386 research outputs found
Does Clauser-Horne-Shimony-Holt Correlation or Freedman-Clauser Correlation lead to the largest violation of Bell's Inequality?
An inequality is deduced from Einstein's locality and a supplementary
assumption. This inequality defines an experiment which can actually be
performed with present technology to test local realism. Quantum mechanics
violate this inequality a factor of 1.5. In contrast, quantum mechanics
violates previous inequalities (for example, Clauser-Horne-Shimony-Holt
inequality of 1969, Freedman-Clauser inequality of 1972, Clauser-Horne
inequality of 1974) by a factor of . Thus the magnitude of violation
of the inequality derived in this paper is approximately larger than
the magnitude of violation of previous inequalities. This result can be
particularly important for the experimental test of locality.Comment: 15 pages, LaTeX file, no figure
Bell's inequality for n spin-s particles
The Mermin-Klyshko inequality for n spin-1/2 particles and two dichotomic
observables is generalized to n spin-s particles and two maximal observables.
It is shown that some multiparty multilevel Greenberger-Horne-Zeilinger states
[A. Cabello, Phys. Rev. A 63, 022104 (2001)] maximally violate this inequality
for any s. For a fixed n, the magnitude of the violation is constant for any s,
which provides a simple demonstration and generalizes the conclusion reached by
Gisin and Peres for two spin-s particles in the singlet state [Phys. Lett. A
162, 15 (1992)]. For a fixed s, the violation grows exponentially with n, which
provides a generalization to any s of Mermin's conclusion for n spin-1/2
particles [Phys. Rev. Lett. 65, 1838 (1990)].Comment: REVTeX4, 4 page
Bell's theorem for general N-qubit states
We derive a single general Bell inequality which is a necessary and
sufficient condition for the correlation function for N particles to be
describable in a local and realistic picture, for the case in which
measurements on each particle can be chosen between two arbitrary dichotomic
observables. We also derive a necessary and sufficient condition for an
arbitrary N-qubit mixed state to violate this inequality. This condition is a
generalization and reformulation of the Horodeccy family condition for two
qubits.Comment: 4 pages, journal versio
Do all pure entangled states violate Bell's inequalities for correlation functions?
Any pure entangled state of two particles violates a Bell inequality for
two-particle correlation functions (Gisin's theorem). We show that there exist
pure entangled N>2 qubit states that do not violate any Bell inequality for N
particle correlation functions for experiments involving two dichotomic
observables per local measuring station. We also find that
Mermin-Ardehali-Belinskii-Klyshko inequalities may not always be optimal for
refutation of local realistic description.Comment: 4 pages, journal versio
Constraints on chiral operators in N=2 SCFTs
Open Access, © The Authors. Article funded by SCOAP3.
This article is distributed under the terms of the Creative Commons
Attribution License (
CC-BY 4.0
), which permits any use, distribution and reproduction in
any medium, provided the original author(s) and source are credited
All multipartite Bell correlation inequalities for two dichotomic observables per site
We construct a set of 2^(2^n) independent Bell correlation inequalities for
n-partite systems with two dichotomic observables each, which is complete in
the sense that the inequalities are satisfied if and only if the correlations
considered allow a local classical model. All these inequalities can be
summarized in a single, albeit non-linear inequality. We show that quantum
correlations satisfy this condition provided the state has positive partial
transpose with respect to any grouping of the n systems into two subsystems. We
also provide an efficient algorithm for finding the maximal quantum mechanical
violation of each inequality, and show that the maximum is always attained for
the generalized GHZ state.Comment: 11 pages, REVTe
Quantum Bit Commitment with a Composite Evidence
Entanglement-based attacks, which are subtle and powerful, are usually
believed to render quantum bit commitment insecure. We point out that the no-go
argument leading to this view implicitly assumes the evidence-of-commitment to
be a monolithic quantum system. We argue that more general evidence structures,
allowing for a composite, hybrid (classical-quantum) evidence, conduce to
improved security. In particular, we present and prove the security of the
following protocol: Bob sends Alice an anonymous state. She inscribes her
commitment by measuring part of it in the + (for ) or (for
) basis. She then communicates to him the (classical) measurement outcome
and the part-measured anonymous state interpolated into other, randomly
prepared qubits as her evidence-of-commitment.Comment: 6 pages, minor changes, journal reference adde
Deterministic secure direct communication using GHZ states and swapping quantum entanglement
We present a deterministic secure direct communication scheme via
entanglement swapping, where a set of ordered maximally entangled
three-particle states (GHZ states), initially shared by three spatially
separated parties, Alice, Bob and Charlie, functions as a quantum information
channel. After ensuring the safety of the quantum channel, Alice and Bob apply
a series local operations on their respective particles according to the
tripartite stipulation and the secret message they both want to send to
Charlie. By three Alice, Bob and Charlie's Bell measurement results, Charlie is
able to infer the secret messages directly. The secret messages are faithfully
transmitted from Alice and Bob to Charlie via initially shared pairs of GHZ
states without revealing any information to a potential eavesdropper. Since
there is not a transmission of the qubits carrying the secret message between
any two of them in the public channel, it is completely secure for direct
secret communication if perfect quantum channel is used.Comment: 9 pages, no figur
Optimal eavesdropping in quantum cryptography with six states
A generalization of the quantum cryptographic protocol by Bennett and
Brassard is discussed, using three conjugate bases, i.e. six states. By
calculating the optimal mutual information between sender and eavesdropper it
is shown that this scheme is safer against eavesdropping on single qubits than
the one based on two conjugate bases. We also address the question for a
connection between the maximal classical correlation in a generalized Bell
inequality and the intersection of mutual informations between sender/receiver
and sender/eavesdropper.Comment: 4 pages, 1 figur
Light-Sheet Imaging to Elucidate Cardiovascular Injury and Repair
Purpose of Review: Real-time 3-dimensional (3-D) imaging of cardiovascular injury and regeneration remains challenging. We introduced a multi-scale imaging strategy that uses light-sheet illumination to enable applications of cardiovascular injury and repair in models ranging from zebrafish to rodent hearts.
Recent Findings: Light-sheet imaging enables rapid data acquisition with high spatiotemporal resolution and with minimal photo-bleaching or photo-toxicity. We demonstrated the capacity of this novel light-sheet approach for scanning a region of interest with specific fluorescence contrast, thereby providing axial and temporal resolution at the cellular level without stitching image columns or pivoting illumination beams during one-time imaging. This cutting-edge imaging technique allows for elucidating the differentiation of stem cells in cardiac regeneration, providing an entry point to discover novel micro-circulation phenomenon with clinical significance for injury and repair.
Summary: These findings demonstrate the multi-scale applications of this novel light-sheet imaging strategy to advance research in cardiovascular development and regeneration
- …
