Abstract: Quantum cryptography1, 2, 3, 4, 5, 6, 7, 8 exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common ran...
Abstract: The photon creation and annihilation operators are cornerstones of the quantum description of the electromagnetic field. They signify the isomorphism of the optical Hilbert space to that of...
Abstract: A quantum code is a subspace of a Hilbert space of a physical system chosen to be correctable against a given class of errors, where information can be encoded. Ideally, the quantum code li...
Abstract: The most succinct manifestation of the second law of thermodynamics is the limitation imposed by the Landauer principle on the amount of heat a Maxwell demon (MD) can convert into free ener...
Abstract: Coherent state photon sources are widely used in quantum information processing. In many applications, a coherent state is functioned as a mixture of Fock states by assuming its phase is co...
Abstract: The uncertainty principle is at the very heart of quantum mechanics. Position, x, and momentum, p, are important physical observables to determine the mechanical properties of a system. In ...