منابع مشابه
Extremal weight modules of quantum affine algebras
Let ĝ be an affine Lie algebra, and let Uq(ĝ) be the quantum affine algebra introduced by Drinfeld and Jimbo. In [11] Kashiwara introduced a Uq(ĝ)-module V (λ), having a global crystal base for an integrable weight λ of level 0. We call it an extremal weight module. It is isomorphic to the Weyl module introduced by Chari-Pressley [6]. In [12, §13] Kashiwara gave a conjecture on the structure of...
متن کاملExtremal Quantum States in Coupled Systems
Let H1,H2 be finite dimensional complex Hilbert spaces describing the states of two finite level quantum systems. Suppose ρi is a state in Hi, i = 1, 2. Let C(ρ1, ρ2) be the convex set of all states ρ inH = H1⊗H2 whose marginal states inH1 andH2 are ρ1 and ρ2 respectively. Here we present a necessary and sufficient criterion for a ρ in C(ρ1, ρ2) to be an extreme point. Such a condition implies,...
متن کاملModel checking quantum protocols
We introduce model-checking techniques for the automated analysis of quantum information protocols. These protocols take advantage of features of quantum theory such as entanglement and quantum measurement and some implementations already exist. Our techniques enable us to model a class of quantum protocols (those expressible within the stabilizer formalism) which are simulable in polynomial ti...
متن کامل“Counterfactual” quantum protocols
The counterfactuality of recently proposed protocols is analyzed. A definition of ‘counterfactuality’ is offered and it is argued that an interaction-free measurement of the presence of an opaque object can be named ‘counterfactual’, while proposed “counterfactual” measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measu...
متن کاملQuantum Communication Complexity of Quantum Authentication Protocols
In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the cha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Mathematical Physics
سال: 2011
ISSN: 0022-2488,1089-7658
DOI: 10.1063/1.3610676