Unital Quantum Operations on the Bloch Ball and Bloch Region
نویسندگان
چکیده
For one qubit systems, we present a short, elementary argument characterizing unital quantum operators in terms of their action on Bloch vectors. We then show how our approach generalizes to multi-qubit systems, obtaining inequalities that govern when a “diagonal” superoperator on the Bloch region is a quantum operator. These inequalities are the n-qubit analogue of the Algoet-Fujiwara conditions. Our work is facilitated by an analysis of operator-sum decompositions in which negative summands are allowed.
منابع مشابه
Weighted composition operators on weighted Bergman spaces and weighted Bloch spaces
In this paper, we characterize the bonudedness and compactness of weighted composition operators from weighted Bergman spaces to weighted Bloch spaces. Also, we investigate weighted composition operators on weighted Bergman spaces and extend the obtained results in the unit ball of $mathbb{C}^n$.
متن کاملOn characterizations of hyperbolic harmonic Bloch and Besov spaces
We define hyperbolic harmonic $omega$-$alpha$-Bloch space $mathcal{B}_omega^alpha$ in the unit ball $mathbb{B}$ of ${mathbb R}^n$ and characterize it in terms of $$frac{omegabig((1-|x|^2)^{beta}(1-|y|^2)^{alpha-beta}big)|f(x)-f(y)|}{[x,y]^gamma|x-y|^{1-gamma}},$$ where $0leq gammaleq 1$. Similar results are extended to little $omega$-$alpha$-Bloch and Besov spaces. These obtained...
متن کاملDissipative ‘Groups’ and the Bloch Ball
Recent developments in quantum computing have emphasized the need for a realistic analysis of dissipation in systems which have the potential for use as qubits. In this note we discuss the effects of control and dissipation on a two-level system. For a single qubit pure state, it is well known that the unitary evolution may be visualised as the movement of a vector, the Bloch vector, on the sur...
متن کاملEfficient Computational Information Geometric Analysis of Physically Allowed Quantum Cloning Attacks for Quantum Key Distribution Protocols
In secret quantum communications the best eavesdropping attacks on quantum cryptography are based on imperfect cloning machines. The incoherent attack, based on quantum cloning, is the most common eavesdropping strategy. Using a probe, the eavesdropper imperfectly clones the sender’s quantum state which keeps one copy and sends the other. The physically allowed transformations of Eve’s quantum ...
متن کاملRelative Entropy and Single Qubit Holevo-Schumacher-Westmoreland Channel Capacity
The relative entropy description of Holevo-Schumacher-Westmoreland (HSW) classical channel capacities is applied to single qubit quantum channels. A simple formula for the relative entropy of qubit density matrices in the Bloch sphere representation is derived. The formula is combined with the King-Ruskai-Szarek-Werner qubit channel ellipsoid picture to analyze several unital and non-unital qub...
متن کامل