Skip to main content

Showing 1–14 of 14 results for author: Thinh, L P

Searching in archive quant-ph. Search in all archives.
.
  1. Worst-case Quantum Hypothesis Testing with Separable Measurements

    Authors: Le Phuc Thinh, Michele Dall'Arno, Valerio Scarani

    Abstract: For any pair of quantum states (the hypotheses), the task of binary quantum hypotheses testing is to derive the tradeoff relation between the probability $p_{01}$ of rejecting the null hypothesis and $p_{10}$ of accepting the alternative hypothesis. The case when both hypotheses are explicitly given was solved in the pioneering work by Helstrom. Here, instead, for any given null hypothesis as a pu… ▽ More

    Submitted 8 September, 2020; v1 submitted 24 October, 2019; originally announced October 2019.

    Report number: YITP-20-101

    Journal ref: Quantum 4, 320 (2020)

  2. Certification of a functionality in a quantum network stage

    Authors: Victoria Lipinska, Le Phuc Thinh, Jeremy Ribeiro, Stephanie Wehner

    Abstract: We consider testing the ability of quantum network nodes to execute multi-round quantum protocols. Specifically, we examine protocols in which the nodes are capable of performing quantum gates, storing qubits and exchanging said qubits over the network a certain number of times. We propose a simple ping-pong test, which provides a certificate for the capability of the nodes to run certain multi-ro… ▽ More

    Submitted 28 April, 2020; v1 submitted 22 October, 2019; originally announced October 2019.

    Comments: 17+18 pages. 6 figures

  3. arXiv:1909.05472  [pdf, ps, other

    quant-ph

    Computing quantum Bell inequalities

    Authors: Le Phuc Thinh

    Abstract: Understanding the limits of quantum theory in terms of uncertainty and correlation has always been a topic of foundational interest. Surprisingly this pursuit can also bear interesting applications such as device-independent quantum cryptography and tomography or self-testing. Building upon a series of recent works on the geometry of quantum correlations, we are interested in the problem of comput… ▽ More

    Submitted 12 September, 2019; originally announced September 2019.

  4. Structure of the set of quantum correlators via semidefinite programming

    Authors: Le Phuc Thinh, Antonios Varvitsiotis, Yu Cai

    Abstract: Quantum information leverages properties of quantum behaviors in order to perform useful tasks such as secure communication and randomness certification. Nevertheless, not much is known about the intricate geometric features of the set quantum behaviors. In this paper we study the structure of the set of quantum correlators using semidefinite programming. Our main results are (i) a generalization… ▽ More

    Submitted 28 September, 2018; originally announced September 2018.

    Comments: Comments welcome!

    Journal ref: Phys. Rev. A 99, 052108 (2019)

  5. Practical and reliable error bars for quantum process tomography

    Authors: Le Phuc Thinh, Philippe Faist, Jonas Helsen, David Elkouss, Stephanie Wehner

    Abstract: Current techniques in quantum process tomography typically return a single point estimate of an unknown process based on a finite albeit large amount of measurement data. Due to statistical fluctuations, however, other processes close to the point estimate can also produce the observed data with near certainty. Unless appropriate error bars can be constructed, the point estimate does not carry any… ▽ More

    Submitted 1 August, 2018; originally announced August 2018.

    Comments: Our software is hosted at https://github.com/Tomographer/QPtomographer

    Journal ref: Phys. Rev. A 99, 052311 (2019)

  6. Randomness extraction from Bell violation with continuous parametric down conversion

    Authors: Lijiong Shen, Jianwei Lee, Le Phuc Thinh, Jean-Daniel Bancal, Alessandro Cerè, Antia Lamas-Linares, Adriana Lita, Thomas Gerrits, Sae Woo Nam, Valerio Scarani, Christian Kurtsiefer

    Abstract: We present a violation of the CHSH inequality without the fair sampling assumption with a continuously pumped photon pair source combined with two high efficiency superconducting detectors. Due to the continuous nature of the source, the choice of the duration of each measurement round effectively controls the average number of photon pairs participating in the Bell test. We observe a maximum viol… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 10 pages, 3 figures

    Journal ref: Phys. Rev. Lett. 121, 150402 (2018)

  7. Optimizing practical entanglement distillation

    Authors: Filip Rozpędek, Thomas Schiet, Le Phuc Thinh, David Elkouss, Andrew C. Doherty, Stephanie Wehner

    Abstract: The goal of entanglement distillation is to turn a large number of weakly entangled states into a smaller number of highly entangled ones. Practical entanglement distillation schemes offer a tradeoff between the fidelity to the target state, and the probability of successful distillation. Exploiting such tradeoffs is of interest in the design of quantum repeater protocols. Here, we present a numbe… ▽ More

    Submitted 19 July, 2018; v1 submitted 27 March, 2018; originally announced March 2018.

    Comments: 15+21 pages, 13 figures. v2: "realistic operations (RO)" renamed to "measure and exchange (MX) operations", published version

    Journal ref: Phys. Rev. A 97, 062333 (2018)

  8. Device-independence for two-party cryptography and position verification

    Authors: Jeremy Ribeiro, Le Phuc Thinh, Jedrzej Kaniewski, Jonas Helsen, Stephanie Wehner

    Abstract: Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. U… ▽ More

    Submitted 28 June, 2016; originally announced June 2016.

    Comments: 28 pages, 4 figures, 2 tables

    Journal ref: Phys. Rev. A 97, 062307 (2018)

  9. arXiv:1601.06166  [pdf, other

    quant-ph gr-qc hep-th

    Certified Randomness from a Two-Level System in a Relativistic Quantum Field

    Authors: Le Phuc Thinh, Jean-Daniel Bancal, Eduardo Martin-Martinez

    Abstract: Randomness is an indispensable resource in modern science and information technology. Fortunately, an experimentally simple procedure exists to generate randomness with well-characterized devices: measuring a quantum system in a basis complementary to its preparation. Towards realizing this goal one may consider using atoms or superconducting qubits, promising candidates for quantum information pr… ▽ More

    Submitted 22 January, 2016; originally announced January 2016.

    Comments: 11 pages. 8 figures. RevTeX 4.1

    Journal ref: Phys. Rev. A 94, 022321 (2016)

  10. Randomness in post-selected events

    Authors: Le Phuc Thinh, Gonzalo de la Torre, Jean-Daniel Bancal, Stefano Pironio, Valerio Scarani

    Abstract: Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little randomness. This raises the question as to whether randomness can be extracted only from the smaller post-selected subset corresponding to proper detection… ▽ More

    Submitted 8 March, 2016; v1 submitted 12 June, 2015; originally announced June 2015.

    Comments: similar to published version, new section (III) on photonic experiments

    Journal ref: New J. Phys. 18 (2016) 035007

  11. Quantum randomness extraction for various levels of characterization of the devices

    Authors: Yun Zhi Law, Le Phuc Thinh, Jean-Daniel Bancal, Valerio Scarani

    Abstract: The amount of intrinsic randomness that can be extracted from measurement on quantum systems depends on several factors: notably, the power given to the adversary and the level of characterization of the devices of the authorized partners. After presenting a systematic introduction to these notions, in this paper we work in the class of least adversarial power, which is relevant for assessing setu… ▽ More

    Submitted 15 October, 2014; v1 submitted 17 January, 2014; originally announced January 2014.

    Comments: 11pages, 3 figures. Section II is a concise review of works on randomness, structured around three classes of adversarial power and three levels of characterization of the devices. In Section V, we discuss some subtleties of randomness extraction when an ancilla is required (POVMs, pointer measurements)

    Journal ref: J. Phys. A: Math. Theor. 47 (2014) 424028

  12. Bell tests with min-entropy sources

    Authors: Le Phuc Thinh, Lana Sheridan, Valerio Scarani

    Abstract: Device independent protocols rely on the violation of Bell inequalities to certify properties of the resources available. The violation of the inequalities are meaningless without a few well-known assumptions. One of these is measurement independence, the property that the source of the states measured in an inequality is uncorrelated from the measurements selected. Since this assumption cannot be… ▽ More

    Submitted 26 June, 2013; v1 submitted 12 April, 2013; originally announced April 2013.

    Comments: 12 pages, 3 figures; similar to published version; comments are welcomed

    Journal ref: Phys. Rev. A 87, 062121 (2013)

  13. Security of distributed-phase-reference quantum key distribution

    Authors: Tobias Moroder, Marcos Curty, Charles Ci Wen Lim, Le Phuc Thinh, Hugo Zbinden, Nicolas Gisin

    Abstract: Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. Since many years, a full security proof of these schemes in a realistic setting has been elusive. For the first time, we solve this long standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result we pro… ▽ More

    Submitted 23 July, 2012; originally announced July 2012.

    Comments: 4 pages + appendix, 4 figures

    Journal ref: Phys. Rev. Lett. 109, 260501 (2012)

  14. Tomographic Quantum Cryptography Protocols are Reference Frame Independent

    Authors: Le Phuc Thinh, Lana Sheridan, Valerio Scarani

    Abstract: We consider the class of reference frame independent protocols in d dimensions for quantum key distribution, in which Alice and Bob have one natural basis that is aligned and the rest of their frames are unaligned. We relate existing approaches to tomographically complete protocols. We comment on two different approaches to finite key bounds in this setting, one direct and one using the entropic u… ▽ More

    Submitted 26 June, 2012; v1 submitted 12 September, 2011; originally announced September 2011.

    Comments: Published version. 8 pages, 1 figure

    Journal ref: International Journal of Quantum Information, Vol. 10, No. 3 (2012) 1250035