5,289 research outputs found
Entanglement swapping, light cones and elements of reality
Recently, a number of two-participant all-versus-nothing Bell experiments
have been proposed. Here, we give local realistic explanations for these
experiments. More precisely, we examine the scenario where a participant swaps
his entanglement with two other participants and then is removed from the
experiment; we also examine the scenario where two particles are in the same
light cone, i.e. belong to a single participant. Our conclusion is that, in
both cases, the proposed experiments are not convincing proofs against local
realism.Comment: 10 pages, no figure, LHV models given explicitely, more explanation
Unconditionally verifiable blind computation
Blind Quantum Computing (BQC) allows a client to have a server carry out a
quantum computation for them such that the client's input, output and
computation remain private. A desirable property for any BQC protocol is
verification, whereby the client can verify with high probability whether the
server has followed the instructions of the protocol, or if there has been some
deviation resulting in a corrupted output state. A verifiable BQC protocol can
be viewed as an interactive proof system leading to consequences for complexity
theory. The authors, together with Broadbent, previously proposed a universal
and unconditionally secure BQC scheme where the client only needs to be able to
prepare single qubits in separable states randomly chosen from a finite set and
send them to the server, who has the balance of the required quantum
computational resources. In this paper we extend that protocol with new
functionality allowing blind computational basis measurements, which we use to
construct a new verifiable BQC protocol based on a new class of resource
states. We rigorously prove that the probability of failing to detect an
incorrect output is exponentially small in a security parameter, while resource
overhead remains polynomial in this parameter. The new resource state allows
entangling gates to be performed between arbitrary pairs of logical qubits with
only constant overhead. This is a significant improvement on the original
scheme, which required that all computations to be performed must first be put
into a nearest neighbour form, incurring linear overhead in the number of
qubits. Such an improvement has important consequences for efficiency and
fault-tolerance thresholds.Comment: 46 pages, 10 figures. Additional protocol added which allows
arbitrary circuits to be verified with polynomial securit
Quantum Fully Homomorphic Encryption With Verification
Fully-homomorphic encryption (FHE) enables computation on encrypted data
while maintaining secrecy. Recent research has shown that such schemes exist
even for quantum computation. Given the numerous applications of classical FHE
(zero-knowledge proofs, secure two-party computation, obfuscation, etc.) it is
reasonable to hope that quantum FHE (or QFHE) will lead to many new results in
the quantum setting. However, a crucial ingredient in almost all applications
of FHE is circuit verification. Classically, verification is performed by
checking a transcript of the homomorphic computation. Quantumly, this strategy
is impossible due to no-cloning. This leads to an important open question: can
quantum computations be delegated and verified in a non-interactive manner? In
this work, we answer this question in the affirmative, by constructing a scheme
for QFHE with verification (vQFHE). Our scheme provides authenticated
encryption, and enables arbitrary polynomial-time quantum computations without
the need of interaction between client and server. Verification is almost
entirely classical; for computations that start and end with classical states,
it is completely classical. As a first application, we show how to construct
quantum one-time programs from classical one-time programs and vQFHE.Comment: 30 page
Experimental Violation of Two-Party Leggett-Garg Inequalities with Semi-weak Measurements
We generalize the derivation of Leggett-Garg inequalities to systematically
treat a larger class of experimental situations by allowing multi-particle
correlations, invasive detection, and ambiguous detector results. Furthermore,
we show how many such inequalities may be tested simultaneously with a single
setup. As a proof of principle, we violate several such two-particle
inequalities with data obtained from a polarization-entangled biphoton state
and a semi-weak polarization measurement based on Fresnel reflection. We also
point out a non- trivial connection between specific two-party Leggett-Garg
inequality violations and convex sums of strange weak values.Comment: 4 pages, 6 figure
Continuous-variable blind quantum computation
Blind quantum computation is a secure delegated quantum computing protocol
where Alice who does not have sufficient quantum technology at her disposal
delegates her computation to Bob who has a fully-fledged quantum computer in
such a way that Bob cannot learn anything about Alice's input, output, and
algorithm. Protocols of blind quantum computation have been proposed for
several qubit measurement-based computation models, such as the graph state
model, the Affleck-Kennedy-Lieb-Tasaki model, and the
Raussendorf-Harrington-Goyal topological model. Here, we consider blind quantum
computation for the continuous-variable measurement-based model. We show that
blind quantum computation is possible for the infinite squeezing case. We also
show that the finite squeezing causes no additional problem in the blind setup
apart from the one inherent to the continuous-variable measurement-based
quantum computation.Comment: 20 pages, 8 figure
Blind quantum computation protocol in which Alice only makes measurements
Blind quantum computation is a new secure quantum computing protocol which
enables Alice who does not have sufficient quantum technology to delegate her
quantum computation to Bob who has a fully-fledged quantum computer in such a
way that Bob cannot learn anything about Alice's input, output, and algorithm.
In previous protocols, Alice needs to have a device which generates quantum
states, such as single-photon states. Here we propose another type of blind
computing protocol where Alice does only measurements, such as the polarization
measurements with a threshold detector. In several experimental setups, such as
optical systems, the measurement of a state is much easier than the generation
of a single-qubit state. Therefore our protocols ease Alice's burden.
Furthermore, the security of our protocol is based on the no-signaling
principle, which is more fundamental than quantum physics. Finally, our
protocols are device independent in the sense that Alice does not need to trust
her measurement device in order to guarantee the security.Comment: 9 pages, 3 figure
Flow Ambiguity: A Path Towards Classically Driven Blind Quantum Computation
Blind quantum computation protocols allow a user to delegate a computation to
a remote quantum computer in such a way that the privacy of their computation
is preserved, even from the device implementing the computation. To date, such
protocols are only known for settings involving at least two quantum devices:
either a user with some quantum capabilities and a remote quantum server or two
or more entangled but noncommunicating servers. In this work, we take the first
step towards the construction of a blind quantum computing protocol with a
completely classical client and single quantum server. Specifically, we show
how a classical client can exploit the ambiguity in the flow of information in
measurement-based quantum computing to construct a protocol for hiding critical
aspects of a computation delegated to a remote quantum computer. This ambiguity
arises due to the fact that, for a fixed graph, there exist multiple choices of
the input and output vertex sets that result in deterministic measurement
patterns consistent with the same fixed total ordering of vertices. This allows
a classical user, computing only measurement angles, to drive a
measurement-based computation performed on a remote device while hiding
critical aspects of the computation.Comment: (v3) 14 pages, 6 figures. expands introduction and definition of
flow, corrects typos to increase readability; contains a new figure to
illustrate example run of CDBQC protocol; minor changes to match the
published version.(v2) 12 pages, 5 figures. Corrects motivation for
quantities used in blindness analysi
Quality of life in patients with intermittent claudication
© 2017, The Author(s). Background: Intermittent claudication (IC) is a common condition that causes pain in the lower limbs when walking and has been shown to severely impact the quality of life (QoL) of patients. The QoL is therefore often regarded as an important measure in clinical trials investigating intermittent claudication. To date, no consensus exits on the type of life questionnaire to be used. This review aims to examine the QoL questionnaires used in trials investigating peripheral arterial disease (PAD). Material and methods: A systematic review of randomised clinical trials including a primary analysis of QoL via questionnaire was performed. Trials involving patients with diagnosed PAD were included (either clinically or by questionnaire). Any trial which had QoL as the primary outcome data was included with no limit being placed on the type of questionnaire used. Results: The search yielded a total of 1845 articles of which 31 were deemed appropriate for inclusion in the review. In total, 14 different QoL questionnaires were used across 31 studies. Of the questionnaires 24.06% were missing at least one domain when reported in the results of the study. Mean standard deviation varied widely based on the domain reported, particularly within the SF36. Discussion: Despite previous recommendations for Europewide standardisation of quality of life assessment, to date no such tool exists. This review demonstrated that a number of different questionnaires remain in use, that their completion is often inadequate and that further evidence-based guidelines on QoL assessment are required to guide future research
- …
