ترغب بنشر مسار تعليمي؟ اضغط هنا

Particle exchange in post-quantum theories

394   0   0.0 ( 0 )
 نشر من قبل Andrew J P Garner
 تاريخ النشر 2013
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

In quantum theory, particles in three spatial dimensions come in two different types: bosons or fermions, which exhibit sharply contrasting behaviours due to their different exchange statistics. Could more general forms of probabilistic theories admit more exotic types of particles? Here, we propose a thought experiment to identify more exotic particles in general post-quantum theories. We consider how in quantum theory the phase introduced by swapping indistinguishable particles can be measured. We generalise this to post-quantum scenarios whilst imposing indistinguishability and locality principles. We show that our ability to witness exotic particle exchange statistics depends on which symmetries are admitted within a theory. These exotic particles can manifest unusual behaviour, such as non-abelianicity even in topologically simple three-dimensional space.

قيم البحث

اقرأ أيضاً

Googles CECPQ1 experiment in 2016 integrated a post-quantum key-exchange algorithm, newhope1024, into TLS 1.2. The Google-Cloudflare CECPQ2 experiment in 2019 integrated a more efficient key-exchange algorithm, ntruhrss701, into TLS 1.3. This paper revisits the choices made in CECPQ2, and shows how to achieve higher performance for post-quantum key exchange in TLS 1.3 using a higher-security algorithm, sntrup761. Previous work had indicated that ntruhrss701 key generation was much faster than sntrup761 key generation, but this paper makes sntrup761 key generation much faster by generating a batch of keys at once. Batch key generation is invisible at the TLS protocol layer, but raises software-engineering questions regarding the difficulty of integrating batch key exchange into existing TLS libraries and applications. This paper shows that careful choices of software layers make it easy to integrate fast post-quantum software, including batch key exchange, into TLS with minor changes to TLS libraries and no changes to applications. As a demonstration of feasibility, this paper reports successful integration of its fast sntrup761 library, via a lightly patched OpenSSL, into an unmodified web browser and an unmodified TLS terminator. This paper also reports TLS 1.3 handshake benchmarks, achieving more TLS 1.3 handshakes per second than any software included in OpenSSL.
Gauge theories establish the standard model of particle physics, and lattice gauge theory (LGT) calculations employing Markov Chain Monte Carlo (MCMC) methods have been pivotal in our understanding of fundamental interactions. The present limitations of MCMC techniques may be overcome by Hamiltonian-based simulations on classical or quantum devices, which further provide the potential to address questions that lay beyond the capabilities of the current approaches. However, for continuous gauge groups, Hamiltonian-based formulations involve infinite-dimensional gauge degrees of freedom that can solely be handled by truncation. Current truncation schemes require dramatically increasing computational resources at small values of the bare couplings, where magnetic field effects become important. Such limitation precludes one from `taking the continuous limit while working with finite resources. To overcome this limitation, we provide a resource-efficient protocol to simulate LGTs with continuous gauge groups in the Hamiltonian formulation. Our new method allows for calculations at arbitrary values of the bare coupling and lattice spacing. The approach consists of the combination of a Hilbert space truncation with a regularization of the gauge group, which permits an efficient description of the magnetically-dominated regime. We focus here on Abelian gauge theories and use $2+1$ dimensional quantum electrodynamics as a benchmark example to demonstrate this efficient framework to achieve the continuum limit in LGTs. This possibility is a key requirement to make quantitative predictions at the field theory level and offers the long-term perspective to utilise quantum simulations to compute physically meaningful quantities in regimes that are precluded to quantum Monte Carlo.
We explore finite-field frameworks for quantum theory and quantum computation. The simplest theory, defined over unrestricted finite fields, is unnaturally strong. A second framework employs only finite fields with no solution to x^2+1=0, and thus pe rmits an elegant complex representation of the extended field by adjoining i=sqrt{-1}. Quantum theories over these fields recover much of the structure of conventional quantum theory except for the condition that vanishing inner products arise only from null states; unnaturally strong computational power may still occur. Finally, we are led to consider one more framework, with further restrictions on the finite fields, that recovers a local transitive order and a locally-consistent notion of inner product with a new notion of cardinal probability. In this framework, conventional quantum mechanics and quantum computation emerge locally (though not globally) as the size of the underlying field increases. Interestingly, the framework allows one to choose separate finite fields for system description and for measurement: the size of the first field quantifies the resources needed to describe the system and the size of the second quantifies the resources used by the observer. This resource-based perspective potentially provides insights into quantitative measures for actual computational power, the complexity of quantum system definition and evolution, and the independent question of the cost of the measurement process.
115 - Eric Chitambar , Gilad Gour 2018
Quantum resource theories (QRTs) offer a highly versatile and powerful framework for studying different phenomena in quantum physics. From quantum entanglement to quantum computation, resource theories can be used to quantify a desirable quantum effe ct, develop new protocols for its detection, and identify processes that optimize its use for a given application. Particularly, QRTs revolutionize the way we think about familiar properties of physical systems like entanglement, elevating them from just being interesting from a fundamental point of view to being useful in performing practical tasks. The basic methodology of a general QRT involves partitioning all quantum states into two groups, one consisting of free states and the other consisting of resource states. Accompanying the set of free states is a collection of free quantum operations arising from natural restrictions on physical systems, and that consists of all the physical processes allowed by the resource theory and which acts invariantly on the set of free states. The QRT then studies what information processing tasks become possible using the restricted operations. Despite the large degree of freedom in how one defines the free states and free operations, unexpected similarities emerge among different QRTs in terms of resource measures and resource convertibility. As a result, objects that appear quite distinct on the surface, such as entanglement and quantum reference frames, appear to have great similarity on a deeper structural level. In this article we review the general framework of a quantum resource theory, focusing on common structural features, operational tasks, and resource measures. To illustrate these concepts, an overview is provided on some of the more commonly studied QRTs in the literature.
Teleportation is a cornerstone of quantum technologies, and has played a key role in the development of quantum information theory. Pushing the limits of teleportation is therefore of particular importance. Here, we apply a different aspect of quantu mness to teleportation -- namely exchange-free computation at a distance. The controlled-phase universal gate we propose, where no particles are exchanged between control and target, allows complete Bell detection among two remote parties, and is experimentally feasible. Our teleportation-with-a-twist, which we extend to telecloning, then requires no pre-shared entanglement nor classical communication between sender and receiver, with the teleported state gradually appearing at its destination.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا