Extremal quantum protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Extremal weight modules of quantum affine algebras

Let ĝ be an affine Lie algebra, and let Uq(ĝ) be the quantum affine algebra introduced by Drinfeld and Jimbo. In [11] Kashiwara introduced a Uq(ĝ)-module V (λ), having a global crystal base for an integrable weight λ of level 0. We call it an extremal weight module. It is isomorphic to the Weyl module introduced by Chari-Pressley [6]. In [12, §13] Kashiwara gave a conjecture on the structure of...

متن کامل

Extremal Quantum States in Coupled Systems

Let H1,H2 be finite dimensional complex Hilbert spaces describing the states of two finite level quantum systems. Suppose ρi is a state in Hi, i = 1, 2. Let C(ρ1, ρ2) be the convex set of all states ρ inH = H1⊗H2 whose marginal states inH1 andH2 are ρ1 and ρ2 respectively. Here we present a necessary and sufficient criterion for a ρ in C(ρ1, ρ2) to be an extreme point. Such a condition implies,...

متن کامل

Model checking quantum protocols

We introduce model-checking techniques for the automated analysis of quantum information protocols. These protocols take advantage of features of quantum theory such as entanglement and quantum measurement and some implementations already exist. Our techniques enable us to model a class of quantum protocols (those expressible within the stabilizer formalism) which are simulable in polynomial ti...

متن کامل

“Counterfactual” quantum protocols

The counterfactuality of recently proposed protocols is analyzed. A definition of ‘counterfactuality’ is offered and it is argued that an interaction-free measurement of the presence of an opaque object can be named ‘counterfactual’, while proposed “counterfactual” measurements of the absence of such objects are not counterfactual. The quantum key distribution protocols which rely only on measu...

متن کامل

Quantum Communication Complexity of Quantum Authentication Protocols

In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the cha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Mathematical Physics

سال: 2011

ISSN: 0022-2488,1089-7658

DOI: 10.1063/1.3610676