How to Recover a Qubit That Has Fallen into a Black Hole.

نویسندگان

  • Aidan Chatwin-Davies
  • Adam S Jermyn
  • Sean M Carroll
چکیده

We demonstrate an algorithm for the retrieval of a qubit, encoded in spin angular momentum, that has been dropped into a no-firewall black hole. Retrieval is achieved analogously to quantum teleportation by collecting Hawking radiation and performing measurements on the black hole. Importantly, these methods require only the ability to perform measurements from outside the event horizon.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Organizational Black Hole Theory

There are issues in organizations that require new theoretical formulation. Hence, metaphorical theorizing is used in the study of organizations to interpret them and understand their complexities. In this method, the organization is likened to an entity and one of the key features of that entity is generalized to the organization. It should be borne in mind that most organizational theories ar...

متن کامل

A Statistical Model of Information Evaporation of Perfectly Reflecting Black Holes

We provide a statistical communication model for the phenomenon of quantum information evaporation from black holes. A black hole behaves as a reflecting quantum channel in a very special regime, which allows for a receiver to perfectly recover the absorbed quantum information. The quantum channel of a perfectly reflecting (PR) black hole is the probabilistically weighted sum of infinitely many...

متن کامل

Bistability in the Electric Current through a Quantum-Dot Capacitively Coupled to a Charge-Qubit

We investigate the electronic transport through a single-level quantum-dot which is capacitively coupled to a charge-qubit. By employing the method of nonequilibrium Green's functions, we calculate the electric current through quantum dot at finite bias voltages. The Green's functions and self-energies of the system are calculated perturbatively and self-consistently to the second order of inte...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

ar X iv : h ep - t h / 06 10 31 4 v 2 8 N ov 2 00 6 Strings , black holes , the tripartite entanglement of seven qubits and the Fano plane

Abstract Recently it has been observed that the group E7 can be used to describe a special type of quantum entanglement of seven qubits partitioned into seven tripartite systems. Here we show that this curious type of entanglement is entirely encoded into the discrete geometry of the Fano plane. We explicitly work out the details concerning a qubit interpretation of the E7 generators as represe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Physical review letters

دوره 115 26  شماره 

صفحات  -

تاریخ انتشار 2015