#### Filter Results:

#### Publication Year

1999

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

– This paper analyzes effects of time-dependence in the Bell inequality. A generalized inequality is derived for the case when coincidence and non-coincidence [and hence whether or not a pair contributes to the actual data] is controlled by timing that depends on the detector settings. Needless to say, this inequality is violated by quantum mechanics and… (More)

- Ingemar Bengtsson, Wojciech Bruzda, Åsa Ericsson, Jan-Åke Larsson, Wojciech Tadej, Karol Życzkowski
- 2006

We report on a search for mutually unbiased bases (MUBs) in 6 dimensions. We find only triplets of MUBs, and thus do not come close to the theoretical upper bound 7. However, we point out that the natural habitat for sets of MUBs is the set of all complex Hadamard matrices of the given order, and we introduce a natural notion of distance between bases in… (More)

- Ingemar Bengtsson, Wojciech Bruzda, Åsa Ericsson, Jan-Åke Larsson, Wojciech Tadej, Karol Życzkowski
- 2007

We report on a search for mutually unbiased bases ͑MUBs͒ in six dimensions. We find only triplets of MUBs, and thus do not come close to the theoretical upper bound 7. However, we point out that the natural habitat for sets of MUBs is the set of all complex Hadamard matrices of the given order, and we introduce a natural notion of distance between bases in… (More)

Unconditionally secure message authentication is an important part of quantum cryptography (QC). In this correspondence, we analyze security effects of using a key obtained from QC for authentication purposes in later rounds of QC. In particular, the eavesdropper gains partial knowledge on the key in QC that may have an effect on the security of the… (More)

- Matthias Kleinmann, Otfried Gühne, José R. Portillo, Jan-Åke Larsson
- 2010

The simulation of quantum effects requires certain classical resources, and quantifying them is an important step in order to understand the difference between quantum and classical physics. We investigate the minimum classical memory needed to simulate the phenomenon of state-independent quantum contextuality in sequential measurements. We derive optimal… (More)

Quantum Cryptography, or more accurately, Quantum Key Distribution (QKD) is based on using an unconditionally secure " quantum channel " to share a secret key among two users. A manufacturer of QKD devices could, intentionally or not, use a (semi-)classical channel instead of the quantum channel, which would remove the supposedly unconditional security. One… (More)

We derive a Gaussian approximation of the LLR distribution conditioned on the transmitted signal and the channel matrix for the soft-output via partial marginalization MIMO detector. This detector performs exact ML as a special case. Our main results consist of discussing the operational meaning of this approximation and a proof that, in the limit of high… (More)

- Jan-Åke Larsson
- 1999

A local-variable model yielding the statistics from the singlet state is presented for the case of inefficient detectors and/or lowered visibility. It has independent errors and the highest efficiency at perfect visibility is 77.80%, while the highest visibility at perfect detector-efficiency is 63.66%. Thus, the model cannot be refuted by measurements made… (More)

- Richard D. Gill, Toni Acin, Marco Barbieri, Wim van Dam, Nicolas Gisin, Peter Grünwald +1 other
- 2007

I explain so-called quantum nonlocality experiments and discuss how to optimize them. Statistical tools from missing data maximum likelihood are crucial. New results are given on CGLMP, CH and ladder inequalities. Open problems are also discussed. 1. The name of the game QM vs. LR. Bell's [5] theorem states that quantum physics (aka quantum mechanics , QM)… (More)