Corpus ID: 221640795

Deterministic Teleportation and Universal Computation Without Particle Exchange

@article{Salih2020DeterministicTA,
  title={Deterministic Teleportation and Universal Computation Without Particle Exchange},
  author={Hatim Salih and Jonte R. Hance and Will McCutcheon and Terry Rudolph and John G. Rarity},
  journal={arXiv: Quantum Physics},
  year={2020}
}
Teleportation is a cornerstone of quantum technologies, and has played a key role in the development of quantum information theory. Pushing the limits of teleportation is therefore of particular importance. Here, we apply a different aspect of quantum weirdness to teleportation---namely exchange-free computation at a distance. The controlled-phase universal gate we propose, where no particles are exchanged between control and target, allows complete Bell detection among two remote parties, and… Expand

Figures from this paper

Does the weak trace show the past of a quantum particle in an unperturbed system?
We investigate the weak trace method for determining the path of a quantum particle in an unperturbed system. Specifically, looking at nested interferometer experiments, when internal interferometersExpand
The Quantum Eraser Paradox
C. Bracken,1, 2 J.R. Hance,3, ∗ and S. Hossenfelder4 Dept of Experimental Physics, Maynooth University, Maynooth, Co. Kildare, Ireland Astronomy & Astrophysics Section, School of Cosmic Physics,Expand
The wave-function as a true ensemble
In quantum mechanics, the wave-function only predicts probabilities of measurement outcomes, not individual outcomes. This suggests that it describes an ensemble of states with different values of aExpand
Three approaches for analyzing the counterfactuality of counterfactual protocols
Counterfactual communication protocols are analysed using three approaches: a classical argument, the weak trace criterion, and the Fisher information criterion. It is argued that the classicalExpand
Counterfactual ghost imaging
TLDR
A protocol for ghost imaging is given in a way that is always counterfactual—while imaging an object, no light interacts with that object, and it provides a many-fold improvement in visibility and signal-to-noise ratio over previous protocols. Expand
Do the laws of physics prohibit counterfactual communication?
TLDR
This paper proposes exactly such a counterfactual scheme where, unambiguously, none of Alice's photons that make it has been to Bob, and demonstrates counterfactuality experimentally by means of weak measurements, as well as conceptually using consistent histories. Expand

References

SHOWING 1-10 OF 71 REFERENCES
Frontiers in Physics 3
  • 94 (2016); arXiv preprint arXiv:1404.2200
  • 2014
Phys
  • Rev. Lett. 110, 170502
  • 2013
Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.
An unknown quantum state \ensuremath{\Vert}\ensuremath{\varphi}〉 can be disassembled into, then later reconstructed from, purely classical information and purely nonclassical Einstein-Podolsky-RosenExpand
Physical Review Letters 63
  • 1989
Exchange-free computation on an unknown qubit at a distance
TLDR
A protocol is proposed that allows one party to directly enact, by means of a suitable program, any computation exchange-free on a remote second party's unknown qubit, thus opening the possibility of directly enacting any desired algorithm remotely on a programmable quantum circuit. Expand
Protocol for direct counterfactual quantum communication.
TLDR
Using the "chained" quantum Zeno effect, this work shows how, in the ideal asymptotic limit, information can be transferred between Alice and Bob without any physical particles traveling between them. Expand
A dynamical quantum Cheshire Cat effect and implications for counterfactual communication
TLDR
A type of dynamic effect is reported that is at the core of the so called "counterfactual computation" and especially " counterfactual communication" quantum effects that have generated a lot of interest recently, and generalizes the quantum Cheshire Cat effect to dynamical settings. Expand
Three approaches for analyzing the counterfactuality of counterfactual protocols
Counterfactual communication protocols are analysed using three approaches: a classical argument, the weak trace criterion, and the Fisher information criterion. It is argued that the classicalExpand
Counterfactual ghost imaging
TLDR
A protocol for ghost imaging is given in a way that is always counterfactual—while imaging an object, no light interacts with that object, and it provides a many-fold improvement in visibility and signal-to-noise ratio over previous protocols. Expand
What Is Nonlocal in Counterfactual Quantum Communication?
TLDR
It is shown that a locally conserved, massless current-specifically, a current of modular angular momentum, L_{z} mod 2ℏ-carries the one bit of information. Expand
...
1
2
3
4
5
...