Pavel Sekatski

Pavel Sekatski
  • University of Innsbruck

About

144
Publications
7,592
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,940
Citations
Current institution
University of Innsbruck

Publications

Publications (144)
Preprint
Full-text available
Transmission loss represents a major obstacle for the demonstration of quantum Bell nonlocality over long distances and applications that rely on it, such as Device-Independent Quantum Key Distribution. In this work, we investigate the recently proposed concept of routed Bell experiments, in which one party can perform measurements either near or f...
Preprint
Full-text available
We discuss Bell nonlocality in quantum networks with unreliable sources. Our main result is a condition on the observed data which ensures that inconclusive events can be safely discarded, without introducing any loophole. More formally, we characterize the fair-sampling property for measurements in a network. When all measurements are fair-samplin...
Article
We consider the estimation of an unknown parameter θ through a quantum probe at thermal equilibrium. The probe is assumed to be in a Gibbs state according to its Hamiltonian H_{θ}, which is divided in a parameter-encoding term H_{θ}^{P} and an additional, parameter-independent control H^{C}. Given a fixed encoding, we find the maximal quantum Fishe...
Article
We discuss quantum network Bell nonlocality in a setting where the network structure is not fully known. More concretely, an honest user may trust their local network topology, but not the structure of the rest of the network, involving distant (and potentially dishonest) parties. We demonstrate that quantum network nonlocality can still be demonst...
Article
Full-text available
Photon loss represents a major challenge for the implementation of quantum communication protocols with untrusted devices, e.g. in the device-independent (DI) or semi-DI approaches. Determining critical loss thresholds is usually done in case-by-case studies. In the present work, we develop a general framework for characterizing the admissible leve...
Preprint
Full-text available
We consider the selective sensing of planar waves in the presence of noise. We present different methods to control the sensitivity of a quantum sensor network, which allow one to decouple it from arbitrarily selected waves while retaining sensitivity to the signal. Comparing these methods with classical (non-entangled) sensor networks we demonstra...
Preprint
We consider the estimation of an unknown parameter $\theta$ via a many-body probe. The probe is initially prepared in a product state and many-body interactions enhance its $\theta$-sensitivity during the dynamics and/or in the steady state. We present bounds on the Quantum Fisher Information, and corresponding optimal interacting Hamiltonians, for...
Article
Full-text available
We consider quantum computer architectures where interactions are mediated between hot qubits that are not in their mechanical ground state. Such situations occur, e.g., when not cooling ideally, or when moving ions or atoms around. We introduce quantum gates between logically encoded systems that consist of multiple physical ones and show how the...
Article
Full-text available
We report on a method to certify a unitary operation with the help of source and measurement apparatuses whose calibration throughout the certification process needs not be trusted. As in the device-independent paradigm our certification method relies on a Bell test and requires no assumption on the underlying Hilbert space dimension, but it remove...
Article
Full-text available
Using quantum systems as sensors or probes has been shown to greatly improve the precision of parameter estimation by exploiting unique quantum features such as entanglement. A major task in quantum sensing is to design the optimal protocol, i.e., the most precise one. It has been solved for some specific instances of the problem, but in general ev...
Preprint
Full-text available
We discuss quantum network Bell nonlocality in a setting where the network structure is not fully known. More concretely, an honest user may trust their local network topology, but not the structure of the rest of the network, involving distant (and potentially dishonest) parties. We demonstrate that quantum network nonlocality can still be demonst...
Article
Full-text available
Bell inequalities play a key role in certifying quantum properties for device-independent quantum information protocols. It is still a major challenge, however, to devise Bell inequalities tailored for an arbitrary given quantum state. Existing approaches based on sums of squares provide results in this direction, but they are restricted by the nec...
Article
It is well known that when two or more quantum measurements suffer from imperfections they may lose their incompatibility. For a quantum system of finite dimension d we study the incompatibility of all projective measurements subjected to white noise and loss. We derive a necessary and sufficient condition for this set of measurements to become com...
Article
Quantum memories represent one of the main ingredients of future quantum communication networks. Their certification is therefore a key challenge. Here we develop efficient certification methods for quantum memories. Considering a device-independent approach, where no a priori characterization of sources or measurement devices is required, we devel...
Article
This work explores the asymmetry of quantum steering in a setup using high-dimensional entanglement. We construct entangled states with the following properties: (i) one party (Bob) can never steer the state of the other party (Alice), considering the most general measurements, and (ii) Alice can strongly steer the state of Bob, in the sense of dem...
Article
Quantum nonlocality can be demonstrated without inputs (i.e., each party using a fixed measurement setting) in a network with independent sources. Here we consider this effect on ring networks, and show that the underlying quantum strategy can be partially characterized, or self-tested, from observed correlations. Applying these results to the tria...
Preprint
Full-text available
Bell inequalities play a key role in certifying quantum properties for device-independent quantum information protocols. It is still a major challenge, however, to devise Bell inequalities tailored for an arbitrary given quantum state. Existing approaches based on sums of squares provide results in this direction, but they are restricted by the nec...
Article
Full-text available
The network scenario offers interesting new perspectives on the phenomenon of quantum nonlocality. Notably, when considering networks with independent sources, it is possible to demonstrate quantum nonlocality without the need for measurement inputs, i.e., with all parties performing a fixed quantum measurement. Here we aim to find minimal examples...
Article
Device-independent quantum key distribution (DIQKD) reduces the vulnerability to side-channel attacks of standard quantum key distribution protocols by removing the need for characterized quantum devices. The higher security guarantees come, however, at the price of a challenging implementation. Here, we tackle the question of the conception of an...
Preprint
We consider the task of multiple parameter estimation in the presence of strong correlated noise with a network of distributed sensors. We study how to find and improve noise-insensitive strategies. We show that sequentially probing GHZ states is optimal up to a factor of at most 4. This allows us to connect the problem to single parameter estimati...
Article
The effect of quantum steering arises from the judicious combination of an entangled state with a set of incompatible measurements. Recently, it was shown that this form of quantum correlations can be quantified in terms of a dimension, leading to the notion of genuine high-dimensional steering. While this naturally connects to the dimensionality o...
Preprint
Full-text available
Quantum memories represent one of the main ingredients of future quantum communication networks. Their certification is therefore a key challenge. Here we develop efficient certification methods for quantum memories. Considering a device-independent approach, where no a priori characterisation of sources or measurement devices is required, we devel...
Preprint
Full-text available
We report on a method to certify a unitary operation with the help of source and measurement apparatuses whose calibration throughout the certification process needs not be trusted. As in the device-independent paradigm our certification method relies on a Bell test, but it removes the need for high detection efficiencies by including the single ad...
Preprint
This work explores the asymmetry of quantum steering in a setup using high-dimensional entanglement. We construct entangled states with the following properties: $(i)$ one party (Alice) can never steer the state of the other party (Bob), considering the most general measurements, and $(ii)$ Bob can strongly steer the state of Alice, demonstrating g...
Article
Full-text available
In a digital quantum simulator, basic two-qubit interactions are manipulated by means of fast local control operations to establish a desired target Hamiltonian. Here we consider a quantum simulator based on logical systems, i.e. where several physical qubits are used to represent a single logical two-level system to obtain enhanced and simple cont...
Article
We report on an elementary quantum network of two atomic ions separated by 230 m. The ions are trapped in different buildings and connected with 520(2) m of optical fiber. At each network node, the electronic state of an ion is entangled with the polarization state of a single cavity photon; subsequent to interference of the photons at a beam split...
Article
Full-text available
We consider a system of multiple qubits without any quantum control. We show that one can mediate entanglement between different subsystems in a controlled way by adding a (locally) controlled auxiliary system of the same size that couples via an always-on, distant dependent interaction to the system qubits. Solely by changing the internal state of...
Preprint
Full-text available
One-sided confidence intervals are presented for the average of non-identical Bernoulli parameters. These confidence intervals are expressed as analytical functions of the total number of Bernoulli games won, the number of rounds and the confidence level. Tightness of these bounds in the sense of Buehler, i.e. as the strictest possible monotonic in...
Article
Full-text available
The security of finite-length keys is essential for the implementation of device-independent quantum key distribution (DIQKD). Presently, there are several finite-size DIQKD security proofs, but they are mostly focused on standard DIQKD protocols and do not directly apply to the recent improved DIQKD protocols based on noisy preprocessing, random k...
Article
Full-text available
Here we argue that the probability that a given source produces exactly a single photon is a natural quantity to benchmark single-photon sources as it certifies the absence of multi-photon components and quantifies the efficiency simultaneously. Moreover, this probability can be bounded simply from an auto-correlation measurement — a balanced beam...
Article
Full-text available
What is the minimum time required to take a temperature? In this paper, we solve this question for a large class of processes where temperature is inferred by measuring a probe (the thermometer) weakly coupled to the sample of interest, so that the probe's evolution is well described by a quantum Markovian master equation. Considering the most gene...
Article
We investigate the compression of quantum information with respect to a given set M of high-dimensional measurements. This leads to a notion of simulability, where we demand that the statistics obtained from M and an arbitrary quantum state ρ are recovered exactly by first compressing ρ into a lower-dimensional space, followed by some quantum measu...
Article
Genuine multipartite entanglement represents the strongest type of entanglement, which is an essential resource for quantum information processing. Standard methods to detect genuine multipartite entanglement, e.g., entanglement witnesses, state tomography, or quantum state verification, require full knowledge of the Hilbert space dimension and pre...
Preprint
Quantum nonlocality can be demonstrated without inputs (i.e. each party using a fixed measurement setting) in a network with independent sources. Here we consider this effect on ring networks, and show that the underlying quantum strategy can be partially characterized, or self-tested, from observed correlations. Applying these results to the trian...
Preprint
We report on an elementary quantum network of two atomic ions separated by 230 m. The ions are trapped in different buildings and connected with 520(2) m of optical fiber. At each network node, the electronic state of an ion is entangled with the polarization state of a single cavity photon; subsequent to interference of the photons at a beamsplitt...
Article
Full-text available
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorization1 to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols such as the Bennett–Brassard scheme2 provide information-theoretic security against such attacks, a much stronger form of...
Preprint
Full-text available
The network scenario offers interesting new perspectives on the phenomenon of quantum nonlocality. Notably, when considering networks with independent sources, it is possible to demonstrate quantum nonlocality without the need for measurements inputs, i.e. with all parties performing a fixed quantum measurement. Here we aim to find minimal examples...
Preprint
In a digital quantum simulator, basic two-qubit interactions are manipulated by means of fast local control operations to establish a desired target Hamiltonian. Here we consider a quantum simulator based on logical systems, i.e. where several physical qubits are used to represent a single logical two-level system to obtain enhanced and simple cont...
Preprint
The effect of quantum steering arises from the judicious combination of an entangled state with a set of incompatible measurements. Recently, it was shown that this form of quantum correlations can be quantified in terms of a dimension, leading to the notion of genuine high-dimensional steering. While this naturally connects to the dimensionality o...
Preprint
We consider a system of multiple qubits without any quantum control. We show that one can mediate entanglement between different subsystems in a controlled way by adding a (locally) controlled auxiliary system of the same size that couples via an always-on, distant dependent interaction to the system qubits. Solely by changing the internal state of...
Article
Full-text available
We consider a receiver-device-independent (RDI) approach to quantum key distribution. Specifically, we discuss protocols for a prepare-and-measure scenario and present a detailed security analysis. The sender's (Alice's) device is partially characterized, in the sense that we assume bounds on the overlaps of the prepared quantum states. The receive...
Article
Full-text available
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, b...
Article
Full-text available
How can a multipartite single-photon path-entangled state be certified efficiently by means of local measurements? We address this question by constructing an entanglement witness based on local photon detections preceded by displacement operations to reveal genuine multipartite entanglement. Our witness is defined as a sum of three observables tha...
Preprint
Full-text available
We investigate the compression of quantum information with respect to a given set $\mathcal{M}$ of high-dimensional measurements. This leads to a notion of simulability, where we demand that the statistics obtained from $\mathcal{M}$ and an arbitrary quantum state $\rho$ are recovered exactly by first compressing $\rho$ into a lower dimensional spa...
Article
Full-text available
Device-independent certification, also known as self-testing, aims at guaranteeing the proper functioning of untrusted and uncharacterized devices. For example, the quality of an unknown source expected to produce two-qubit maximally entangled states can be evaluated in a bipartite scenario, each party using two binary measurements. The most robust...
Article
Full-text available
We consider the sensing of scalar valued fields with specific spatial dependence using a network of sensors, e.g. multiple atoms located at different positions within a trap. We show how to harness the spatial correlations to sense only a specific signal, and be insensitive to others at different positions or with unequal spatial dependence by cons...
Preprint
Full-text available
Here we argue that the probability that a given source produces exactly a single photon is a natural quantity to benchmark single-photon sources as it certifies the no production of multi-photon states and quantifies the efficiency simultaneously. Moreover, this probability can be bounded simply from an auto-correlation measurement -- a balanced be...
Preprint
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorisation to provide security against eavesdropping attacks. Remarkably, quantum key distribution protocols like the one proposed by Bennett and Brassard provide information-theoretic security against such attacks, a much stronger...
Preprint
Genuine multipartite entanglement represents the strongest type of entanglement, which is an essential resource for quantum information processing. Standard methods to detect genuine multipartite entanglement, e.g., entanglement witnesses, state tomography, or quantum state verification, require full knowledge of the Hilbert space dimension and pre...
Article
The efficient generation of high-fidelity entangled states is the key element for long-distance quantum communication, quantum computation, and other quantum technologies, and at the same time the most resource-consuming part in many schemes. We present a class of entanglement-assisted entanglement purification protocols that can generate high-fide...
Article
We consider entanglement purification protocols for multiple copies of qubit states. We use high-dimensional auxiliary entangled systems to learn about the number and positions of errors in the noisy ensemble in an explicit and controlled way, thereby reducing the amount of noise in the ensemble and purifying the remaining states. This allows us to...
Preprint
Full-text available
What is the minimum time required to take the temperature? In this paper, we solve this question for any process where temperature is inferred by measuring a probe (the thermometer) weakly coupled to the sample of interest, so that the probe's evolution is well described by a quantum Markovian master equation. Considering the most general control s...
Preprint
We consider the sensing of scalar valued fields with specific spatial dependence using a network of sensors, e.g. multiple atoms located at different positions within a trap. We show how to harness the spatial correlations to sense only a specific signal, and be insensitive to others at different positions or with unequal spatial dependence by cons...
Preprint
Full-text available
We investigate a class of partially device-independent quantum key distribution protocols based on a prepare-and-measure setup which simplifies their implementation. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, but no explicit bound on the Hilbert space dimension is required. The proto...
Article
Full-text available
Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, wh...
Preprint
Full-text available
How can a multipartite single-photon path-entangled state be certified efficiently by means of local measurements? We address this question by constructing an entanglement witness based on local photon detections preceded by displacement operations to reveal genuine multipartite entanglement. Our witness is defined as a sum of two observables that...
Article
Full-text available
Self-testing is a method to certify devices from the result of a Bell test. Although examples of noise tolerant self-testing are known, it is not clear how to deal efficiently with a finite number of experimental trials to certify the average quality of a device without assuming that it behaves identically at each run. As a result, existing self-te...
Preprint
Full-text available
The security of finite-length keys is essential for the implementation of device-independent quantum key distribution (DIQKD). Presently, there are several finite-size DIQKD security proofs, but they are mostly focused on standard DIQKD protocols and do not directly apply to the recent improved DIQKD protocols based on noisy preprocessing, random k...
Article
Trapped atomic ions embedded in optical cavities are a promising platform to enable long-distance quantum networks and their most far-reaching applications. Here we achieve and analyze photon indistinguishability in a telecom-converted ion-cavity system. First, two-photon interference of cavity photons at their ion-resonant wavelength is observed a...
Preprint
We consider entanglement purification protocols for multiple copies of qubit states. We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble in an explicit and controlled way, thereby reducing the amount of noise in the ensemble and purifying the remaining states. This allows us to des...
Preprint
The efficient generation of high-fidelity entangled states is the key element for long-distance quantum communication, quantum computation and other quantum technologies, and at the same time the most resource-consuming part in many schemes. We present a new class of entanglement-assisted entanglement purification protocols that can generate high-f...
Preprint
Device-independent certification, also known as self-testing, aims at guaranteeing the proper functioning of untrusted and uncharacterized devices. For example, the quality of an unknown source expected to produce two-qubit maximally entangled states can be evaluated in a bi-partite scenario, each party using two binary measurements. The most robus...
Article
Finding optical setups producing measurement results with a targeted probability distribution is hard, as a priori the number of possible experimental implementations grows exponentially with the number of modes and the number of devices. To tackle this complexity, we introduce a method combining reinforcement learning and simulated annealing enabl...
Article
We report the experimental realization of heralded distribution of single-photon path entanglement at telecommunication wavelengths in a repeater-like architecture. The entanglement is established upon detection of a single photon, originating from one of two spontaneous parametric down-conversion photon pair sources, after erasing the photon's whi...
Preprint
Full-text available
Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, wh...
Article
Full-text available
We consider non-local sensing of scalar signals with specific spatial dependence in the Bayesian regime. We design schemes that allow one to achieve optimal scaling and are immune to noise sources with a different spatial dependence than the signal. This is achieved by using a sensor array of spatially separated sensors and constructing a multi-dim...
Article
Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i....
Preprint
Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i....
Preprint
Full-text available
Finding optical setups producing measurement results with a targeted probability distribution is hard as a priori the number of possible experimental implementations grows exponentially with the number of modes and the number of devices. To tackle this complexity, we introduce a method combining reinforcement learning and simulated annealing enabli...
Preprint
We report the experimental realization of heralded distribution of single-photon path entanglement at telecommunication wavelengths in a repeater-like architecture. The entanglement is established upon detection of a single photon, originating from one of two spontaneous parametric down conversion photon pair sources, after erasing the photon's whi...
Article
Full-text available
We consider distributed sensing of nonlocal quantities. We introduce quantum enhanced protocols to directly measure any (scalar) field with a specific spatial dependence by placing sensors at appropriate positions and preparing a spatially distributed entangled quantum state. Our scheme has optimal Heisenberg scaling and filters out noise with diff...
Article
Full-text available
A quantum state can be characterized from the violation of a Bell inequality. The well-known CHSH inequality for example can be used to quantify the fidelity (up to local isometries) of the measured state with respect to the singlet state. In this work, we look for the minimum CHSH violation leading to a non-trivial fidelity. In particular, we prov...
Article
Full-text available
Among certification techniques, those based on the violation of Bell inequalities are appealing because they do not require assumptions on the underlying Hilbert space dimension and on the accuracy of calibration methods. Such device-independent techniques have been proposed to certify the quality of entangled states, unitary operations, projective...
Preprint
We consider non-local sensing of scalar signals with specific spatial dependence in the Bayesian regime. We design schemes that allow one to achieve optimal scaling and are immune to noise sources with a different spatial dependence than the signal. This is achieved by using a sensor array of spatially separated sensors and constructing a multi-dim...
Article
Full-text available
Device-independent certifications employ Bell tests to guarantee the proper functioning of an apparatus from the sole knowledge of observed measurement statistics, i.e. without assumptions on the internal functioning of the devices. When these Bell tests are implemented with devices having too low efficiency, one has to post-select the events that...
Preprint
Full-text available
Trapped atomic ions embedded in optical cavities are a promising platform to enable long-distance quantum networks and their most far-reaching applications. Here we achieve and analyze photon indistinguishability in a telecom-converted ion-cavity system. First, two-photon interference of cavity photons at their ion-resonant wavelength is observed a...
Preprint
Trapped atomic ions embedded in optical cavities are a promising platform to enable long-distance quantum networks and their most far-reaching applications. Here we achieve and analyze photon in-distinguishability in a telecom-converted ion-cavity system. First, two-photon interference of cavity photons at their ion-resonant wavelength is observed...
Preprint
Trapped atomic ions embedded in optical cavities are a promising platform to enable long-distance quantum networks and their most far-reaching applications. Here we achieve and analyze photon in-distinguishability in a telecom-converted ion-cavity system. First, two-photon interference of cavity photons at their ion-resonant wavelength is observed...
Article
Full-text available
The strong-coupling regime of cavity quantum electrodynamics (cavity QED) represents the light–matter interaction at the fully quantum level. Adding a single photon shifts the resonance frequencies, a profound nonlinearity. Cavity QED is a test bed of quantum optics and the basis of photon–photon and atom–atom entangling gates. At microwave frequen...
Preprint
Full-text available
A quantum state can be characterized from the violation of a Bell inequality. The well-known CHSH inequality for example can be used to quantify the fidelity (up to local isometries) of the measured state with respect to the singlet state. In this work, we look for the minimum CHSH violation leading to a non-trivial fidelity. In particular, we prov...
Preprint
Full-text available
Device-independent certifications employ Bell tests to guarantee the proper functioning of an apparatus from the sole knowledge of observed measurement statistics, i.e. without assumptions on the internal functioning of the devices. When these Bell tests are implemented with lossy devices, one has to post-select the events that lead to successful d...
Preprint
We consider distributed sensing of non-local quantities. We introduce quantum enhanced protocols to directly measure any (scalar) field with a specific spatial dependence by placing sensors at appropriate positions and preparing a spatially distributed entangled quantum state. Our scheme has optimal Heisenberg scaling and is completely unaffected b...
Article
We show that genuine multipartite entanglement of all multipartite pure states in arbitrary finite dimension can be detected in a device-independent way by employing bipartite Bell inequalities on states that are deterministically generated from the initial state via local operations. This leads to an efficient scheme for large classes of multipart...
Article
Full-text available
We study the effect of local decoherence on arbitrary quantum states. Adapting techniques developed in quantum metrology, we show that the action of generic local noise processes --though arbitrarily small-- always yields a state whose Quantum Fisher Information (QFI) with respect to local observables is linear in system size N , independent of the...
Article
Device-independent certification refers to the characterization of an apparatus without reference to the internal description of other devices. It is a trustworthy certification method, free of assumption on the underlying Hilbert space dimension and on calibration methods. We show how it can be used to quantify the quality of a Bell-state measurem...
Preprint
Full-text available
Device-independent characterization, also known as self-testing, provides a certification of devices from the result of a Bell test that is suitable for a wide range of applications. We here show that self-testing can be used in an elementary link of a quantum network to certify the successful distribution of a Bell state over 398 meters. Being bas...
Preprint
The strong-coupling regime of cavity-quantum-electrodynamics (cQED) represents light-matter interaction at the fully quantum level. Adding a single photon shifts the resonance frequencies, a profound nonlinearity. cQED is a test-bed of quantum optics and the basis of photon-photon and atom-atom entangling gates. At microwave frequencies, success in...
Preprint
Full-text available
Among certification techniques, those based on the violation of Bell inequalities are appealing because they do not require assumptions on the underlying Hilbert space dimension and on the accuracy of calibration methods. Such device-independent techniques have been proposed to certify the quality of entangled states, unitary operations, projective...
Preprint
We consider a bipartite scenario where two parties hold ensembles of $1/2$-spins which can only be measured collectively. We give numerical arguments supporting the conjecture that in this scenario no Bell inequality can be violated for arbitrary numbers of spins if only first order moment observables are available. We then give a recipe to achieve...
Preprint
We show that genuine multipartite entanglement of all multipartite pure states in arbitrary finite dimension can be detected in a device-independent way by employing bipartite Bell inequalities on states that are deterministically generated from the initial state via local operations. This leads to an efficient scheme for large classes of multipart...
Preprint
Device-independent certification refers to the characterization of an apparatus without reference to the internal description of other devices. It is a trustworthy certification method, free of assumption on the underlying Hilbert space dimension and on calibration methods. We show how it can be used to quantify the quality of a Bell state measurem...
Preprint
Full-text available
We study the effect of local decoherence on arbitrary quantum states. Adapting techniques developed in quantum metrology, we show that the action of generic local noise processes -though arbitrarily small- always yields a state whose Quantum Fisher Information (QFI) with respect to local observables is linear in system size N, independent of the in...
Article
The power of quantum computers relies on the capability of their components to maintain faithfully and process accurately quantum information. Since this property eludes classical certification methods, fundamentally new protocols are required to guarantee that elementary components are suitable for quantum computation. These protocols must be devi...
Preprint
The power of quantum computers relies on the capability of their components to maintain faithfully and process accurately quantum information. Since this property eludes classical certification methods, fundamentally new protocols are required to guarantee that elementary components are suitable for quantum computation. These protocols must be devi...
Article
Full-text available
Large-scale quantum effects have always played an important role in the foundations of quantum theory. With recent experimental progress and the aspiration for quantum enhanced applications, the interest in macroscopic quantum effects has been reinforced. In this review, we critically analyze and discuss measures aiming to quantify various aspects...
Preprint
Large-scale quantum effects have always played an important role in the foundations of quantum theory. With recent experimental progress and the aspiration for quantum enhanced applications, the interest in macroscopic quantum effects has been reinforced. In this review, we critically analyze and discuss measures aiming to quantify various aspects...

Network

Cited By