Alice and Bob in an Expanding Spacetime
نویسندگان
چکیده
We investigate the teleportation of a qubit from a comoving sender Alice to an inertial receiver Bob in an asymptotically flat Robertson-Walker expanding spacetime. We use scalar or fermionic field modes inside Alice’s and Bob’s ideal cavities and show the degradation of the teleportation quality, as measured by the fidelity, through a mechanism governed by spacetime expansion. This reduction is demonstrated to increase with the rapidity of the expansion and to be highly sensitive to the coupling of the field to spacetime curvature, becoming considerably stronger as it reduces from conformal to minimal. We explore a perturbative approach in the cosmological parameters to compute the Bogoliubov coefficients in order to evaluate and compare the fidelity degradation of fermionic and scalar fields.
منابع مشابه
Location-Oblivious Data Transfer with Flying Entangled Qudits
We present a simple and practical quantum protocol involving two mistrustful agencies in Minkowski space, which allows Alice to transfer data to Bob at a spacetime location that neither can predict in advance. The location depends on both Alice’s and Bob’s actions. The protocol guarantees unconditionally to Alice that Bob learns the data at a randomly determined location; it guarantees to Bob t...
متن کاملPractice Problems Cryptography and Network Security
(a) Alice and Bob wish to resolve a dispute over telephone. We can encode the possibilities of the dispute by a binary value. For this they engage a protocol: i. Alice → Bob: Alice picks up randomly an x, which is a 200 bit number and computes the function f(x). Alice sends f(x) to Bob. ii. Bob → Alice: Bob tells Alice whether x was even or odd. iii. Alice → Bob: Alice then sends x to Bob, so t...
متن کاملAn Optimistic Non-repudiation Protocol with Transparent Trusted Third Party
In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to send a non-repudiation of origin evidence to Bob (attesting that Alice is at the origin of the transmitted message), and Bob has to send a non-repudiation of receipt evidence to Alice (attesting Bob’s receipt of the ...
متن کاملIdentity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob the resulting ciphertext, which Bob can send to the trusted authority. The trusted authority provides Bob the symmetric key only upon verifying Bob’s identity. 1 Identity-Based Encryption Shamir introduced [7] the notio...
متن کاملSpace in Monoidal Categories
The category of Hilbert modules may be interpreted as a naive quantum field theory over a base space. Open subsets of the base space are recovered as idempotent subunits, which form a meet-semilattice in any firm braided monoidal category. There is an operation of restriction to an idempotent subunit: it is a graded monad on the category, and has the universal property of algebraic localisation...
متن کامل