We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum key distribution scheme. We consider the collective attack scenario with quantum channels that impose arbitrary noise ...
详细信息
We estimate a lower bound to the secret key rate of a binary modulated continuous variable quantum key distribution scheme. We consider the collective attack scenario with quantum channels that impose arbitrary noise on the exchanged signals. The analysis is done in the infinite key limit. Bob performs ideal homodyne measurements on the received states and the two honest parties employ a reverse reconciliation procedure in the classical postprocessing step of the protocol.
We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the ana...
详细信息
We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.
Distinguishing logarithmic depth quantum circuits on mixed states is shown to be complete for QIP, the class of problems having quantum interactive proof systems. Circuits in this model can represent arbitrary quantum...
详细信息
ISBN:
(纸本)9783939897064
Distinguishing logarithmic depth quantum circuits on mixed states is shown to be complete for QIP, the class of problems having quantum interactive proof systems. Circuits in this model can represent arbitrary quantum processes, and thus this result has implications for the verification of implementations of quantum algorithms. The distinguishability problem is also complete for QIP on constant depth circuits containing the unbounded fan-out gate. These results are shown by reducing a QIP-complete problem to a logarithmic depth version of itself using a parallelization technique.
We assess the performance of recent density functionals for the exchange-correlation energy of a nonmolecular solid, by applying accurate calculations with the GAUSSIAN, BAND, and VASP codes to a test set of 24 solid ...
详细信息
We assess the performance of recent density functionals for the exchange-correlation energy of a nonmolecular solid, by applying accurate calculations with the GAUSSIAN, BAND, and VASP codes to a test set of 24 solid metals and nonmetals. The functionals tested are the modified Perdew-Burke-Ernzerhof generalized gradient approximation (PBEsol GGA), the second-order GGA (SOGGA), and the Armiento-Mattsson 2005 (AM05) GGA. For completeness, we also test more standard functionals: the local density approximation, the original PBE GGA, and the Tao-Perdew-Staroverov-Scuseria meta-GGA. We find that the recent density functionals for solids reach a high accuracy for bulk properties (lattice constant and bulk modulus). For the cohesive energy, PBE is better than PBEsol overall, as expected, but PBEsol is actually better for the alkali metals and alkali halides. For fair comparison of calculated and experimental results, we consider the zero-point phonon and finite-temperature effects ignored by many workers. We show how GAUSSIAN basis sets and inaccurate experimental reference data may affect the rating of the quality of the functionals. The results show that PBEsol and AM05 perform somewhat differently from each other for alkali metal, alkaline-earth metal, and alkali halide crystals (where the maximum value of the reduced density gradient is about 2), but perform very similarly for most of the other solids (where it is often about 1). Our explanation for this is consistent with the importance of exchange-correlation nonlocality in regions of core-valence overlap.
We calculate pion vector and scalar form factors in two-flavor lattice QCD and study the chiral behavior of the vector and scalar radii ⟨r2⟩V,S. Numerical simulations are carried out on a 163×32 lattice at a latt...
We calculate pion vector and scalar form factors in two-flavor lattice QCD and study the chiral behavior of the vector and scalar radii ⟨r2⟩V,S. Numerical simulations are carried out on a 163×32 lattice at a lattice spacing of 0.12 fm with quark masses down to ∼ms/6, where ms is the physical strange quark mass. Chiral symmetry, which is essential for a direct comparison with chiral perturbation theory (ChPT), is exactly preserved in our calculation at finite lattice spacing by employing the overlap quark action. We utilize the so-called all-to-all quark propagator in order to calculate the scalar form factor including the contributions of disconnected diagrams and to improve statistical accuracy of the form factors. A detailed comparison with ChPT reveals that the next-to-next-to-leading-order contributions to the radii are essential to describe their chiral behavior in the region of quark mass from ms/6 to ms/2. Chiral extrapolation based on two-loop ChPT yields ⟨r2⟩V=0.409(23)(37) fm2 and ⟨r2⟩S=0.617(79)(66) fm2, which are consistent with phenomenological analysis. We also present our estimates of relevant low-energy constants.
We consider asymptotic capacities of bipartite unitary gates. We present a gate with exponen- tially larger entanglement capacity than the total communication capacity. The key tool is a communication- efficient metho...
详细信息
We consider asymptotic capacities of bipartite unitary gates. We present a gate with exponentially larger entanglement capacity than the total communication capacity. The key tool in our proof, which may be of indepen...
详细信息
We consider asymptotic capacities of bipartite unitary gates. We present a gate with exponentially larger entanglement capacity than the total communication capacity. The key tool in our proof, which may be of independent interest, is a communication-efficient protocol for testing whether a bipartite quantum state belongs to a short list of candidate states.
We study the problem of the practical realization of an abstract quantum circuit when executed on a quantum hardware. By practical, we mean adapting the circuit to particulars of the physical environment which restric...
详细信息
quantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on ...
详细信息
quantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on the ability to faithfully send quantum states or equivalently to share pure entanglement. Here we show this need not be the case—one can obtain verifiable privacy even through some channels which cannot be used to reliably send quantum states.
暂无评论