Skip to main content

Showing 1–13 of 13 results for author: Hamrick, M

.
  1. arXiv:0709.0128  [pdf, ps, other

    quant-ph

    A Universal Operator Theoretic Framework for Quantum Fault Tolerance

    Authors: Gerald Gilbert, Michael Hamrick, Yaakov S. Weinstein, Vaneet Aggarwal, A. Robert Calderbank

    Abstract: In this paper we introduce a universal operator theoretic framework for quantum fault tolerance. This incorporates a top-down approach that implements a system-level criterion based on specification of the full system dynamics, applied at every level of error correction concatenation. This leads to more accurate determinations of error thresholds than could previously be obtained. This is demons… ▽ More

    Submitted 12 February, 2008; v1 submitted 2 September, 2007; originally announced September 2007.

    Comments: v3: 8 pages, 3 figures, explicit numerical example comparing OQFT to QFT added

    Journal ref: Quantum Information Processing, pp. 541-549 (Oct. 2010)

  2. Quantum Sensor Miniaturization

    Authors: G. Gilbert, M. Hamrick, Y. S. Weinstein, S. P. Pappas, A. Donadio

    Abstract: The classical bound on image resolution defined by the Rayleigh limit can be beaten by exploiting the properties of quantum mechanical entanglement. If entangled photons are used as signal states, the best possible resolution is instead given by the Heisenberg limit, an improvement proportional to the number of entangled photons in the signal. In this paper we present a novel application of enta… ▽ More

    Submitted 24 August, 2007; originally announced August 2007.

    Comments: 3 pages, 1 figure. Accepted for publication in Photonics Technology Letters

    Journal ref: IEEE Photonics Technology Letters, vol. 19, no. 22, 1798 (2007)

  3. arXiv:0707.0008  [pdf, ps, other

    quant-ph

    Reliable Final Computational Results from Faulty Quantum Computation

    Authors: Gerald Gilbert, Michael Hamrick, Yaakov S. Weinstein

    Abstract: In this paper we extend both standard fault tolerance theory and Kitaev's model for quantum computation, combining them so as to yield quantitative results that reveal the interplay between the two. Our analysis establishes a methodology that allows us to quantitatively determine design parameters for a quantum computer, the values of which ensure that an overall computation of interest yields a… ▽ More

    Submitted 29 June, 2007; originally announced July 2007.

    Comments: 7 pages, 2 figures

  4. arXiv:quant-ph/0612156  [pdf, ps, other

    quant-ph

    On the use of photonic N00N states for practical quantum interferometry

    Authors: G. Gilbert, M. Hamrick, Y. S. Weinstein

    Abstract: The performance of photonic $N00N$ states, propagating in an attenuating medium, is analyzed with respect to phase estimation. It is shown that, for $N00N$ states propagating through a lossy medium, the Heisenberg limit is never achieved. It is also shown that, for a given value of $N$, a signal comprised of an attenuated separable state of $N$ photons will actually produce a better phase estima… ▽ More

    Submitted 19 December, 2006; originally announced December 2006.

    Comments: 14 pages, 7 figures

    Journal ref: JOSA B, Vol. 25, Issue 8, pp. 1336-1340, 2008

  5. Efficient Construction of Photonic Quantum Computational Clusters

    Authors: Gerald Gilbert, Michael Hamrick, Yaakov S. Weinstein

    Abstract: We demonstrate a method of creating photonic two-dimensional cluster states that is considerably more efficient than previously proposed approaches. Our method uses only local unitaries and type-I fusion operations. The increased efficiency of our method compared to previously proposed constructions is obtained by identifying and exploiting local equivalence properties inherent in cluster states… ▽ More

    Submitted 14 December, 2005; originally announced December 2005.

    Comments: 4 pages, 4 figures

    Journal ref: Phys. Rev. A 73 064303 (2006)

  6. arXiv:quant-ph/0511177  [pdf, ps, other

    quant-ph

    Quantum Computer Condition: Stability, Classical Computation and Norms

    Authors: Gerald Gilbert, Michael Hamrick, F. Javier Thayer, Yaakov S. Weinstein

    Abstract: The Quantum Computer Condition (QCC) provides a rigorous and completely general framework for carrying out analyses of questions pertaining to fault-tolerance in quantum computers. In this paper we apply the QCC to the problem of fluctuations and systematic errors in the values of characteristic parameters in realistic systems. We show that fault-tolerant quantum computation is possible despite… ▽ More

    Submitted 17 November, 2005; originally announced November 2005.

    Comments: 6 pages

  7. arXiv:quant-ph/0510116  [pdf, ps, other

    quant-ph

    Comment on "Operator Quantum Error Correction"

    Authors: Gerald Gilbert, Michael Hamrick, F. Javier Thayer, Yaakov S. Weinstein

    Abstract: The attempt to equate operator quantum error correction (quant-ph/0504189v1) with the quantum computer condition (quant-ph/0507141) in version two of quant-ph/0504189 is shown to be invalid.

    Submitted 17 October, 2005; originally announced October 2005.

    Comments: 1 1/2 pages

  8. arXiv:quant-ph/0507141  [pdf, ps, other

    quant-ph

    A Theory of Physical Quantum Computation: The Quantum Computer Condition

    Authors: Gerald Gilbert, Michael Hamrick, F. Javier Thayer

    Abstract: In this paper we present a new unified theoretical framework that describes the full dynamics of quantum computation. Our formulation allows any questions pertaining to the physical behavior of a quantum computer to be framed, and in principle, answered. We refer to the central organizing principle developed in this paper, on which our theoretical structure is based, as the *Quantum Computer Con… ▽ More

    Submitted 20 July, 2005; v1 submitted 15 July, 2005; originally announced July 2005.

    Comments: In version 2 we: (a) made minor clarifications, (b) corrected minor typos. All results unchanged. (45 pages, 2 figures.)

  9. arXiv:quant-ph/0108013  [pdf, ps, other

    quant-ph

    Privacy Amplification in Quantum Key Distribution: Pointwise Bound versus Average Bound

    Authors: G. Gilbert, M. Hamrick, F. J. Thayer

    Abstract: In order to be practically useful, quantum cryptography must not only provide a guarantee of secrecy, but it must provide this guarantee with a useful, sufficiently large throughput value. The standard result of generalized privacy amplification yields an upper bound only on the average value of the mutual information available to an eavesdropper. Unfortunately this result by itself is inadequat… ▽ More

    Submitted 2 August, 2001; originally announced August 2001.

    Report number: MTR 01W0000056

  10. arXiv:quant-ph/0106043  [pdf, ps, other

    quant-ph

    Secrecy, Computational Loads and Rates in Practical Quantum Cryptography

    Authors: G. Gilbert, M. Hamrick

    Abstract: A number of questions associated with practical implementations of quantum cryptography systems having to do with unconditional secrecy, computational loads and effective secrecy rates in the presence of perfect and imperfect sources are discussed. The different types of unconditional secrecy, and their relationship to general communications security, are discussed in the context of quantum cryp… ▽ More

    Submitted 11 September, 2002; v1 submitted 7 June, 2001; originally announced June 2001.

    Comments: Final version of paper; will appear in Algorithmica, Special Issue on Quantum Computation and Cryptography

    Report number: MTR 01W0000017

    Journal ref: Algorithmica (2002) 34: 314-339

  11. arXiv:quant-ph/0106034  [pdf, ps, other

    quant-ph

    Constraints on Eavesdropping on the BB84 Protocol

    Authors: G. Gilbert, M. Hamrick

    Abstract: An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdropping attacks, how the general analysis of this pro… ▽ More

    Submitted 11 June, 2001; v1 submitted 6 June, 2001; originally announced June 2001.

    Comments: Typo in eq.(5) corrected; Figure replaced with graph for alpha=0.01; No change in final conclusions

    Report number: MTR 01W0000020

  12. arXiv:quant-ph/0106033  [pdf, ps, other

    quant-ph

    The Secrecy Capacity of Practical Quantum Cryptography

    Authors: G. Gilbert, M. Hamrick

    Abstract: Quantum cryptography has attracted much recent attention due to its potential for providing secret communications that cannot be decrypted by any amount of computational effort. This is the first analysis of the secrecy of a practical implementation of the BB84 protocol that simultaneously takes into account and presents the {\it full} set of complete analytical expressions for effects due to th… ▽ More

    Submitted 6 June, 2001; originally announced June 2001.

    Report number: MTR 01W0000019

  13. arXiv:quant-ph/0009027  [pdf, ps, other

    quant-ph

    Practical Quantum Cryptography: A Comprehensive Analysis (Part One)

    Authors: G. Gilbert, M. Hamrick

    Abstract: We perform a comprehensive analysis of practical quantum cryptography (QC) systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels for ground-ground, ground-satellite, air-satellite and satellite-satellite links. (1) We obtain universal expressions for the effective secrecy capacity and rate for QC systems taking into account three importan… ▽ More

    Submitted 4 December, 2003; v1 submitted 7 September, 2000; originally announced September 2000.

    Comments: In the earlier versions of this paper it was asserted without proof that the attacks considered in our analysis, namely, USD, PNS, and combined (hybrid PNS and USD), exhaust all possible individual attacks. This assertion is not correct and is modified in this revision: see the "Added Note" placed at the end of the paper immediately following the "Discussion" section for a fuller discussion. Our comparative analysis of USD, PNS and hybrid attacks is unaffected by this

    Report number: MTR 00W0000052