We consider the Bennett-Brassard cryptographic scheme, which uses two conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits sent in one of the bases causes a disturbance to qubits sent in the other basis. We derive an upper bound to the accessible information in one basis, for a given error rate in the conjugate basis.… (More)
SFI Working Papers contain accounts of scientific work of the author(s) and do not necessarily represent the views of the Santa Fe Institute. We accept papers intended for publication in peer-reviewed journals or proceedings volumes, but not papers that have already appeared in print. Except for papers by our external faculty, papers must be based on work… (More)
1 Recently there has been a spate of articles, reviews, and letters in Physics Today promoting various " interpretations " of quantum theory Their running theme is that from the time of quantum theory's emergence until the discovery of a particular interpretation, the theory was in a crisis because its foundations were unsatisfactory or even inconsistent.… (More)
Bell inequalities are derived for any number of observers, any number of alternative setups for each one of them, and any number of distinct outcomes for each experiment. It is shown that if a physical system consists of several distant subsystems, and if the results of tests performed on the latter are determined by local variables with objective values,… (More)
We inquire under what conditions some of the information in a quantum signal source, namely a set of pure states a emitted with probabilities p a , can be extracted in classical form by a measurement leaving the quantum system with less entropy than it had before, but retaining the ability to regenerate the source state exactly from the classical… (More)
Popper conceived an experiment whose analysis led to a result that he deemed absurd. Popper wrote that his reasoning was based on the Copenhagen interpretation and therefore invalidated the latter. Actually, Popper's argument involves counterfactual reasoning and violates Bohr's complementarity principle. The absurdity of Popper's result only confirms… (More)
We consider quantum cryptographic schemes where the carriers of information are 3-state particles. One protocol uses four mutually unbiased bases and appears to provide better security than obtainable with 2-state carriers. Another possible method allows quantum states to belong to more than one basis. Security is not better, but many curious features arise.
This article discusses the intimate relationship between quantum mechanics, information theory, and relativity theory. Taken together these are the foundations of present-day theoretical physics, and their interrelationship is an essential part of the theory. The acquisition of information from a quantum system by an observer occurs at the interface of… (More)