It is known that entanglement swapping can be used to realize entanglement purifying. By this way, two particles belong to different non-maximally entangled pairs can be projected probabilisticly to a maximally entangled state or to a less entangled state. In this report, we show, when the less entangled state is obtained, if a unitary transformation is introduced locally, then a maximally entangled state can be obtained probabilisticly from this less entangled state.The total successful probability of our scheme is equal to the entanglement of a single pair purification (if two original pairs are in the same non-maximally entangled states) or to the smaller entanglement of a single pair purification of these two pairs ( if two original pairs are not in the same non-maximally entangled states). The advantage of our scheme is no continuous indefinite iterative procedure is needed to achieve optimal purifying. 03.67.-a Typeset using REVT E X
By testing the classical correlation violation between two systems, true random numbers can be generated and certified without applying classical statistical method. In this work, we propose a true random-number expansion protocol without entanglement, where the randomness can be guaranteed only by the two-dimensional quantum witness violation. Furthermore, we only assume that the dimensionality of the system used in the protocol has a tight bound, and the whole protocol can be regarded as a semi-device-independent black-box scenario. Compared with the device-independent random-number expansion protocol based on entanglement, our protocol is much easier to implement and test.
We discuss the use of inequalities of the Leggett-Garg type (LGtI) to witness quantum coherence and present the first experimental violation of this type of inequalities using a light-matter interfaced system. By separately benchmarking the Markovian character of the evolution and the translational invariance of the conditional probabilities, the observed violation of a LGtI is attributed to the quantum coherent character of the process. These results provide a general method to benchmark "quantumness" when the absence of memory effects can be independently certified and confirm the persistence of quantum coherent features within systems of increasing complexity.
The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which can allow the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final key shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing the monitoring detection.PACS numbers:
We experimentally demonstrate a tunable hybrid qubit in a five-electron GaAs double quantum dot. The qubit is encoded in the (1,4) charge regime of the double dot and can be manipulated completely electrically. More importantly, dot anharmonicity leads to quasiparallel energy levels and a new anticrossing, which help preserve quantum coherence of the qubit and yield a useful working point. We have performed Larmor precession and Ramsey fringe experiments near the new working point and find that the qubit decoherence time is significantly improved over a charge qubit. This work shows a new way to encode a semiconductor qubit that is controllable and coherent.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.