Literature DB >> 23619692

Classical command of quantum systems.

Ben W Reichardt1, Falk Unger, Umesh Vazirani.   

Abstract

Quantum computation and cryptography both involve scenarios in which a user interacts with an imperfectly modelled or 'untrusted' system. It is therefore of fundamental and practical interest to devise tests that reveal whether the system is behaving as instructed. In 1969, Clauser, Horne, Shimony and Holt proposed an experimental test that can be passed by a quantum-mechanical system but not by a system restricted to classical physics. Here we extend this test to enable the characterization of a large quantum system. We describe a scheme that can be used to determine the initial state and to classically command the system to evolve according to desired dynamics. The bipartite system is treated as two black boxes, with no assumptions about their inner workings except that they obey quantum physics. The scheme works even if the system is explicitly designed to undermine it; any misbehaviour is detected. Among its applications, our scheme makes it possible to test whether a claimed quantum computer is truly quantum. It also advances towards a goal of quantum cryptography: namely, the use of 'untrusted' devices to establish a shared random key, with security based on the validity of quantum physics.

Year:  2013        PMID: 23619692     DOI: 10.1038/nature12035

Source DB:  PubMed          Journal:  Nature        ISSN: 0028-0836            Impact factor:   49.962


  10 in total

1.  Unconditional security of quantum key distribution over arbitrarily long distances

Authors: 
Journal:  Science       Date:  1999-03-26       Impact factor: 47.728

2.  Simple proof of security of the BB84 quantum key distribution protocol

Authors: 
Journal:  Phys Rev Lett       Date:  2000-07-10       Impact factor: 9.161

3.  Demonstration of blind quantum computing.

Authors:  Stefanie Barz; Elham Kashefi; Anne Broadbent; Joseph F Fitzsimons; Anton Zeilinger; Philip Walther
Journal:  Science       Date:  2012-01-20       Impact factor: 47.728

4.  Maximal violation of Bell inequalities for mixed states.

Authors: 
Journal:  Phys Rev Lett       Date:  1992-06-01       Impact factor: 9.161

5.  Quantum cryptography based on Bell's theorem.

Authors: 
Journal:  Phys Rev Lett       Date:  1991-08-05       Impact factor: 9.161

6.  No signaling and quantum key distribution.

Authors:  Jonathan Barrett; Lucien Hardy; Adrian Kent
Journal:  Phys Rev Lett       Date:  2005-06-27       Impact factor: 9.161

7.  Device-independent security of quantum cryptography against collective attacks.

Authors:  Antonio Acín; Nicolas Brunner; Nicolas Gisin; Serge Massar; Stefano Pironio; Valerio Scarani
Journal:  Phys Rev Lett       Date:  2007-06-04       Impact factor: 9.161

8.  Universally composable privacy amplification from causality constraints.

Authors:  Lluís Masanes
Journal:  Phys Rev Lett       Date:  2009-04-10       Impact factor: 9.161

9.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

Authors:  Ilja Gerhardt; Qin Liu; Antía Lamas-Linares; Johannes Skaar; Christian Kurtsiefer; Vadim Makarov
Journal:  Nat Commun       Date:  2011-06-14       Impact factor: 14.919

10.  Secure device-independent quantum key distribution with causally independent measurement devices.

Authors:  Lluís Masanes; Stefano Pironio; Antonio Acín
Journal:  Nat Commun       Date:  2011       Impact factor: 14.919

  10 in total
  17 in total

1.  Certified randomness in quantum physics.

Authors:  Antonio Acín; Lluis Masanes
Journal:  Nature       Date:  2016-12-07       Impact factor: 49.962

2.  Quantum physics: A grip on misbehaviour.

Authors:  Stefano Pironio; Dorit Aharonov
Journal:  Nature       Date:  2013-04-25       Impact factor: 49.962

3.  The ultimate physical limits of privacy.

Authors:  Artur Ekert; Renato Renner
Journal:  Nature       Date:  2014-03-27       Impact factor: 49.962

4.  Contextuality supplies the 'magic' for quantum computation.

Authors:  Mark Howard; Joel Wallman; Victor Veitch; Joseph Emerson
Journal:  Nature       Date:  2014-06-11       Impact factor: 49.962

5.  Rigidity of the magic pentagram game.

Authors:  Amir Kalev; Carl A Miller
Journal:  Quantum Sci Technol       Date:  2017-11-02

6.  Experimental quantum key distribution certified by Bell's theorem.

Authors:  D P Nadlinger; P Drmota; B C Nichol; G Araneda; D Main; R Srinivas; D M Lucas; C J Ballance; K Ivanov; E Y-Z Tan; P Sekatski; R L Urbanke; R Renner; N Sangouard; J-D Bancal
Journal:  Nature       Date:  2022-07-27       Impact factor: 69.504

7.  All pure bipartite entangled states can be self-tested.

Authors:  Andrea Coladangelo; Koon Tong Goh; Valerio Scarani
Journal:  Nat Commun       Date:  2017-05-26       Impact factor: 14.919

8.  Computational quantum-classical boundary of noisy commuting quantum circuits.

Authors:  Keisuke Fujii; Shuhei Tamate
Journal:  Sci Rep       Date:  2016-05-18       Impact factor: 4.379

9.  A quantum approach to homomorphic encryption.

Authors:  Si-Hui Tan; Joshua A Kettlewell; Yingkai Ouyang; Lin Chen; Joseph F Fitzsimons
Journal:  Sci Rep       Date:  2016-09-23       Impact factor: 4.379

10.  Practical device-independent quantum cryptography via entropy accumulation.

Authors:  Rotem Arnon-Friedman; Frédéric Dupuis; Omar Fawzi; Renato Renner; Thomas Vidick
Journal:  Nat Commun       Date:  2018-01-31       Impact factor: 14.919

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.