Since 2002 Perimeter Institute has been recording seminars, conference talks, public outreach events such as talks from top scientists using video cameras installed in our lecture theatres. Perimeter now has 7 formal presentation spaces for its many scientific conferences, seminars, workshops and educational outreach activities, all with advanced audio-visual technical capabilities.
Recordings of events in these areas are all available and On-Demand from this Video Library and on Perimeter Institute Recorded Seminar Archive (PIRSA). PIRSA is a permanent, free, searchable, and citable archive of recorded seminars from relevant bodies in physics. This resource has been partially modelled after Cornell University's arXiv.org.
Accessibly by anyone with internet, Perimeter aims to share the power and wonder of science with this free library.
Imagine that Alice and Bob share a quantum state, from which they want to distill something useful like entanglement or secret key. For this they need to communicate classically and they want to do this by one way communication from Alice to Bob. For some states, it might happen that the state is a part of a tripartite state shared with Charlie, which is invariant if Bob's and Charlie's systems are switched. Such a state is called a symmetric extension, and if it exists Alice and Bob have no chance of distilling key or entanglement by one way communication.
Traditionally, we use the quantum Fourier transform circuit (QFT) in order to perform quantum phase estimation, which has a number of useful applications. The QFT circuit for a binary field generally consists controlled-rotation gates which, when removed, yields the lower-depth approximate QFT circuit. It is known that a logarithmic-depth approximate QFT circuit is sufficient to perform phase estimation with a degree of accuracy negligibly lower than that of the full QFT.
Proving the additivity of the classical capacity of quantum channels is a major open problem in quantum information. This problem is related to the multiplicativity of certain norms with respect to the tensor product. These problems are introduced and some approached to resolving them are discussed. Several special cases that have been solved are also mentioned.
Any implementation of a quantum computer will require the ability to reset qubits to a pure input state, both to start the computation and more importantly to implement fault-tolerant operations. Even if we cannot reset to a perfectly pure state, heat-bath algorithmic cooling provides a method of purifying mixed states. By combining the ability to pump entropy out of the system through a controllable interaction with a heat bath and coherent control of the qubits, we are able to cool a subset of the qubits far below the heat bath temperature.
In this study, we are interested in the practical question of how many times a quantum directional reference frame (i.e., a spin-J system) can be used to perform a certain task with a given probability of success, under the assumption that the quantum directional reference frame evolves under a map that is covariant under rotations in SU(2). Our main theorem restricts the form of the state of the quantum reference frame as a function of how many times the covariant map was applied to it. Our results are a generalization of the paper of Bartlett el al.
Current physical implementations of quantum key distribution (QKD) require communicating parties to be close together. We will explore methods for allowing parties separated by long distances to communicate by combining many QKD links in a network and discuss the resulting security properties.
Previous experiments on the production of entangled photon pairs directly in optical fiber via four-wave mixing (FWM) have used a single pump laser and produced signal and idler photons with similar wavelengths. We will present the first results of our investigation into the production of widely separated entangled photon pairs via FWM in optical fiber using multiple pump lasers also at widely separated wavelengths. This source will have important applications in quantum cryptography and computation.