We consider a model of heat engine operating in the microscopic regime: the two-stroke engine. It produces work and exchanges heat in two discrete strokes that are separated in time. The working body of the engine consists of two d-level systems initialized in thermal states at two distinct temperatures.
View Article and Find Full Text PDFThe famous Davies-GKSL secular Markovian master equation is tremendously successful in approximating the evolution of open quantum systems in terms of just a few parameters. However, the fully secular Davies-GKSL equation fails to accurately describe timescales short enough, i.e.
View Article and Find Full Text PDFIf a quantum system interacts with the environment, then the Hamiltonian acquires a correction known as the Lamb-shift term. There are two other corrections to the Hamiltonian, related to the stationary state. Namely, the stationary state is to first approximation a Gibbs state with respect to original Hamiltonian.
View Article and Find Full Text PDFWe demonstrate how to incorporate a catalyst to enhance the performance of a heat engine. Specifically, we analyze efficiency in one of the simplest engine models, which operates in only two strokes and comprises of a pair of two-level systems, potentially assisted by a d-dimensional catalyst. When no catalysis is present, the efficiency of the machine is given by the Otto efficiency.
View Article and Find Full Text PDFThe fluctuation-dissipation theorem is a fundamental result in statistical physics that establishes a connection between the response of a system subject to a perturbation and the fluctuations associated with observables in equilibrium. Here we derive its version within a resource-theoretic framework, where one investigates optimal quantum state transitions under thermodynamic constraints. More precisely, we first characterize optimal thermodynamic distillation processes, and then we prove a relation between the amount of free energy dissipated in such processes and the free-energy fluctuations of the initial state of the system.
View Article and Find Full Text PDFPort-based teleportation (PBT), introduced in 2008, is a type of quantum teleportation protocol which transmits the state to the receiver without requiring any corrections on the receiver's side. Evaluating the performance of PBT was computationally intractable and previous attempts succeeded only with small systems. We study PBT protocols and fully characterize their performance for arbitrary dimensions and number of ports.
View Article and Find Full Text PDFRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components and in a situation where the violation of a Bell inequality only guarantees that some outcomes of the device for specific inputs exhibit randomness? Here, we solve this question and present a device-independent protocol for randomness amplification of Santha-Vazirani sources using a device consisting of two nonsignaling components. We show that the protocol can amplify any such source that is not fully deterministic into a fully random source while tolerating a constant noise rate and prove the composable security of the protocol against general no-signaling adversaries.
View Article and Find Full Text PDFWe consider Bayesian estimate of static magnetic field, characterized by a prior Gaussian probability distribution, in systems of a few electron quantum dot spins interacting with infinite temperature spin environment via hyperfine interaction. Sudden transitions among optimal states and measurements are observed. Usefulness of measuring occupation levels is shown for all times of the evolution, together with the role of entanglement in the optimal scenario.
View Article and Find Full Text PDFThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand, an important ongoing research program concerns the formulation of device-independent cryptographic protocols based on quantum nonlocal correlations for the generation of secure keys, and the amplification and expansion of random bits against general no-signaling adversaries.
View Article and Find Full Text PDFRandomness is both a useful way to model natural systems and a useful tool for engineered systems, e.g., in computation, communication, and control.
View Article and Find Full Text PDFRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems.
View Article and Find Full Text PDFThe superposition principle is one of the landmarks of quantum mechanics. The importance of quantum superpositions provokes questions about the limitations that quantum mechanics itself imposes on the possibility of their generation. In this work, we systematically study the problem of the creation of superpositions of unknown quantum states.
View Article and Find Full Text PDFProc Natl Acad Sci U S A
March 2016
We obtain a general connection between a large quantum advantage in communication complexity and Bell nonlocality. We show that given any protocol offering a sufficiently large quantum advantage in communication complexity, there exists a way of obtaining measurement statistics that violate some Bell inequality. Our main tool is port-based teleportation.
View Article and Find Full Text PDFThe second law of thermodynamics places a limitation into which states a system can evolve into. For systems in contact with a heat bath, it can be combined with the law of energy conservation, and it says that a system can only evolve into another if the free energy goes down. Recently, it's been shown that there are actually many second laws, and that it is only for large macroscopic systems that they all become equivalent to the ordinary one.
View Article and Find Full Text PDFWe present a scheme for encoding and decoding an unknown state for CSS codes, based on syndrome measurements. We illustrate our method by means of Kitaev toric code, defected-lattice code, topological subsystem code and 3D Haah code. The protocol is local whenever in a given code the crossings between the logical operators consist of next neighbour pairs, which holds for the above codes.
View Article and Find Full Text PDFThe second law of thermodynamics places constraints on state transformations. It applies to systems composed of many particles, however, we are seeing that one can formulate laws of thermodynamics when only a small number of particles are interacting with a heat bath. Is there a second law of thermodynamics in this regime? Here, we find that for processes which are approximately cyclic, the second law for microscopic systems takes on a different form compared to the macroscopic scale, imposing not just one constraint on state transformations, but an entire family of constraints.
View Article and Find Full Text PDFWe study a problem of interconvertibility of two supraquantum resources: one is the so-called Popescu-Rohrlich (PR) box, which violates Clauser-Horne-Shimony-Holt inequality up to the maximal algebraic bound, and the second is the so-called random access code (RAC). The latter is a functionality that enables Bob (receiver) to choose one of two bits of Alice. It is known that a PR box supplemented with one bit of communication can be used to simulate a RAC.
View Article and Find Full Text PDFThe ideas of thermodynamics have proved fruitful in the setting of quantum information theory, in particular the notion that when the allowed transformations of a system are restricted, certain states of the system become useful resources with which one can prepare previously inaccessible states. The theory of entanglement is perhaps the best-known and most well-understood resource theory in this sense. Here, we return to the basic questions of thermodynamics using the formalism of resource theories developed in quantum information theory and show that the free energy of thermodynamics emerges naturally from the resource theory of energy-preserving transformations.
View Article and Find Full Text PDFThe relationship between thermodynamics and statistical physics is valid in the thermodynamic limit-when the number of particles becomes very large. Here we study thermodynamics in the opposite regime-at both the nanoscale and when quantum effects become important. Applying results from quantum information theory, we construct a theory of thermodynamics in these limits.
View Article and Find Full Text PDFWe introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group and the port-based teleportation protocols, introduced by Hiroshima and Ishizaka, that use the symmetric permutation group. We derive sufficient conditions for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them.
View Article and Find Full Text PDFPhys Rev E Stat Nonlin Soft Matter Phys
September 2012
We analyze equilibration times of subsystems of a larger system under a random total Hamiltonian, in which the basis of the Hamiltonian is drawn from the Haar measure. We obtain that the time of equilibration is of the order of the inverse of the arithmetic average of the Bohr frequencies. To compute the average over a random basis, we compute the inverse of a matrix of overlaps of operators which permute four systems.
View Article and Find Full Text PDFBased on the monogamy of entanglement, we develop the technique of quantum conditioning to build an additive entanglement measure: the conditional entanglement of mutual information. Its operational meaning is elaborated to be the minimal net "flow of qubits" in the process of partial state merging. The result and conclusion can also be generalized to multipartite entanglement cases.
View Article and Find Full Text PDFWe perform an information-theoretical analysis of quantum measurement processes and obtain the global information balance in quantum measurements, in the form of a closed chain equation for quantum mutual entropies. Our balance provides a tight and general entropic information-disturbance trade-off, and explains the physical mechanism underlying it. Finally, the single-outcome case, that is, the case of measurements with posts election, is briefly discussed.
View Article and Find Full Text PDFWe derive a new inequality for entanglement for a mixed four-partite state. Employing this inequality, we present a one-shot lower bound for entanglement cost and prove that entanglement cost is strictly larger than zero for any entangled state. We demonstrate that irreversibility occurs in the process of formation for all nondistillable entangled states.
View Article and Find Full Text PDFWe study the loss of entanglement of a bipartite state subjected to discarding or measurement of one qubit. Examining behavior of different entanglement measures, we find that entanglement of formation, entanglement cost, logarithmic negativity, and one-way distillable entanglement are lockable measures in that they can decrease arbitrarily after measuring one qubit. We prove that any convex and asymptotically noncontinuous measure is lockable.
View Article and Find Full Text PDF