Alice and Bob in an Expanding Spacetime

نویسندگان

  • Helder Alexander
  • Gustavo de Souza
  • Paul Mansfield
  • Marcos Sampaio
چکیده

We investigate the teleportation of a qubit from a comoving sender Alice to an inertial receiver Bob in an asymptotically flat Robertson-Walker expanding spacetime. We use scalar or fermionic field modes inside Alice’s and Bob’s ideal cavities and show the degradation of the teleportation quality, as measured by the fidelity, through a mechanism governed by spacetime expansion. This reduction is demonstrated to increase with the rapidity of the expansion and to be highly sensitive to the coupling of the field to spacetime curvature, becoming considerably stronger as it reduces from conformal to minimal. We explore a perturbative approach in the cosmological parameters to compute the Bogoliubov coefficients in order to evaluate and compare the fidelity degradation of fermionic and scalar fields.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Location-Oblivious Data Transfer with Flying Entangled Qudits

We present a simple and practical quantum protocol involving two mistrustful agencies in Minkowski space, which allows Alice to transfer data to Bob at a spacetime location that neither can predict in advance. The location depends on both Alice’s and Bob’s actions. The protocol guarantees unconditionally to Alice that Bob learns the data at a randomly determined location; it guarantees to Bob t...

متن کامل

Practice Problems Cryptography and Network Security

(a) Alice and Bob wish to resolve a dispute over telephone. We can encode the possibilities of the dispute by a binary value. For this they engage a protocol: i. Alice → Bob: Alice picks up randomly an x, which is a 200 bit number and computes the function f(x). Alice sends f(x) to Bob. ii. Bob → Alice: Bob tells Alice whether x was even or odd. iii. Alice → Bob: Alice then sends x to Bob, so t...

متن کامل

An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party

In this paper we consider a new and efficient optimistic nonrepudiation protocol. In a non-repudiation protocol, during which Alice wants to transmit a message to Bob, Alice has to send a non-repudiation of origin evidence to Bob (attesting that Alice is at the origin of the transmitted message), and Bob has to send a non-repudiation of receipt evidence to Alice (attesting Bob’s receipt of the ...

متن کامل

Identity-Based Decryption

Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob the resulting ciphertext, which Bob can send to the trusted authority. The trusted authority provides Bob the symmetric key only upon verifying Bob’s identity. 1 Identity-Based Encryption Shamir introduced [7] the notio...

متن کامل

Space in Monoidal Categories

The category of Hilbert modules may be interpreted as a naive quantum field theory over a base space. Open subsets of the base space are recovered as idempotent subunits, which form a meet-semilattice in any firm braided monoidal category. There is an operation of restriction to an idempotent subunit: it is a graded monad on the category, and has the universal property of algebraic localisation...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016