# A no-summoning theorem in relativistic quantum theory

@article{Kent2011ANT,
title={A no-summoning theorem in relativistic quantum theory},
journal={Quantum Information Processing},
year={2011},
volume={12},
pages={1023-1032}
}
• A. Kent
• Published 24 January 2011
• Philosophy, Physics
• Quantum Information Processing
Alice gives Bob an unknown localized physical state at some point P. At some point Q in the causal future of P, Alice will ask Bob for the state back. Bob knows this, but does not know at which point Q until the request is made. Bob can satisfy Alice’s summons, with arbitrarily short delay, for a quantum state in Galilean space-time or a classical state in Minkowski space-time. However, given an unknown quantum state in Minkowski space-time, he cannot generally fulfil her summons. This no…
45 Citations
• A. Kent
• Physics
Physical Review A
• 2018
We define a summoning task to require propagating an unknown quantum state to a point in space-time belonging to a set determined by classical inputs at points in space-time. We consider the
• Computer Science
New Journal of Physics
• 2018
A thorough mathematical framework for summoning quantum information in a relativistic system is developed and a protocol based on a Calderbank–Shor–Steane code is presented that decreases the space complexity for encoding by a factor of two compared to the previous best result and reduces the gate complexity from scaling as the cube to the square of the number of causal diamonds.
• Physics
• 2012
This work answers the operational question of exactly when the information can be summoned to a set of spacetime points, showing how to do so efficiently using a combination of teleportation and codeword-stabilized quantum codes.
Bit commitment protocols and other cryptographic protocols based on the no-summoning theorem can thus be proven secure against some classes of post-quantum but non-signalling adversaries.
Quantum mechanics is an extraordinarily successful scientific theory. But more than 100 years after it was first introduced, the interpretation of the theory remains controversial. This Element
• A. Kent
• Computer Science, Physics
• 2012
A general framework for defining tasks within (special) relativistic quantum theory is described and illustrated with examples from relativist quantum cryptography and relativists distributed quantum computation.
• Philosophy
• 2015
We recently considered the task of summoning an unknown quantum state and proved necessary and sufficient conditions for Alice to be able to guarantee to complete the task when there may be several
In this Ph.D. thesis, I investigate the communication abilities of non-inertial observers and the precision to which they can measure parametrized states. I introduce relativistic quantum field
A new quantum information task is presented, the quantum information causality game, whose success probability is upper bounded by the new principle, and an optimal strategy to perform it combines the quantum teleportation and superdense coding protocols with a task that has classical inputs.
• A. May
• Computer Science
Journal of High Energy Physics
• 2019
The cryptographic and AdS/CFT approaches to completing asymptotic quantum tasks are studied and the efficiency with which they replace bulk classical geometry with boundary entanglement is considered.

## References

SHOWING 1-10 OF 44 REFERENCES

• Bennett
• Physics
Physical review letters
• 1993
An unknown quantum state \ensuremath{\Vert}\ensuremath{\varphi}〉 can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical Einstein-Podolsky-Rosen
• Computer Science
Nature
• 2009
It is suggested that information causality—a generalization of the no-signalling condition—might be one of the foundational properties of nature and help to distinguish physical theories from non-physical ones.
It is shown that the supplementary information must always be as large as it can possibly be i.e. the clone must be able to be generated from the additional information alone, independently of the first (given) copy.
Abstract A family of asymmetric cloning machines for N-dimensional quantum states is introduced. These machines produce two imperfect copies of a single state that emerge from non-identical
Quantum theory is compatible with special relativity. In particular, though measurements on entangled systems are correlated in a way that cannot be reproduced by local hidden variables, they cannot
• Physics
• 2001
We show that for any Hilbert-space dimension, the optimal 1!2 universal quantum cloner can be constructed from essentially the same quantum circuit, i.e., we find a universal design for universal
A simple and practical quantum protocol involving two mistrustful agencies in Minkowski space that allows Alice to transfer data to Bob at a space-time location that neither can predict in advance, illustrates further the scope for novel cryptographic applications of relativistic quantum theory.
• Physics
Physical review letters
• 1996
The general impossibility of determining the state of a single quantum system is proved for arbitrary measuring schemes, including a succession of measurements. Some recently proposed methods are
• R. Malaney
• Physics
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
• 2010
It is found that the performance of quantum location verification is in fact similar for Bell states and some N > 2 GHZ states, even though quantum decoherence degrades larger-qubit entanglements faster.
• Computer Science
ArXiv
• 2010
The pitfalls of naive quantum cryptographic reasoning in this context are illustrated by describing several protocols which at first sight appear unconditionally secure but which, as it is shown, can in fact be broken by teleportation-based attacks.