing them, and it has various applications in compilers, integrated development environments, and security. In this work, we present a machine learning pipeline that induces a security analyzer for programs by example. The security analyzer determines whether a program is either secure or insecure based on symbolic rules that we…
▽ More
Program analysis is a technique to reason about programs without executing them, and it has various applications in compilers, integrated development environments, and security. In this work, we present a machine learning pipeline that induces a security analyzer for programs by example. The security analyzer determines whether a program is either secure or insecure based on symbolic rules that were deduced by our machine learning pipeline. The machine pipeline is two-staged consisting of a Recurrent Neural Networks (RNN) and an Extractor that converts an RNN to symbolic rules.
To evaluate the quality of the learned symbolic rules, we propose a sampling-based similarity measurement between two infinite regular languages. We conduct a case study using real-world data. In this work, we discuss the limitations of existing techniques and possible improvements in the future. The results show that with sufficient training data and a fair distribution of program paths it is feasible to deducing symbolic security rules for the OpenJDK library with millions lines of code.
△ Less
Submitted 3 November, 2017;
originally announced November 2017.
-
Thermal States as Convex Combinations of Matrix Product States
Authors:
Mario Berta,
Fernando G. S. L. Brandao,
Jutho Haegeman,
Volkher B. Scholz,
Frank Verstraete
Abstract:
We study thermal states of strongly interacting quantum spin chains and prove that those can be represented in terms of convex combinations of matrix product states. Apart from revealing new features of the entanglement structure of Gibbs states our results provide a theoretical justification for the use of White's algorithm of minimally entangled typical thermal states. Furthermore, we shed new l…
▽ More
We study thermal states of strongly interacting quantum spin chains and prove that those can be represented in terms of convex combinations of matrix product states. Apart from revealing new features of the entanglement structure of Gibbs states our results provide a theoretical justification for the use of White's algorithm of minimally entangled typical thermal states. Furthermore, we shed new light on time dependent matrix product state algorithms which yield hydrodynamical descriptions of the underlying dynamics.
△ Less
Submitted 28 December, 2018; v1 submitted 21 September, 2017;
originally announced September 2017.
-
Optimal On The Fly Index Selection in Polynomial Time
Authors:
Herbert Jordan,
Bernhard Scholz,
Pavle Subotić
Abstract:
The index selection problem (ISP) is an important problem for accelerating the execution of relational queries, and it has received a lot of attention as a combinatorial knapsack problem in the past. Various solutions to this very hard problem have been provided. In contrast to existing literature, we change the underlying assumptions of the problem definition: we adapt the problem for systems tha…
▽ More
The index selection problem (ISP) is an important problem for accelerating the execution of relational queries, and it has received a lot of attention as a combinatorial knapsack problem in the past. Various solutions to this very hard problem have been provided. In contrast to existing literature, we change the underlying assumptions of the problem definition: we adapt the problem for systems that store relations in memory, and use complex specification languages, e.g., Datalog. In our framework, we decompose complex queries into primitive searches that select tuples in a relation for which an equality predicate holds. A primitive search can be accelerated by an index exhibiting a worst-case run-time complexity of log-linear time in the size of the output result of the primitive search. However, the overheads associated with maintaining indexes are very costly in terms of memory and computing time.
In this work, we present an optimal polynomial-time algorithm that finds the minimal set of indexes of a relation for a given set of primitive searches. An index may cover more than one primitive search due to the algebraic properties of the search predicate, which is a conjunction of equalities over the attributes of a relation. The index search space exhibits a exponential complexity in the number of attributes in a relation, and, hence brute-force algorithms searching for solutions in the index domain are infeasible. As a scaffolding for designing a polynomial-time algorithm, we build a partial order on search operations and use a constructive version of Dilworth's theorem. We show a strong relationship between chains of primitive searches (forming a partial order) and indexes. We demonstrate the effectiveness and efficiency of our algorithm for an in-memory Datalog compiler that is able to process relations with billions of entries in memory.
△ Less
Submitted 12 September, 2017;
originally announced September 2017.
-
Observation of Coherent Elastic Neutrino-Nucleus Scattering
Authors:
D. Akimov,
J. B. Albert,
P. An,
C. Awe,
P. S. Barbeau,
B. Becker,
V. Belov,
A. Brown,
A. Bolozdynya,
B. Cabrera-Palmer,
M. Cervantes,
J. I. Collar,
R. J. Cooper,
R. L. Cooper,
C. Cuesta,
D. J. Dean,
J. A. Detwiler,
A. Eberhardt,
Y. Efremenko,
S. R. Elliott,
E. M. Erkela,
L. Fabris,
M. Febbraro,
N. E. Fields,
W. Fox
, et al. (56 additional authors not shown)
Abstract:
The coherent elastic scattering of neutrinos off nuclei has eluded detection for four decades, even though its predicted cross-section is the largest by far of all low-energy neutrino couplings. This mode of interaction provides new opportunities to study neutrino properties, and leads to a miniaturization of detector size, with potential technological applications. We observe this process at a 6.…
▽ More
The coherent elastic scattering of neutrinos off nuclei has eluded detection for four decades, even though its predicted cross-section is the largest by far of all low-energy neutrino couplings. This mode of interaction provides new opportunities to study neutrino properties, and leads to a miniaturization of detector size, with potential technological applications. We observe this process at a 6.7-sigma confidence level, using a low-background, 14.6-kg CsI[Na] scintillator exposed to the neutrino emissions from the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory. Characteristic signatures in energy and time, predicted by the Standard Model for this process, are observed in high signal-to-background conditions. Improved constraints on non-standard neutrino interactions with quarks are derived from this initial dataset.
△ Less
Submitted 3 August, 2017;
originally announced August 2017.
-
Rigorous free fermion entanglement renormalization from wavelet theory
Authors:
Jutho Haegeman,
Brian Swingle,
Michael Walter,
Jordan Cotler,
Glen Evenbly,
Volkher B. Scholz
Abstract:
We construct entanglement renormalization schemes which provably approximate the ground states of non-interacting fermion nearest-neighbor hop** Hamiltonians on the one-dimensional discrete line and the two-dimensional square lattice. These schemes give hierarchical quantum circuits which build up the states from unentangled degrees of freedom. The circuits are based on pairs of discrete wavelet…
▽ More
We construct entanglement renormalization schemes which provably approximate the ground states of non-interacting fermion nearest-neighbor hop** Hamiltonians on the one-dimensional discrete line and the two-dimensional square lattice. These schemes give hierarchical quantum circuits which build up the states from unentangled degrees of freedom. The circuits are based on pairs of discrete wavelet transforms which are approximately related by a "half-shift": translation by half a unit cell. The presence of the Fermi surface in the two-dimensional model requires a special kind of circuit architecture to properly capture the entanglement in the ground state. We show how the error in the approximation can be controlled without ever performing a variational optimization.
△ Less
Submitted 19 July, 2017;
originally announced July 2017.
-
Uncertainty relations: An operational approach to the error-disturbance tradeoff
Authors:
Joseph M. Renes,
Volkher B. Scholz,
Stefan Huber
Abstract:
The notions of error and disturbance appearing in quantum uncertainty relations are often quantified by the discrepancy of a physical quantity from its ideal value. However, these real and ideal values are not the outcomes of simultaneous measurements, and comparing the values of unmeasured observables is not necessarily meaningful according to quantum theory. To overcome these conceptual difficul…
▽ More
The notions of error and disturbance appearing in quantum uncertainty relations are often quantified by the discrepancy of a physical quantity from its ideal value. However, these real and ideal values are not the outcomes of simultaneous measurements, and comparing the values of unmeasured observables is not necessarily meaningful according to quantum theory. To overcome these conceptual difficulties, we take a different approach and define error and disturbance in an operational manner. In particular, we formulate both in terms of the probability that one can successfully distinguish the actual measurement device from the relevant hypothetical ideal by any experimental test whatsoever. This definition itself does not rely on the formalism of quantum theory, avoiding many of the conceptual difficulties of usual definitions. We then derive new Heisenberg-type uncertainty relations for both joint measurability and the error-disturbance tradeoff for arbitrary observables of finite-dimensional systems, as well as for the case of position and momentum. Our relations may be directly applied in information processing settings, for example to infer that devices which can faithfully transmit information regarding one observable do not leak any information about conjugate observables to the environment. We also show that Englert's wave-particle duality relation [PRL 77, 2154 (1996)] can be viewed as an error-disturbance uncertainty relation.
△ Less
Submitted 24 July, 2017; v1 submitted 6 December, 2016;
originally announced December 2016.
-
Rényi divergences as weighted non-commutative vector valued $L_p$-spaces
Authors:
Mario Berta,
Volkher B. Scholz,
Marco Tomamichel
Abstract:
We show that Araki and Masuda's weighted non-commutative vector valued $L_p$-spaces [Araki \& Masuda, Publ. Res. Inst. Math. Sci., 18:339 (1982)] correspond to an algebraic generalization of the sandwiched Rényi divergences with parameter $α= \frac{p}{2}$. Using complex interpolation theory, we prove various fundamental properties of these divergences in the setup of von Neumann algebras, includin…
▽ More
We show that Araki and Masuda's weighted non-commutative vector valued $L_p$-spaces [Araki \& Masuda, Publ. Res. Inst. Math. Sci., 18:339 (1982)] correspond to an algebraic generalization of the sandwiched Rényi divergences with parameter $α= \frac{p}{2}$. Using complex interpolation theory, we prove various fundamental properties of these divergences in the setup of von Neumann algebras, including a data-processing inequality and monotonicity in $α$. We thereby also give new proofs for the corresponding finite-dimensional properties. We discuss the limiting cases $α\to \{\frac{1}{2},1,\infty\}$ leading to minus the logarithm of Uhlmann's fidelity, Umegaki's relative entropy, and the max-relative entropy, respectively. As a contribution that might be of independent interest, we derive a Riesz-Thorin theorem for Araki-Masuda $L_p$-spaces and an Araki-Lieb-Thirring inequality for states on von Neumann algebras.
△ Less
Submitted 22 July, 2018; v1 submitted 18 August, 2016;
originally announced August 2016.
-
Measurement of the low-energy quenching factor in germanium using an $^{88}$Y/Be photoneutron source
Authors:
B. J. Scholz,
A. E. Chavarria,
J. I. Collar,
P. Privitera,
A. E. Robinson
Abstract:
We employ an $^{88}$Y/Be photoneutron source to derive the quenching factor for neutron-induced nuclear recoils in germanium, probing recoil energies from a few hundred eV$_{nr}$ to 8.5keV$_{nr}$. A comprehensive Monte Carlo simulation of our setup is compared to experimental data employing a Lindhard model with a free electronic energy loss $k$ and an adiabatic correction for sub-keV$_{nr}$ nucle…
▽ More
We employ an $^{88}$Y/Be photoneutron source to derive the quenching factor for neutron-induced nuclear recoils in germanium, probing recoil energies from a few hundred eV$_{nr}$ to 8.5keV$_{nr}$. A comprehensive Monte Carlo simulation of our setup is compared to experimental data employing a Lindhard model with a free electronic energy loss $k$ and an adiabatic correction for sub-keV$_{nr}$ nuclear recoils. The best fit $k=0.179\pm 0.001$ obtained using a Monte Carlo Markov Chain (MCMC) ensemble sampler is in good agreement with previous measurements, confirming the adequacy of the Lindhard model to describe the stop** of few-keV ions in germanium crystals at a temperature of $\sim$77 K. This value of $k$ corresponds to a quenching factor of 13.7 % to 25.3 % for nuclear recoil energies between 0.3 keV$_{nr}$ and 8.5 keV$_{nr}$, respectively.
△ Less
Submitted 11 August, 2016;
originally announced August 2016.
-
Measurement of the ionization produced by sub-keV silicon nuclear recoils in a CCD dark matter detector
Authors:
A. E. Chavarria,
J. I. Collar,
J. R. Peña,
P. Privitera,
A. E. Robinson,
B. Scholz,
C. Sengul,
J. Zhou,
J. Estrada,
F. Izraelevitch,
J. Tiffenberg,
J. R. T. de Mello Neto,
D. Torres Machado
Abstract:
We report a measurement of the ionization efficiency of silicon nuclei recoiling with sub-keV kinetic energy in the bulk silicon of a charge-coupled device (CCD). Nuclear recoils are produced by low-energy neutrons ($<$24 keV) from a $^{124}$Sb-$^{9}$Be photoneutron source, and their ionization signal is measured down to 60 eV electron equivalent. This energy range, previously unexplored, is relev…
▽ More
We report a measurement of the ionization efficiency of silicon nuclei recoiling with sub-keV kinetic energy in the bulk silicon of a charge-coupled device (CCD). Nuclear recoils are produced by low-energy neutrons ($<$24 keV) from a $^{124}$Sb-$^{9}$Be photoneutron source, and their ionization signal is measured down to 60 eV electron equivalent. This energy range, previously unexplored, is relevant for the detection of low-mass dark matter particles. The measured efficiency is found to deviate from the extrapolation to low energies of the Lindhard model. This measurement also demonstrates the sensitivity to nuclear recoils of CCDs employed by DAMIC, a dark matter direct detection experiment located in the SNOLAB underground laboratory.
△ Less
Submitted 9 November, 2016; v1 submitted 2 August, 2016;
originally announced August 2016.
-
Coherent-state constellations and polar codes for thermal Gaussian channels
Authors:
Felipe Lacerda,
Joseph M. Renes,
Volkher B. Scholz
Abstract:
Optical communication channels are ultimately quantum-mechanical in nature, and we must therefore look beyond classical information theory to determine their communication capacity as well as to find efficient encoding and decoding schemes of the highest rates. Thermal channels, which arise from linear coupling of the field to a thermal environment, are of particular practical relevance; their cla…
▽ More
Optical communication channels are ultimately quantum-mechanical in nature, and we must therefore look beyond classical information theory to determine their communication capacity as well as to find efficient encoding and decoding schemes of the highest rates. Thermal channels, which arise from linear coupling of the field to a thermal environment, are of particular practical relevance; their classical capacity has been recently established, but their quantum capacity remains unknown. While the capacity sets the ultimate limit on reliable communication rates, it does not promise that such rates are achievable by practical means. Here we construct efficiently encodable codes for thermal channels which achieve the classical capacity and the so-called Gaussian coherent information for transmission of classical and quantum information, respectively. Our codes are based on combining polar codes with a discretization of the channel input into a finite "constellation" of coherent states. Encoding of classical information can be done using linear optics.
△ Less
Submitted 4 July, 2017; v1 submitted 18 March, 2016;
originally announced March 2016.
-
A Low-noise Germanium Ionization Spectrometer for Low-background Science
Authors:
Craig E. Aalseth,
Juan I. Collar,
Jim Colaresi,
James E. Fast,
Todd W. Hossbach,
John L. Orrell,
Cory T. Overman,
Bjorn Scholz,
Brent A. VanDevender,
K. Michael Yocum
Abstract:
Recent progress on the development of very low noise high purity germanium ionization spectrometers has produced an instrument of 1.2 kg mass and excellent noise performance. The detector was installed in a low-background cryostat intended for use in a direct detection search for low mass, WIMP dark matter. This Transaction reports the thermal characterization of the cryostat, specifications of th…
▽ More
Recent progress on the development of very low noise high purity germanium ionization spectrometers has produced an instrument of 1.2 kg mass and excellent noise performance. The detector was installed in a low-background cryostat intended for use in a direct detection search for low mass, WIMP dark matter. This Transaction reports the thermal characterization of the cryostat, specifications of the newly prepared 1.2 kg p-type point contact germanium detector, and the spectroscopic performance of the integrated system. The integrated detector and low background cryostat achieved full-width-at-half-maximum noise performance of 98 eV for an electronic pulse generator peak and 1.9 keV for the 1332 keV Co-60 gamma ray.
△ Less
Submitted 4 March, 2016;
originally announced March 2016.
-
A cycling state that can lead to glassy dynamics in intracellular transport
Authors:
Monika Scholz,
Stanislav Burov,
Kimberly L. Weirich,
Bjorn J. Scholz,
S. M. Ali Tabei,
Margaret L. Gardel,
Aaron R. Dinner
Abstract:
Power-law dwell times have been observed for molecular motors in living cells, but the origins of these trapped states are not known. We introduce a minimal model of motors moving on a two-dimensional network of filaments, and simulations of its dynamics exhibit statistics comparable to those observed experimentally. Analysis of the model trajectories, as well as experimental particle tracking dat…
▽ More
Power-law dwell times have been observed for molecular motors in living cells, but the origins of these trapped states are not known. We introduce a minimal model of motors moving on a two-dimensional network of filaments, and simulations of its dynamics exhibit statistics comparable to those observed experimentally. Analysis of the model trajectories, as well as experimental particle tracking data, reveals a state in which motors cycle unproductively at junctions of three or more filaments. We formulate a master equation for these junction dynamics and show that the time required to escape from this vortex-like state can account for the power-law dwell times. We identify trends in the dynamics with the motor valency for further experimental validation. We demonstrate that these trends exist in individual trajectories of myosin II on an actin network. We discuss how cells could regulate intracellular transport and, in turn, biological function, by controlling their cytoskeletal network structures locally.
△ Less
Submitted 12 February, 2016;
originally announced February 2016.
-
Matrix product approximations to multipoint functions in two-dimensional conformal field theory
Authors:
Robert Koenig,
Volkher B. Scholz
Abstract:
Matrix product states (MPS) illustrate the suitability of tensor networks for the description of interacting many-body systems: ground states of gapped $1$-D systems are approximable by MPS as shown by Hastings [J. Stat. Mech. Theor. Exp., P08024 (2007)]. In contrast, whether MPS and more general tensor networks can accurately reproduce correlations in critical quantum systems, respectively quantu…
▽ More
Matrix product states (MPS) illustrate the suitability of tensor networks for the description of interacting many-body systems: ground states of gapped $1$-D systems are approximable by MPS as shown by Hastings [J. Stat. Mech. Theor. Exp., P08024 (2007)]. In contrast, whether MPS and more general tensor networks can accurately reproduce correlations in critical quantum systems, respectively quantum field theories, has not been established rigorously. Ample evidence exists: entropic considerations provide restrictions on the form of suitable Ansatz states, and numerical studies show that certain tensor networks can indeed approximate the associated correlation functions. Here we provide a complete positive answer to this question in the case of MPS and $2D$ conformal field theory: we give quantitative estimates for the approximation error when approximating correlation functions by MPS. Our work is constructive and yields an explicit MPS, thus providing both suitable initial values as well as a rigorous justification of variational methods.
△ Less
Submitted 4 January, 2016;
originally announced January 2016.
-
The entanglement of distillation for gauge theories
Authors:
Karel Van Acoleyen,
Nick Bultinck,
Jutho Haegeman,
Michael Marien,
Volkher B. Scholz,
Frank Verstraete
Abstract:
We study the entanglement structure of lattice gauge theories from the local operational point of view, and, similar to Soni and Trivedi (arXiv:1510.07455), we show that the usual entanglement entropy for a spatial bipartition can be written as the sum of an undistillable gauge part and of another part corresponding to the LOCC distillable entanglement, which is obtained by depolarizing the local…
▽ More
We study the entanglement structure of lattice gauge theories from the local operational point of view, and, similar to Soni and Trivedi (arXiv:1510.07455), we show that the usual entanglement entropy for a spatial bipartition can be written as the sum of an undistillable gauge part and of another part corresponding to the LOCC distillable entanglement, which is obtained by depolarizing the local superselection sectors. We demonstrate that the distillable entanglement is zero for pure abelian gauge theories in the weak coupling limit, while it is in general nonzero for the nonabelian case. We also consider gauge theories with matter, and show in a perturbative approach how area laws -- including a topological correction -- emerge for the distillable entanglement.
△ Less
Submitted 1 December, 2015; v1 submitted 13 November, 2015;
originally announced November 2015.
-
Quantum-proof multi-source randomness extractors in the Markov model
Authors:
Rotem Arnon-Friedman,
Christopher Portmann,
Volkher B. Scholz
Abstract:
Randomness extractors, widely used in classical and quantum cryptography and other fields of computer science, e.g., derandomization, are functions which generate almost uniform randomness from weak sources of randomness. In the quantum setting one must take into account the quantum side information held by an adversary which might be used to break the security of the extractor. In the case of see…
▽ More
Randomness extractors, widely used in classical and quantum cryptography and other fields of computer science, e.g., derandomization, are functions which generate almost uniform randomness from weak sources of randomness. In the quantum setting one must take into account the quantum side information held by an adversary which might be used to break the security of the extractor. In the case of seeded extractors the presence of quantum side information has been extensively studied. For multi-source extractors one can easily see that high conditional min-entropy is not sufficient to guarantee security against arbitrary side information, even in the classical case. Hence, the interesting question is under which models of (both quantum and classical) side information multi-source extractors remain secure. In this work we suggest a natural model of side information, which we call the Markov model, and prove that any multi-source extractor remains secure in the presence of quantum side information of this type (albeit with weaker parameters). This improves on previous results in which more restricted models were considered and the security of only some types of extractors was shown.
△ Less
Submitted 9 September, 2016; v1 submitted 22 October, 2015;
originally announced October 2015.
-
The COHERENT Experiment at the Spallation Neutron Source
Authors:
COHERENT Collaboration,
D. Akimov,
P. An,
C. Awe,
P. S. Barbeau,
P. Barton,
B. Becker,
V. Belov,
A. Bolozdynya,
A. Burenkov,
B. Cabrera-Palmer,
J. I. Collar,
R. J. Cooper,
R. L. Cooper,
C. Cuesta,
D. Dean,
J. Detwiler,
A. G. Dolgolenko,
Y. Efremenko,
S. R. Elliott,
A. Etenko,
N. Fields,
W. Fox,
A. Galindo-Uribarri,
M. Green
, et al. (42 additional authors not shown)
Abstract:
The COHERENT collaboration's primary objective is to measure coherent elastic neutrino-nucleus scattering (CEvNS) using the unique, high-quality source of tens-of-MeV neutrinos provided by the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory (ORNL). In spite of its large cross section, the CEvNS process has never been observed, due to tiny energies of the resulting nuclear recoils…
▽ More
The COHERENT collaboration's primary objective is to measure coherent elastic neutrino-nucleus scattering (CEvNS) using the unique, high-quality source of tens-of-MeV neutrinos provided by the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory (ORNL). In spite of its large cross section, the CEvNS process has never been observed, due to tiny energies of the resulting nuclear recoils which are out of reach for standard neutrino detectors. The measurement of CEvNS has now become feasible, thanks to the development of ultra-sensitive technology for rare decay and weakly-interacting massive particle (dark matter) searches. The CEvNS cross section is cleanly predicted in the standard model; hence its measurement provides a standard model test. It is relevant for supernova physics and supernova-neutrino detection, and enables validation of dark-matter detector background and detector-response models. In the long term, precision measurement of CEvNS will address questions of nuclear structure. COHERENT will deploy multiple detector technologies in a phased approach: a 14-kg CsI[Na] scintillating crystal, 15 kg of p-type point-contact germanium detectors, and 100 kg of liquid xenon in a two-phase time projection chamber. Following an extensive background measurement campaign, a location in the SNS basement has proven to be neutron-quiet and suitable for deployment of the COHERENT detector suite. The simultaneous deployment of the three COHERENT detector subsystems will test the $N^2$ dependence of the cross section and ensure an unambiguous discovery of CEvNS. This document describes concisely the COHERENT physics motivations, sensitivity and plans for measurements at the SNS to be accomplished on a four-year timescale.
△ Less
Submitted 3 April, 2016; v1 submitted 29 September, 2015;
originally announced September 2015.
-
Matrix product approximations to conformal field theories
Authors:
Robert Koenig,
Volkher B. Scholz
Abstract:
We establish rigorous error bounds for approximating correlation functions of conformal field theories (CFTs) by certain finite-dimensional tensor networks. For chiral CFTs, the approximation takes the form of a matrix product state. For full CFTs consisting of a chiral and an anti-chiral part, the approximation is given by a finitely correlated state. We show that the bond dimension scales polyno…
▽ More
We establish rigorous error bounds for approximating correlation functions of conformal field theories (CFTs) by certain finite-dimensional tensor networks. For chiral CFTs, the approximation takes the form of a matrix product state. For full CFTs consisting of a chiral and an anti-chiral part, the approximation is given by a finitely correlated state. We show that the bond dimension scales polynomially in the inverse of the approximation error and sub-exponentially in the ultraviolett cutoff. We illustrate our findings using Wess-Zumino-Witten models, and show that there is a one-to-one correspondence between group-covariant MPS and our approximation.
△ Less
Submitted 24 September, 2015;
originally announced September 2015.
-
Quantum Bilinear Optimization
Authors:
Mario Berta,
Omar Fawzi,
Volkher B. Scholz
Abstract:
We study optimization programs given by a bilinear form over non-commutative variables subject to linear inequalities. Problems of this form include the entangled value of two-prover games, entanglement-assisted coding for classical channels and quantum-proof randomness extractors. We introduce an asymptotically converging hierarchy of efficiently computable semidefinite programming (SDP) relaxati…
▽ More
We study optimization programs given by a bilinear form over non-commutative variables subject to linear inequalities. Problems of this form include the entangled value of two-prover games, entanglement-assisted coding for classical channels and quantum-proof randomness extractors. We introduce an asymptotically converging hierarchy of efficiently computable semidefinite programming (SDP) relaxations for this quantum optimization. This allows us to give upper bounds on the quantum advantage for all of these problems. Compared to previous work of Pironio, Navascues and Acin, our hierarchy has additional constraints. By means of examples, we illustrate the importance of these new constraints both in practice and for analytical properties. Moreover, this allows us to give a hierarchy of SDP outer approximations for the completely positive semidefinite cone introduced by Laurent and Piovesan.
△ Less
Submitted 12 August, 2016; v1 submitted 29 June, 2015;
originally announced June 2015.
-
Approximate Degradable Quantum Channels
Authors:
David Sutter,
Volkher B. Scholz,
Andreas Winter,
Renato Renner
Abstract:
Degradable quantum channels are an important class of completely positive trace-preserving maps. Among other properties, they offer a single-letter formula for the quantum and the private classical capacity and are characterized by the fact that a complementary channel can be obtained from the channel by applying a degrading channel. In this work we introduce the concept of approximate degradable…
▽ More
Degradable quantum channels are an important class of completely positive trace-preserving maps. Among other properties, they offer a single-letter formula for the quantum and the private classical capacity and are characterized by the fact that a complementary channel can be obtained from the channel by applying a degrading channel. In this work we introduce the concept of approximate degradable channels, which satisfy this condition up to some finite $\varepsilon\geq0$. That is, there exists a degrading channel which upon composition with the channel is $\varepsilon$-close in the diamond norm to the complementary channel. We show that for any fixed channel the smallest such $\varepsilon$ can be efficiently determined via a semidefinite program. Moreover, these approximate degradable channels also approximately inherit all other properties of degradable channels. As an application, we derive improved upper bounds to the quantum and private classical capacity for certain channels of interest in quantum communication.
△ Less
Submitted 17 October, 2017; v1 submitted 2 December, 2014;
originally announced December 2014.
-
Quantum-proof randomness extractors via operator space theory
Authors:
Mario Berta,
Omar Fawzi,
Volkher B. Scholz
Abstract:
Quantum-proof randomness extractors are an important building block for classical and quantum cryptography as well as device independent randomness amplification and expansion. Furthermore they are also a useful tool in quantum Shannon theory. It is known that some extractor constructions are quantum-proof whereas others are provably not [Gavinsky et al., STOC'07]. We argue that the theory of oper…
▽ More
Quantum-proof randomness extractors are an important building block for classical and quantum cryptography as well as device independent randomness amplification and expansion. Furthermore they are also a useful tool in quantum Shannon theory. It is known that some extractor constructions are quantum-proof whereas others are provably not [Gavinsky et al., STOC'07]. We argue that the theory of operator spaces offers a natural framework for studying to what extent extractors are secure against quantum adversaries: we first phrase the definition of extractors as a bounded norm condition between normed spaces, and then show that the presence of quantum adversaries corresponds to a completely bounded norm condition between operator spaces. From this we show that very high min-entropy extractors as well as extractors with small output are always (approximately) quantum-proof. We also study a generalization of extractors called randomness condensers. We phrase the definition of condensers as a bounded norm condition and the definition of quantum-proof condensers as a completely bounded norm condition. Seeing condensers as bipartite graphs, we then find that the bounded norm condition corresponds to an instance of a well studied combinatorial problem, called bipartite densest subgraph. Furthermore, using the characterization in terms of operator spaces, we can associate to any condenser a Bell inequality (two-player game) such that classical and quantum strategies are in one-to-one correspondence with classical and quantum attacks on the condenser. Hence, we get for every quantum-proof condenser (which includes in particular quantum-proof extractors) a Bell inequality that can not be violated by quantum mechanics.
△ Less
Submitted 4 May, 2017; v1 submitted 11 September, 2014;
originally announced September 2014.
-
Many-body localisation implies that eigenvectors are matrix-product states
Authors:
M. Friesdorf,
A. H. Werner,
W. Brown,
V. B. Scholz,
J. Eisert
Abstract:
The phenomenon of many-body localisation received a lot of attention recently, both for its implications in condensed-matter physics of allowing systems to be an insulator even at non-zero temperature as well as in the context of the foundations of quantum statistical mechanics, providing examples of systems showing the absence of thermalisation following out-of-equilibrium dynamics. In this work,…
▽ More
The phenomenon of many-body localisation received a lot of attention recently, both for its implications in condensed-matter physics of allowing systems to be an insulator even at non-zero temperature as well as in the context of the foundations of quantum statistical mechanics, providing examples of systems showing the absence of thermalisation following out-of-equilibrium dynamics. In this work, we establish a novel link between dynamical properties - the absence of a group velocity and transport - with entanglement properties of individual eigenvectors. Using Lieb-Robinson bounds and filter functions, we prove rigorously under simple assumptions on the spectrum that if a system shows strong dynamical localisation, all of its many-body eigenvectors have clustering correlations. In one dimension this implies directly an entanglement area law, hence the eigenvectors can be approximated by matrix-product states. We also show this statement for parts of the spectrum, allowing for the existence of a mobility edge above which transport is possible.
△ Less
Submitted 18 November, 2014; v1 submitted 3 September, 2014;
originally announced September 2014.
-
Coherent neutrino-nucleus scattering detection with a CsI[Na] scintillator at the SNS spallation source
Authors:
J. I. Collar,
N. E. Fields,
E. Fuller,
M. Hai,
T. W. Hossbach,
J. L. Orrell,
G. Perumpilly,
B. Scholz
Abstract:
We study the possibility of using CsI[Na] scintillators as an advantageous target for the detection of coherent elastic neutrino-nucleus scattering (CENNS), using the neutrino emissions from the SNS spallation source at Oak Ridge National Laboratory. The response of this material to low-energy nuclear recoils like those expected from this process is characterized. Backgrounds are studied using a 2…
▽ More
We study the possibility of using CsI[Na] scintillators as an advantageous target for the detection of coherent elastic neutrino-nucleus scattering (CENNS), using the neutrino emissions from the SNS spallation source at Oak Ridge National Laboratory. The response of this material to low-energy nuclear recoils like those expected from this process is characterized. Backgrounds are studied using a 2 kg low-background prototype crystal in a dedicated radiation shield. The conclusion is that a planned 14 kg detector should measure approximately 550 CENNS events per year above a demonstrated $\sim7$ keVnr low-energy threshold, with a signal-to-background ratio sufficient for a first measurement of the CENNS cross-section. The cross-section for the $^{208}$Pb($ν_{e},e^{-}$)$^{208}$Bi reaction, of interest for future supernova neutrino detection, can be simultaneously obtained.
△ Less
Submitted 20 August, 2014; v1 submitted 28 July, 2014;
originally announced July 2014.
-
Operationally-Motivated Uncertainty Relations for Joint Measurability and the Error-Disturbance Tradeoff
Authors:
Joseph M. Renes,
Volkher B. Scholz
Abstract:
We derive new Heisenberg-type uncertainty relations for both joint measurability and the error-disturbance tradeoff for arbitrary observables of finite-dimensional systems. The relations are formulated in terms of a directly operational quantity, namely the probability of distinguishing the actual operation of a device from its hypothetical ideal, by any possible testing procedure whatsoever. More…
▽ More
We derive new Heisenberg-type uncertainty relations for both joint measurability and the error-disturbance tradeoff for arbitrary observables of finite-dimensional systems. The relations are formulated in terms of a directly operational quantity, namely the probability of distinguishing the actual operation of a device from its hypothetical ideal, by any possible testing procedure whatsoever. Moreover, they may be directly applied in information processing settings, for example to infer that devices which can faithfully transmit information regarding one observable do not leak any information about conjugate observables to the environment. Though intuitively apparent from Heisenberg's original arguments, only more limited versions of this statement have previously been formalized.
△ Less
Submitted 26 February, 2014;
originally announced February 2014.
-
Variations on Classical and Quantum Extractors
Authors:
Mario Berta,
Omar Fawzi,
Volkher B. Scholz,
Oleg Szehr
Abstract:
Many constructions of randomness extractors are known to work in the presence of quantum side information, but there also exist extractors which do not [Gavinsky {\it et al.}, STOC'07]. Here we find that spectral extractors $ψ$ with a bound on the second largest eigenvalue $λ_{2}(ψ^{\dagger}\circψ)$ are quantum-proof. We then discuss fully quantum extractors and call constructions that also work i…
▽ More
Many constructions of randomness extractors are known to work in the presence of quantum side information, but there also exist extractors which do not [Gavinsky {\it et al.}, STOC'07]. Here we find that spectral extractors $ψ$ with a bound on the second largest eigenvalue $λ_{2}(ψ^{\dagger}\circψ)$ are quantum-proof. We then discuss fully quantum extractors and call constructions that also work in the presence of quantum correlations decoupling. As in the classical case we show that spectral extractors are decoupling. The drawback of classical and quantum spectral extractors is that they always have a long seed, whereas there exist classical extractors with exponentially smaller seed size. For the quantum case, we show that there exists an extractor with extremely short seed size $d=O(\log(1/ε))$, where $ε>0$ denotes the quality of the randomness. In contrast to the classical case this is independent of the input size and min-entropy and matches the simple lower bound $d\geq\log(1/ε)$.
△ Less
Submitted 13 February, 2014;
originally announced February 2014.
-
Position-Momentum Uncertainty Relations in the Presence of Quantum Memory
Authors:
Fabian Furrer,
Mario Berta,
Marco Tomamichel,
Volkher B. Scholz,
Matthias Christandl
Abstract:
A prominent formulation of the uncertainty principle identifies the fundamental quantum feature that no particle may be prepared with certain outcomes for both position and momentum measurements. Often the statistical uncertainties are thereby measured in terms of entropies providing a clear operational interpretation in information theory and cryptography. Recently, entropic uncertainty relations…
▽ More
A prominent formulation of the uncertainty principle identifies the fundamental quantum feature that no particle may be prepared with certain outcomes for both position and momentum measurements. Often the statistical uncertainties are thereby measured in terms of entropies providing a clear operational interpretation in information theory and cryptography. Recently, entropic uncertainty relations have been used to show that the uncertainty can be reduced in the presence of entanglement and to prove security of quantum cryptographic tasks. However, much of this recent progress has been focused on observables with only a finite number of outcomes not including Heisenberg's original setting of position and momentum observables. Here we show entropic uncertainty relations for general observables with discrete but infinite or continuous spectrum that take into account the power of an entangled observer. As an illustration, we evaluate the uncertainty relations for position and momentum measurements, which is operationally significant in that it implies security of a quantum key distribution scheme based on homodyne detection of squeezed Gaussian states.
△ Less
Submitted 5 January, 2015; v1 submitted 21 August, 2013;
originally announced August 2013.
-
A modular framework for randomness extraction based on Trevisan's construction
Authors:
Wolfgang Mauerer,
Christopher Portmann,
Volkher B. Scholz
Abstract:
Informally, an extractor delivers perfect randomness from a source that may be far away from the uniform distribution, yet contains some randomness. This task is a crucial ingredient of any attempt to produce perfectly random numbers---required, for instance, by cryptographic protocols, numerical simulations, or randomised computations. Trevisan's extractor raised considerable theoretical interest…
▽ More
Informally, an extractor delivers perfect randomness from a source that may be far away from the uniform distribution, yet contains some randomness. This task is a crucial ingredient of any attempt to produce perfectly random numbers---required, for instance, by cryptographic protocols, numerical simulations, or randomised computations. Trevisan's extractor raised considerable theoretical interest not only because of its data parsimony compared to other constructions, but particularly because it is secure against quantum adversaries, making it applicable to quantum key distribution.
We discuss a modular, extensible and high-performance implementation of the construction based on various building blocks that can be flexibly combined to satisfy the requirements of a wide range of scenarios. Besides quantitatively analysing the properties of many combinations in practical settings, we improve previous theoretical proofs, and give explicit results for non-asymptotic cases. The self-contained description does not assume familiarity with extractors.
△ Less
Submitted 3 December, 2012;
originally announced December 2012.
-
Typical local measurements in generalised probabilistic theories: emergence of quantum bipartite correlations
Authors:
Matthias Kleinmann,
Tobias J. Osborne,
Volkher B. Scholz,
Albert H. Werner
Abstract:
What singles out quantum mechanics as the fundamental theory of Nature? Here we study local measurements in generalised probabilistic theories (GPTs) and investigate how observational limitations affect the production of correlations. We find that if only a subset of typical local measurements can be made then all the bipartite correlations produced in a GPT can be simulated to a high degree of ac…
▽ More
What singles out quantum mechanics as the fundamental theory of Nature? Here we study local measurements in generalised probabilistic theories (GPTs) and investigate how observational limitations affect the production of correlations. We find that if only a subset of typical local measurements can be made then all the bipartite correlations produced in a GPT can be simulated to a high degree of accuracy by quantum mechanics. Our result makes use of a generalisation of Dvoretzky's theorem for GPTs. The tripartite correlations can go beyond those exhibited by quantum mechanics, however.
△ Less
Submitted 28 January, 2013; v1 submitted 15 May, 2012;
originally announced May 2012.
-
Asymptotic behavior of quantum walks with spatio-temporal coin fluctuations
Authors:
Andre Ahlbrecht,
Christopher Cedzich,
Robert Matjeschk,
Volkher B. Scholz,
Albert H. Werner,
Reinhard F. Werner
Abstract:
Quantum walks subject to decoherence generically suffer the loss of their genuine quantum feature, a quadratically faster spreading compared to classical random walks. This intuitive statement has been verified analytically for certain models and is also supported by numerical studies of a variety of examples. In this paper we analyze the long-time behavior of a particular class of decoherent quan…
▽ More
Quantum walks subject to decoherence generically suffer the loss of their genuine quantum feature, a quadratically faster spreading compared to classical random walks. This intuitive statement has been verified analytically for certain models and is also supported by numerical studies of a variety of examples. In this paper we analyze the long-time behavior of a particular class of decoherent quantum walks, which, to the best of our knowledge, was only studied at the level of numerical simulations before. We consider a local coin operation which is randomly and independently chosen for each time step and each lattice site and prove that, under rather mild conditions, this leads to classical behavior: With the same scaling as needed for a classical diffusion the position distribution converges to a Gaussian, which is independent of the initial state. Our method is based on non-degenerate perturbation theory and yields an explicit expression for the covariance matrix of the asymptotic Gaussian in terms of the randomness parameters.
△ Less
Submitted 23 January, 2012;
originally announced January 2012.
-
Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks
Authors:
Fabian Furrer,
Torsten Franz,
Mario Berta,
Anthony Leverrier,
Volkher B. Scholz,
Marco Tomamichel,
Reinhard F. Werner
Abstract:
We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under g…
▽ More
We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.
△ Less
Submitted 20 January, 2014; v1 submitted 9 December, 2011;
originally announced December 2011.
-
The Smooth Entropy Formalism for von Neumann Algebras
Authors:
Mario Berta,
Fabian Furrer,
Volkher B. Scholz
Abstract:
We discuss information-theoretic concepts on infinite-dimensional quantum systems. In particular, we lift the smooth entropy formalism as introduced by Renner and collaborators for finite-dimensional systems to von Neumann algebras. For the smooth conditional min- and max-entropy we recover similar characterizing properties and information-theoretic operational interpretations as in the finite-dim…
▽ More
We discuss information-theoretic concepts on infinite-dimensional quantum systems. In particular, we lift the smooth entropy formalism as introduced by Renner and collaborators for finite-dimensional systems to von Neumann algebras. For the smooth conditional min- and max-entropy we recover similar characterizing properties and information-theoretic operational interpretations as in the finite-dimensional case. We generalize the entropic uncertainty relation with quantum side information of Tomamichel and Renner and discuss applications to quantum cryptography. In particular, we prove the possibility to perform privacy amplification and classical data compression with quantum side information modeled by a von Neumann algebra.
△ Less
Submitted 1 December, 2015; v1 submitted 27 July, 2011;
originally announced July 2011.
-
Bound Molecules in an Interacting Quantum Walk
Authors:
Andre Ahlbrecht,
Andrea Alberti,
Dieter Meschede,
Volkher B. Scholz,
Albert H. Werner,
Reinhard F. Werner
Abstract:
We investigate a system of two atoms in an optical lattice, performing a quantum walk by state-dependent shift operations and a coin operation acting on the internal states. The atoms interact, e.g., by cold collisions, whenever they are in the same potential well of the lattice. Under such conditions they typically develop a bound state, so that the two atoms effectively perform a quantum walk to…
▽ More
We investigate a system of two atoms in an optical lattice, performing a quantum walk by state-dependent shift operations and a coin operation acting on the internal states. The atoms interact, e.g., by cold collisions, whenever they are in the same potential well of the lattice. Under such conditions they typically develop a bound state, so that the two atoms effectively perform a quantum walk together, rarely moving further from each other than a few lattice sites. The theoretical analysis is based on a theory of quantum walks with a point defect, applied to the difference variable. We also discuss the feasibility of an experimental realization in existing quantum walk experiments.
△ Less
Submitted 5 May, 2011;
originally announced May 2011.
-
Local approximation of observables and commutator bounds
Authors:
Bruno Nachtergaele,
Volkher B. Scholz,
Reinhard F. Werner
Abstract:
We discuss conditional expectations that can be used as generalizations of the partial trace for quantum systems with an infinite-dimensional Hilbert space of states.
We discuss conditional expectations that can be used as generalizations of the partial trace for quantum systems with an infinite-dimensional Hilbert space of states.
△ Less
Submitted 29 March, 2011;
originally announced March 2011.
-
Disordered Quantum Walks in one lattice dimension
Authors:
Andre Ahlbrecht,
Volkher B. Scholz,
Albert H. Werner
Abstract:
We study a spin-1/2-particle moving on a one dimensional lattice subject to disorder induced by a random, space-dependent quantum coin. The discrete time evolution is given by a family of random unitary quantum walk operators, where the shift operation is assumed to be deterministic. Each coin is an independent identically distributed random variable with values in the group of two dimensional uni…
▽ More
We study a spin-1/2-particle moving on a one dimensional lattice subject to disorder induced by a random, space-dependent quantum coin. The discrete time evolution is given by a family of random unitary quantum walk operators, where the shift operation is assumed to be deterministic. Each coin is an independent identically distributed random variable with values in the group of two dimensional unitary matrices. We derive sufficient conditions on the probability distribution of the coins such that the system exhibits dynamical localization. Put differently, the tunneling probability between two lattice sites decays rapidly for almost all choices of random coins and after arbitrary many time steps with increasing distance. Our findings imply that this effect takes place if the coin is chosen at random from the Haar measure, or some measure continuous with respect to it, but also for a class of discrete probability measures which support consists of two coins, one of them being the Hadamard coin.
△ Less
Submitted 6 April, 2011; v1 submitted 12 January, 2011;
originally announced January 2011.
-
Connes' embedding problem and Tsirelson's problem
Authors:
M. Junge,
M. Navascues,
C. Palazuelos,
D. Perez-Garcia,
V. B. Scholz,
R. F. Werner
Abstract:
We show that Tsirelson's problem concerning the set of quantum correlations and Connes' embedding problem on finite approximations in von Neumann algebras (known to be equivalent to Kirchberg's QWEP conjecture) are essentially equivalent. Specifically, Tsirelson's problem asks whether the set of bipartite quantum correlations generated between tensor product separated systems is the same as the se…
▽ More
We show that Tsirelson's problem concerning the set of quantum correlations and Connes' embedding problem on finite approximations in von Neumann algebras (known to be equivalent to Kirchberg's QWEP conjecture) are essentially equivalent. Specifically, Tsirelson's problem asks whether the set of bipartite quantum correlations generated between tensor product separated systems is the same as the set of correlations between commuting C*-algebras. Connes' embedding problem asks whether any separable II$_1$ factor is a subfactor of the ultrapower of the hyperfinite II$_1$ factor. We show that an affirmative answer to Connes' question implies a positive answer to Tsirelson's. Conversely, a positve answer to a matrix valued version of Tsirelson's problem implies a positive one to Connes' problem.
△ Less
Submitted 6 August, 2010;
originally announced August 2010.
-
Accelerating the Execution of Matrix Languages on the Cell Broadband Engine Architecture
Authors:
Raymes Khoury,
Bernd Burgstaller,
Bernhard Scholz
Abstract:
Matrix languages, including MATLAB and Octave, are established standards for applications in science and engineering. They provide interactive programming environments that are easy to use due to their scripting languages with matrix data types. Current implementations of matrix languages do not fully utilise high-performance, special-purpose chip architectures such as the IBM PowerXCell process…
▽ More
Matrix languages, including MATLAB and Octave, are established standards for applications in science and engineering. They provide interactive programming environments that are easy to use due to their scripting languages with matrix data types. Current implementations of matrix languages do not fully utilise high-performance, special-purpose chip architectures such as the IBM PowerXCell processor (Cell), which is currently used in the fastest computer in the world.
We present a new framework that extends Octave to harness the computational power of the Cell. With this framework the programmer is relieved of the burden of introducing explicit notions of parallelism. Instead the programmer uses a new matrix data-type to execute matrix operations in parallel on the synergistic processing elements (SPEs) of the Cell. We employ lazy evaluation semantics for our new matrix data-type to obtain execution traces of matrix operations. Traces are converted to data dependence graphs; operations in the data dependence graph are lowered (split into sub-matrices), scheduled and executed on the SPEs. Thereby we exploit (1) data parallelism, (2) instruction level parallelism, (3) pipeline parallelism and (4) task parallelism of matrix language programs. We conducted extensive experiments to show the validity of our approach. Our Cell-based implementation achieves speedups of up to a factor of 12 over code run on recent Intel Core2 Quad processors.
△ Less
Submitted 14 November, 2009; v1 submitted 13 October, 2009;
originally announced October 2009.
-
Tsirelson's Problem
Authors:
V. B. Scholz,
R. F. Werner
Abstract:
The situation of two independent observers conducting measurements on a joint quantum system is usually modelled using a Hilbert space of tensor product form, each factor associated to one observer. Correspondingly, the operators describing the observables are then acting non-trivially only on one of the tensor factors. However, the same situation can also be modelled by just using one joint Hil…
▽ More
The situation of two independent observers conducting measurements on a joint quantum system is usually modelled using a Hilbert space of tensor product form, each factor associated to one observer. Correspondingly, the operators describing the observables are then acting non-trivially only on one of the tensor factors. However, the same situation can also be modelled by just using one joint Hilbert space, and requiring that all operators associated to different observers commute, i.e. are jointly measurable without causing disturbance. The problem of Tsirelson is now to decide the question whether all quantum correlation functions between two independent observers derived from commuting observables can also be expressed using observables defined on a Hilbert space of tensor product form. Tsirelson showed already that the distinction is irrelevant in the case that the ambient Hilbert space is of finite dimension. We show here that the problem is equivalent to the question whether all quantum correlation functions can be approximated by correlation function derived from finite-dimensional systems. We also discuss some physical examples which fulfill this requirement.
△ Less
Submitted 22 December, 2008;
originally announced December 2008.