Lucien Hardy
Perimeter Institute for Theoretical Physics
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Lucien Hardy.
Physical Review Letters | 1998
D. Boschi; S. Branca; F. De Martini; Lucien Hardy; Sandu Popescu
We report on a quantum optical experimental implementation of teleportation of unknown pure quantum states. This realizes all of the nonlocal aspects of the original scheme proposed by Bennett et al. and is equivalent to it up to a local operation. We exhibit results for the teleportation of a linearly polarized state and of an elliptically polarized state. We show that the experimental results cannot be explained in terms of a classical channel alone. The Bell measurement in our experiment can distinguish between all four Bell states simultaneously allowing, in the ideal case, a 100% success rate of teleportation. [S0031-9007(97)05275-7]
Physical Review Letters | 2005
Jonathan Barrett; Lucien Hardy; Adrian A. Kent
Standard quantum key distribution protocols are provably secure against eavesdropping attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mechanics were ever to fail in some regime, because a scientifically and technologically advanced eavesdropper could perhaps use postquantum physics to extract information from quantum communications without necessarily causing the quantum state disturbances on which existing security proofs rely. Here we describe a key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling. Its security stems from violation of a Bell inequality.
Physical Review Letters | 2000
Jonathan Walgate; Anthony J. Short; Lucien Hardy; Vlatko Vedral
We consider one copy of a quantum system prepared in one of two orthogonal pure states, entangled or otherwise, and distributed between any number of parties. We demonstrate that it is possible to identify which of these two states the system is in by means of local operations and classical communication alone. The protocol we outline is both completely reliable and completely general; it will correctly distinguish any two orthogonal states 100% of the time.
Journal of Physics A | 2007
Lucien Hardy
General relativity is a deterministic theory with non-fixed causal structure. Quantum theory is a probabilistic theory with fixed causal structure. In this paper, we build a framework for probabilistic theories with non-fixed causal structure. This combines the radical elements of general relativity and quantum theory. We adopt an operational methodology for the purposes of theory construction (though without committing to operationalism as a fundamental philosophy). The key idea in the construction is physical compression. A physical theory relates quantities. Thus, if we specify a sufficiently large set of quantities (this is the compressed set), we can calculate all the others. We apply three levels of physical compression. First, we apply it locally to quantities (actually probabilities) that might be measured in a particular region of spacetime. Then we consider composite regions. We find that there is a second level of physical compression for a composite region over and above the first level physical compression for the component regions. Each application of first and second level physical compression is quantified by a matrix. We find that these matrices themselves are related by the physical theory and can therefore be subject to compression. This is the third level of physical compression. The third level of physical compression gives rise to a new mathematical object which we call the causaloid. From the causaloid for a particular physical theory we can calculate everything the physical theory can calculate. This approach allows us to set up a framework for calculating probabilistic correlations in data without imposing a fixed causal structure (such as a background time). We show how to put quantum theory in this framework (thus providing a new formulation of this theory). We indicate how general relativity might be put into this framework and how the framework might be used to construct a theory of quantum gravity.
Physical Review Letters | 2004
Lucien Hardy; Adrian Kent
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. We describe an unconditionally secure cheat sensitive nonrelativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe a simple relativistic protocol.
Physical Review A | 2002
Jonathan Barrett; Daniel Geoffrey Collins; Lucien Hardy; Adrian Kent; Sandu Popescu
In the analysis of experiments designed to reveal violation of Bell-type inequalities, it is usually assumed that any hidden variables associated with the nth particle pair would be independent of measurement choices and outcomes for the first (n - 1) pairs. Models which violate this assumption exploit what we call the memory loophole. We focus on the strongest type of violation, which uses the two-sided memory loophole, in which the hidden variables for pair n can depend on the previous measurement choices and outcomes in both wings of the experiment. We show that the two-sided memory loophole allows a systematic violation of the Clauser-Horne-Shimony-Holt (CHSH) inequality when the data are analyzed in the standard way, but cannot produce a violation if a CHSH expression depending linearly on the data is used. In the first case, the maximal CHSH violation becomes small as the number of particle pairs tested becomes large. Hence, although in principle the memory loophole implies a slight flaw in the existing analyses of Bell experiments, the data still strongly confirm quantum mechanics against local hidden variables. We consider also a related loophole, the simultaneous measurement loophole, which applies if all measurements on each side are carried out simultaneously. We show that this can increase the probability of violating the linearized CHSH inequality as well as other Bell-type inequalities.
Physics Letters A | 1992
Lucien Hardy
Abstract By extending a Gedankenexperiment due to Elitzur and Vaidman and making some very natural assumptions, we demonstrate that empty waves can manifest their reality in quantum theory by changing the properties of a quantum system placed in the path of the empty wave. The natural assumptions are true in the de Broglie-Bohm model.
Physical Review A | 2000
Ernesto F. Galvao; Lucien Hardy
We discuss how quantum information distribution can improve the performance of some quantum computation tasks. This distribution can be naturally implemented with different types of quantum cloning procedures. We give two examples of tasks for which cloning provides some enhancement in performance, and briefly discuss possible extensions of the idea.
Philosophical Transactions of the Royal Society A | 2012
Lucien Hardy
In this paper, we provide what might be regarded as a manifestly covariant presentation of discrete quantum theory. A typical quantum experiment has a bunch of apparatuses placed so that quantum systems can pass between them. We regard each use of an apparatus, along with some given outcome on the apparatus (a certain detector click or a certain meter reading for example), as an operation. An operation (e.g. Bb2a3a1) can have zero or more quantum systems inputted into it and zero or more quantum systems outputted from it. The operation Bb2a3a1 has one system of type a inputted, and one system of type b and one system of type a outputted. We can wire together operations to form circuits, for example, . Each repeated integer label here denotes a wire connecting an output to an input of the same type. As each operation in a circuit has an outcome associated with it, a circuit represents a set of outcomes that can happen in a run of the experiment. In the operator tensor formulation of quantum theory, each operation corresponds to an operator tensor. For example, the operation Bb2a3a1 corresponds to the operator tensor . Further, the probability for a general circuit is given by replacing operations with corresponding operator tensors as in 1 Repeated integer labels indicate that we multiply in the associated subspace and then take the partial trace over that subspace. Operator tensors must be physical (namely, they must have positive input transpose and satisfy a certain normalization condition).
Foundations of Physics | 2012
Lucien Hardy; William K. Wootters
Quantum theory has the property of “local tomography”: the state of any composite system can be reconstructed from the statistics of measurements on the individual components. In this respect the holism of quantum theory is limited. We consider in this paper a class of theories more holistic than quantum theory in that they are constrained only by “bilocal tomography”: the state of any composite system is determined by the statistics of measurements on pairs of components. Under a few auxiliary assumptions, we derive certain general features of such theories. In particular, we show how the number of state parameters can depend on the number of perfectly distinguishable states. We also show that real-vector-space quantum theory, while not locally tomographic, is bilocally tomographic.