-
Characterizing the Entanglement of Anyonic Systems using the Anyonic Partial Transpose
Authors:
Nico Kirchner,
Wonjune Choi,
Frank Pollmann
Abstract:
Entanglement of mixed quantum states can be quantified using the partial transpose and its corresponding entanglement measure, the logarithmic negativity. Recently, the notion of partial transpose has been extended to systems of anyons, which are exotic quasiparticles whose exchange statistics go beyond the bosonic and fermionic case. Studying the fundamental properties of this anyonic partial tra…
▽ More
Entanglement of mixed quantum states can be quantified using the partial transpose and its corresponding entanglement measure, the logarithmic negativity. Recently, the notion of partial transpose has been extended to systems of anyons, which are exotic quasiparticles whose exchange statistics go beyond the bosonic and fermionic case. Studying the fundamental properties of this anyonic partial transpose, we first reveal that when applied to the special case of fermionic systems, it can be reduced to the fermionic partial transpose or its twisted variant depending on whether or not a boundary Majorana fermion is present. Focusing on ground state properties, we find that the anyonic partial transpose captures both the correct entanglement scaling for gapless systems, as predicted by conformal field theory, and the phase transition between a topologically trivial and a nontrivial phase. For non-abelian anyons and the bipartition geometry, we find a rich multiplet structure in the eigenvalues of the partial transpose, the so-called negativity spectrum, and reveal the possibility of defining both a charge- and an imbalance-resolved negativity.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Effectiveness of the syndrome extraction circuit with flag qubits on IBM quantum hardware
Authors:
Younghun Kim,
Hansol Kim,
Jeongsoo Kang,
Wonjae Choi,
Younghun Kwon
Abstract:
Large-scale quantum circuits are required to exploit the advantages of quantum computers. Present-day quantum computers have become less reliable with increasing depths of quantum circuits. To overcome this limitation, quantum error-correction codes have been introduced. Although the success of quantum error correction codes has been announced in Google[1, 2] and neutral atom[3] quantum computers,…
▽ More
Large-scale quantum circuits are required to exploit the advantages of quantum computers. Present-day quantum computers have become less reliable with increasing depths of quantum circuits. To overcome this limitation, quantum error-correction codes have been introduced. Although the success of quantum error correction codes has been announced in Google[1, 2] and neutral atom[3] quantum computers, there have been no reports on IBM quantum computers showing error suppression owing to its unique heavy-hexagon structure. This structure restricts connectivity, and quantum error-correction codes on IBM quantum computers require flag qubits. Here, we report the successful implementation of a syndrome extraction circuit with flag qubits on IBM quantum computers. Moreover, we demonstrate its effectiveness by considering the repetition code as a test code among the quantum error-correcting codes. Even though the data qubit is not adjacent to the syndrome qubit, logical error rates diminish exponentially as the distance of the repetition code increases from three to nine. Even when two flag qubits exist between the data and syndrome qubits, the logical error rates decrease as the distance increases similarly. This confirms the successful implementation of the syndrome extraction circuit with flag qubits on the IBM quantum computer.
△ Less
Submitted 10 May, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
Experimental Realization of Entangled Coherent States in Two-dimensional Harmonic Oscillators of a Trapped Ion
Authors:
Honggi Jeon,
Jiyong Kang,
Jaeun Kim,
Wonhyeong Choi,
Kyunghye Kim,
Taehyun Kim
Abstract:
Entangled coherent states play pivotal roles in various fields such as quantum computation, quantum communication, and quantum sensing. We experimentally demonstrate the generation of entangled coherent states with the two-dimensional motion of a trapped ion system. Using Raman transitions with appropriate detunings, we simultaneously drive the red and blue sidebands of the two transverse axes of…
▽ More
Entangled coherent states play pivotal roles in various fields such as quantum computation, quantum communication, and quantum sensing. We experimentally demonstrate the generation of entangled coherent states with the two-dimensional motion of a trapped ion system. Using Raman transitions with appropriate detunings, we simultaneously drive the red and blue sidebands of the two transverse axes of a single trapped ion and observe multi-periodic entanglement and disentanglement of its spin and two-dimensional motion. Then, by measuring the spin state, we herald entangled coherent states of the transverse motions of the trapped ion and observe the corresponding modulation in the parity of the phonon distribution of one of the harmonic oscillators. Lastly, we trap two ions in a linear chain and realize Molmer-Sorensen gate using two-dimensional motion.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
Quantum entropy model of an integrated QRNG chip
Authors:
Gaëtan Gras,
Anthony Martin,
Jeong Woon Choi,
Félix Bussières
Abstract:
We present the physical model for the entropy source of a quantum random number generator chip based on the quantum fluctuations of the photon number emitted by light-emitting diodes. This model, combined with a characterization of the chip, estimates a quantum min-entropy of over 0.98 per bit without post-processing. Finally, we show with our model that the performances in terms of security are r…
▽ More
We present the physical model for the entropy source of a quantum random number generator chip based on the quantum fluctuations of the photon number emitted by light-emitting diodes. This model, combined with a characterization of the chip, estimates a quantum min-entropy of over 0.98 per bit without post-processing. Finally, we show with our model that the performances in terms of security are robust against fluctuations over time.
△ Less
Submitted 28 November, 2020;
originally announced November 2020.
-
Spectroscopic fingerprints of gapped quantum spin liquids, both conventional and fractonic
Authors:
Rahul M. Nandkishore,
Wonjune Choi,
Yong Baek Kim
Abstract:
We explain how gapped quantum spin liquids, both conventional and 'fractonic', may be unambiguously diagnosed experimentally using the technique of multidimensional coherent spectroscopy. 'Conventional' gapped quantum spin liquids (e.g. $Z_2$ spin liquid) do not have clear signatures in linear response, but do have clear fingerprints in non-linear response, accessible through the already existing…
▽ More
We explain how gapped quantum spin liquids, both conventional and 'fractonic', may be unambiguously diagnosed experimentally using the technique of multidimensional coherent spectroscopy. 'Conventional' gapped quantum spin liquids (e.g. $Z_2$ spin liquid) do not have clear signatures in linear response, but do have clear fingerprints in non-linear response, accessible through the already existing experimental technique of two dimensional coherent spectroscopy. Type I fracton phases (e.g. X-cube) are (surprisingly) even easier to distinguish, with strongly suggestive features even in linear response, and unambiguous signatures in non-linear response. Type II fracton systems, like Haah's code, are most subtle, and may require consideration of high order non-linear response for unambiguous diagnosis.
△ Less
Submitted 15 October, 2020;
originally announced October 2020.
-
Quantum messages with signatures forgeable in arbitrated quantum signature schemes
Authors:
Taewan Kim,
Jeong Woon Choi,
Nam-Su Jho,
Soojoon Lee
Abstract:
Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of good candidates. However, its forgery problem has been an obstacle to the scheme being a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we check whether at least one quantum message…
▽ More
Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of good candidates. However, its forgery problem has been an obstacle to the scheme being a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there exist only a finite number of forgeable quantum messages in the scheme then the scheme can be secure against the forgery attack by not sending the forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. But, if users run a given scheme without any consideration of forgeable quantum messages then a sender might transmit such forgeable messages to a receiver, and an attacker can forge the messages if the attacker knows them in such a case. Thus it is important and necessary to look into forgeable quantum messages. We here show that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that any forgeable quantum message-signature pairs do not exist in an arbitrated quantum signature scheme.
△ Less
Submitted 26 January, 2015; v1 submitted 5 July, 2014;
originally announced July 2014.
-
Security problem on arbitrated quantum signature schemes
Authors:
Jeong Woon Choi,
Ku-Young Chang,
Dowon Hong
Abstract:
Until now, there have been developed many arbitrated quantum signature schemes implemented with a help of a trusted third party. In order to guarantee the unconditional security, most of them take advantage of the optimal quantum one-time encryption method based on Pauli operators. However, we in this paper point out that the previous schemes only provides a security against total break and actual…
▽ More
Until now, there have been developed many arbitrated quantum signature schemes implemented with a help of a trusted third party. In order to guarantee the unconditional security, most of them take advantage of the optimal quantum one-time encryption method based on Pauli operators. However, we in this paper point out that the previous schemes only provides a security against total break and actually show that there exists a simple existential forgery attack to validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover the security against the proposed attack.
△ Less
Submitted 27 June, 2011;
originally announced June 2011.
-
Non-static Quantum Bit Commitment
Authors:
Jeong Woon Choi,
Dowon Hong,
Ku-Young Chang,
Dong Pyo Chi,
Soojoon Lee
Abstract:
Quantum bit commitment has been known to be impossible by the independent proofs of Mayers, and Lo and Chau, under the assumption that the whole quantum states right before the unveiling phase are static to users. We here provide an unconditionally secure non-static quantum bit commitment protocol with a trusted third party, which is not directly involved in any communications between users and…
▽ More
Quantum bit commitment has been known to be impossible by the independent proofs of Mayers, and Lo and Chau, under the assumption that the whole quantum states right before the unveiling phase are static to users. We here provide an unconditionally secure non-static quantum bit commitment protocol with a trusted third party, which is not directly involved in any communications between users and can be limited not to get any information of commitment without being detected by users. We also prove that our quantum bit commitment protocol is not secure without the help of the trusted third party. The proof is basically different from the Mayers-Lo-Chau's no-go theorem, because we do not assume the staticity of the finally shared quantum states between users.
△ Less
Submitted 15 September, 2009; v1 submitted 9 January, 2009;
originally announced January 2009.
-
Quantum states for perfectly secure secret sharing
Authors:
Dong Pyo Chi,
Jeong Woon Choi,
Jeong San Kim,
Taewan Kim,
Soojoon Lee
Abstract:
In this work, we investigate what kinds of quantum states are feasible to perform perfectly secure secret sharing, and present its necessary and sufficient conditions. We also show that the states are bipartite distillable for all bipartite splits, and hence the states could be distillable into the Greenberger-Horne-Zeilinger state. We finally exhibit a class of secret-sharing states, which have…
▽ More
In this work, we investigate what kinds of quantum states are feasible to perform perfectly secure secret sharing, and present its necessary and sufficient conditions. We also show that the states are bipartite distillable for all bipartite splits, and hence the states could be distillable into the Greenberger-Horne-Zeilinger state. We finally exhibit a class of secret-sharing states, which have an arbitrarily small amount of bipartite distillable entanglement for a certain split.
△ Less
Submitted 30 April, 2008;
originally announced April 2008.
-
Monogamy equality in $2\otimes 2 \otimes d$ quantum systems
Authors:
Dong Pyo Chi,
Jeong Woon Choi,
Kabgyun Jeong,
Jeong San Kim,
Taewan Kim,
Soojoon Lee
Abstract:
There is an interesting property about multipartite entanglement, called the monogamy of entanglement. The property can be shown by the monogamy inequality, called the Coffman-Kundu-Wootters inequality [Phys. Rev. A {\bf 61}, 052306 (2000); Phys. Rev. Lett. {\bf 96}, 220503 (2006)], and more explicitly by the monogamy equality in terms of the concurrence and the concurrence of assistance,…
▽ More
There is an interesting property about multipartite entanglement, called the monogamy of entanglement. The property can be shown by the monogamy inequality, called the Coffman-Kundu-Wootters inequality [Phys. Rev. A {\bf 61}, 052306 (2000); Phys. Rev. Lett. {\bf 96}, 220503 (2006)], and more explicitly by the monogamy equality in terms of the concurrence and the concurrence of assistance, $\mathcal{C}_{A(BC)}^2=\mathcal{C}_{AB}^2+(\mathcal{C}_{AC}^a)^2$, in the three-qubit system. In this paper, we consider the monogamy equality in $2\otimes 2 \otimes d$ quantum systems. We show that $\mathcal{C}_{A(BC)}=\mathcal{C}_{AB}$ if and only if $\mathcal{C}_{AC}^a=0$, and also show that if $\mathcal{C}_{A(BC)}=\mathcal{C}_{AC}^a$ then $\mathcal{C}_{AB}=0$, while there exists a state in a $2\otimes 2 \otimes d$ system such that $\mathcal{C}_{AB}=0$ but $\mathcal{C}_{A(BC)}>\mathcal{C}_{AC}^a$.
△ Less
Submitted 1 April, 2008;
originally announced April 2008.
-
Three-party d-level quantum secret sharing protocol
Authors:
Dong Pyo Chi,
Jeong Woon Choi,
Jeong San Kim,
Taewan Kim,
Soojoon Lee
Abstract:
We develop a three-party quantum secret sharing protocol based on arbitrary dimensional quantum states. In contrast to the previous quantum secret sharing protocols, the sender can always control the state, just using local operations, for adjusting the correlation of measurement directions of three parties and thus there is no waste of resource due to the discord between the directions. Moreove…
▽ More
We develop a three-party quantum secret sharing protocol based on arbitrary dimensional quantum states. In contrast to the previous quantum secret sharing protocols, the sender can always control the state, just using local operations, for adjusting the correlation of measurement directions of three parties and thus there is no waste of resource due to the discord between the directions. Moreover, our protocol contains the hidden value which enables the sender to leak no information of secret key to the dishonest receiver until the last steps of the procedure.
△ Less
Submitted 30 December, 2007;
originally announced January 2008.
-
Bound entangled states with nonzero distillable key rate
Authors:
Dong Pyo Chi,
Jeong Woon Choi,
Jeong San Kim,
Taewan Kim,
Soojoon Lee
Abstract:
In this paper, we present sufficient conditions for states to have positive distillable key rate. Exploiting the conditions, we show that the bound entangled states given by Horodecki et al. [Phys. Rev. Lett. 94, 160502 (2005), quant-ph/0506203] have nonzero distillable key rate, and finally exhibit a new class of bound entangled states with positive distillable key rate, but with negative Devet…
▽ More
In this paper, we present sufficient conditions for states to have positive distillable key rate. Exploiting the conditions, we show that the bound entangled states given by Horodecki et al. [Phys. Rev. Lett. 94, 160502 (2005), quant-ph/0506203] have nonzero distillable key rate, and finally exhibit a new class of bound entangled states with positive distillable key rate, but with negative Devetak-Winter lower bound of distillable key rate for the ccq states of their privacy squeezed versions.
△ Less
Submitted 12 February, 2007; v1 submitted 29 December, 2006;
originally announced December 2006.
-
Observation of sub-Poisson photon statistics in the cavity-QED microlaser
Authors:
Wonshik Choi,
Jai-Hyung Lee,
Kyungwon An,
C. Fang-Yen,
R. R. Dasari,
M. S. Feld
Abstract:
We have measured the second-order correlation function of the cavity-QED microlaser output and observed a transition from photon bunching to antibunching with increasing average number of intracavity atoms. The observed correlation times and the transition from super- to sub-Poisson photon statistics can be well described by gain-loss feedback or enhanced/reduced restoring action against fluctua…
▽ More
We have measured the second-order correlation function of the cavity-QED microlaser output and observed a transition from photon bunching to antibunching with increasing average number of intracavity atoms. The observed correlation times and the transition from super- to sub-Poisson photon statistics can be well described by gain-loss feedback or enhanced/reduced restoring action against fluctuations in photon number in the context of a quantum microlaser theory and a photon rate equation picture. However, the theory predicts a degree of antibunching several times larger than that observed, which may indicate the inadequacy of its treatment of atomic velocity distributions.
△ Less
Submitted 15 March, 2005; v1 submitted 19 November, 2004;
originally announced November 2004.