ﻻ يوجد ملخص باللغة العربية
We show that qubits traveling along closed timelike curves are a resource that a party can exploit to distinguish perfectly any set of quantum states. As a result, an adversary with access to closed timelike curves can break any prepare-and-measure quantum key distribution protocol. Our result also implies that a party with access to closed timelike curves can violate the Holevo bound.
Recently, the quantum information processing power of closed timelike curves have been discussed. Because the most widely accepted model for quantum closed timelike curve interactions contains ambiguities, different authors have been able to reach ra
Closed timelike curves are among the most controversial features of modern physics. As legitimate solutions to Einsteins field equations, they allow for time travel, which instinctively seems paradoxical. However, in the quantum regime these paradoxe
In general relativity, closed timelike curves can break causality with remarkable and unsettling consequences. At the classical level, they induce causal paradoxes disturbing enough to motivate conjectures that explicitly prevent their existence. At
In this work, we investigate what kinds of quantum states are feasible to perform perfectly secure secret sharing, and present its necessary and sufficient conditions. We also show that the states are bipartite distillable for all bipartite splits, a
According to the set theory, we prove that objects moving along closed timelike curves (CTCs) should belong to proper classes, but never to any set. Particles in a set have to change own some properties when they come into a CVC in order to become the objects in a proper class.