750 research outputs found

    Topological Subsystem Codes

    Full text link
    We introduce a family of 2D topological subsystem quantum error-correcting codes. The gauge group is generated by 2-local Pauli operators, so that 2-local measurements are enough to recover the error syndrome. We study the computational power of code deformation in these codes, and show that boundaries cannot be introduced in the usual way. In addition, we give a general mapping connecting suitable classical statistical mechanical models to optimal error correction in subsystem stabilizer codes that suffer from depolarizing noise.Comment: 16 pages, 11 figures, explanations added, typos correcte

    Non-abelian vortices and non-abelian statistics

    Get PDF
    We study the interactions of non-abelian vortices in two spatial dimensions. These interactions have novel features, because the Aharonov-Bohm effect enables a pair of vortices to exchange quantum numbers. The cross section for vortex-vortex scattering is typically a multi-valued function of the scattering angle. There can be an exchange contribution to the vortex-vortex scattering amplitude that adds coherently with the direct amplitude, even if the two vortices have distinct quantum numbers. Thus two vortices can be ``indistinguishable'' even though they are not the same

    Fault-Tolerant Thresholds for Encoded Ancillae with Homogeneous Errors

    Full text link
    I describe a procedure for calculating thresholds for quantum computation as a function of error model given the availability of ancillae prepared in logical states with independent, identically distributed errors. The thresholds are determined via a simple counting argument performed on a single qubit of an infinitely large CSS code. I give concrete examples of thresholds thus achievable for both Steane and Knill style fault-tolerant implementations and investigate their relation to threshold estimates in the literature.Comment: 14 pages, 5 figures, 3 tables; v2 minor edits, v3 completely revised, submitted to PR

    Inverting quantum decoherence by classical feedback from the environment

    Full text link
    We show that for qubits and qutrits it is always possible to perfectly recover quantum coherence by performing a measurement only on the environment, whereas for dimension d>3 there are situations where recovery is impossible, even with complete access to the environment. For qubits, the minimal amount of classical information to be extracted from the environment equals the entropy exchange.Comment: Phys. Rev. Lett. 95, 090501 (2005). Published versio

    Black holes as mirrors: quantum information in random subsystems

    Get PDF
    We study information retrieval from evaporating black holes, assuming that the internal dynamics of a black hole is unitary and rapidly mixing, and assuming that the retriever has unlimited control over the emitted Hawking radiation. If the evaporation of the black hole has already proceeded past the "half-way" point, where half of the initial entropy has been radiated away, then additional quantum information deposited in the black hole is revealed in the Hawking radiation very rapidly. Information deposited prior to the half-way point remains concealed until the half-way point, and then emerges quickly. These conclusions hold because typical local quantum circuits are efficient encoders for quantum error-correcting codes that nearly achieve the capacity of the quantum erasure channel. Our estimate of a black hole's information retention time, based on speculative dynamical assumptions, is just barely compatible with the black hole complementarity hypothesis.Comment: 18 pages, 2 figures. (v2): discussion of decoding complexity clarifie

    Multiparticle Entanglement in the Lipkin-Meshkov-Glick Model

    Full text link
    The multiparticle entanglement in the Lipkin-Meshkov-Glick model has been discussed extensively in this paper. Measured by the global entanglement and its generalization, our calculation shows that the multiparticle entanglement can faithfully detect quantum phase transitions. For an antiferromagnetic case the multiparticle entanglement reaches the maximum at the transition point, whereas for ferromagnetic coupling, two different behaviors of multiparticle entanglement can be identified, dependent on the anisotropic parameter in the coupling.Comment: 7 pages and 5 figure

    Quantum Computational Complexity in the Presence of Closed Timelike Curves

    Full text link
    Quantum computation with quantum data that can traverse closed timelike curves represents a new physical model of computation. We argue that a model of quantum computation in the presence of closed timelike curves can be formulated which represents a valid quantification of resources given the ability to construct compact regions of closed timelike curves. The notion of self-consistent evolution for quantum computers whose components follow closed timelike curves, as pointed out by Deutsch [Phys. Rev. D {\bf 44}, 3197 (1991)], implies that the evolution of the chronology respecting components which interact with the closed timelike curve components is nonlinear. We demonstrate that this nonlinearity can be used to efficiently solve computational problems which are generally thought to be intractable. In particular we demonstrate that a quantum computer which has access to closed timelike curve qubits can solve NP-complete problems with only a polynomial number of quantum gates.Comment: 8 pages, 2 figures. Minor changes and typos fixed. Reference adde

    Secure quantum key distribution with an uncharacterized source

    Get PDF
    We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitrary source whose averaged states are basis-independent, a condition that is automatically satisfied if the source is suitably designed. The proof is based on the observation that, to an adversary, the key extraction process is equivalent to a measurement in the sigma_x-basis performed on a pure sigma_z-basis eigenstate. The dependence of the achievable key length on the bit error rate is the same as that established by Shor and Preskill for a perfect source, indicating that the defects in the source are efficiently detected by the protocol.Comment: 4 pages, 1 figure, REVTeX, minor revision

    Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

    Get PDF
    We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement-purification based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo
    corecore