Results 31 to 40 of about 4,670 (139)

Device-independent quantum key distribution with single-photon sources [PDF]

open access: yes, 2020
Device-independent quantum key distribution protocols allow two honest users to establish a secret key with minimal levels of trust on the provider, as security is proven without any assumption on the inner working of the devices used for the ...
Acín, Antonio   +6 more
core   +3 more sources

Beyond Bell's theorem: correlation scenarios

open access: yesNew Journal of Physics, 2012
Bell's theorem witnesses that the predictions of quantum theory cannot be reproduced by theories of local hidden variables in which observers can choose their measurements independently of the source.
Tobias Fritz
doaj   +1 more source

All CHSH polytopes

open access: yes, 2014
The correlations that admit a local hidden-variable model are described by a family of polytopes, whose facets are the Bell inequalities. The CHSH inequality is the simplest such Bell inequality and is a facet of every Bell polytope.
Pironio, Stefano
core   +1 more source

Certifying long-range quantum correlations through routed Bell tests [PDF]

open access: yesQuantum
Losses in the transmission channel, which increase with distance, pose a major obstacle to photonics demonstrations of quantum nonlocality and its applications. Recently, Chaturvedi, Viola, and Pawlowski (CVP) [arXiv:2211.14231] introduced a variation of
Edwin Peter Lobo   +2 more
doaj   +1 more source

High-speed batch processing of semidefinite programs with feedforward neural networks

open access: yesNew Journal of Physics, 2021
Semidefinite programming is an important optimization task, often used in time-sensitive applications. Though they are solvable in polynomial time, in practice they can be too slow to be used in online, i.e. real-time applications.
Tamás Kriváchy   +4 more
doaj   +1 more source

Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

open access: yes, 2009
Device independent quantum key distribution aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used.
Acin A   +6 more
core   +2 more sources

Bounding the persistency of the nonlocality of W states [PDF]

open access: yes, 2016
The nonlocal properties of the W states are investigated under particle loss. By removing all but two particles from an $N$-qubit W state, the resulting two-qubit state is still entangled. Hence, the W state has high persistency of entanglement.
Bene, Erika   +3 more
core   +3 more sources

Hyperdense coding and superadditivity of classical capacities in hypersphere theories

open access: yesNew Journal of Physics, 2015
In quantum superdense coding, two parties previously sharing entanglement can communicate a two bit message by sending a single qubit. We study this feature in the broader framework of general probabilistic theories.
Serge Massar   +2 more
doaj   +1 more source

Semi-device-independent framework based on natural physical assumptions [PDF]

open access: yesQuantum, 2017
The semi-device-independent approach provides a framework for prepare-and-measure quantum protocols using devices whose behavior must not be characterized nor trusted, except for a single assumption on the dimension of the Hilbert space characterizing ...
Thomas Van Himbeeck   +4 more
doaj   +1 more source

Bell tests for continuous variable systems using hybrid measurements and heralded amplifiers

open access: yes, 2012
We present Bell tests for optical continuous variable systems, combining both hybrid measurements (i.e. measuring both particle and wave aspects of light) and heralded amplifiers.
Brask, Jonatan Bohr   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy