Spyros Tserkis

Spyros Tserkis
Harvard University | Harvard · School of Engineering and Applied Sciences

PhD

About

21
Publications
1,376
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
107
Citations

Publications

Publications (21)
Preprint
A quantum process is called non-Markovian when memory effects take place during its evolution. Quantum non-Markovianity is a phenomenon typically associated with the information back-flow from the environment to the principal system, however it has been shown that such an effect is not necessary. In particular, maximum quantum non-Markovianity can...
Article
Quantum illumination is the task of determining the presence of an object in a noisy environment. We determine the optimal continuous-variable states for quantum illumination in the limit of zero object reflectivity. We prove that the optimal single-mode state is a coherent state, while the optimal two-mode state is the two-mode squeezed-vacuum sta...
Article
We quantify the maximum amount of entanglement of formation (EoF) that can be achieved by continuous-variable states under passive operations, which we refer to as the EoF potential. Focusing, in particular, on two-mode Gaussian states we derive analytical expressions for the EoF potential for specific classes of states. For more general states, we...
Article
Entanglement of formation is a fundamental measure that quantifies the entanglement of bipartite quantum states. This measure has recently been extended into multipartite states, taking the name α-entanglement of formation. In this work we follow an analogous multipartite extension for the Gaussian version of entanglement of formation, and focusing...
Preprint
Full-text available
Quantum illumination is the task of determining the presence of an object in a noisy environment. We determine the optimal continuous variable states for quantum illumination in the limit of zero object reflectivity. We prove that the optimal single mode state is a coherent state, while the optimal two mode state is the two-mode squeezed-vacuum sta...
Preprint
We introduce the concept of the entanglement potential as the maximum amount of entanglement that can be achieved by continuous-variable states under passive operations. Focusing, in particular, on two-mode Gaussian states and measuring the entanglement through entanglement of formation, we derive analytical expressions for the entanglement potenti...
Article
Controllable multipartite entanglement is a crucial element in quantum information processing. Here we present a scheme that generates switchable bipartite and genuine tripartite entanglement between microwave and optical photons via an optoelectromechanical interface, where microwave and optical cavities are coupled to a mechanical mode with contr...
Article
Full-text available
In Gaussian quantum key distribution eavesdropping attacks are conventionally modeled through the universal entangling cloner scheme, which is based on the premise that the whole environment is under control of the adversary, i.e., the eavesdropper purifies the system. This assumption implies that the eavesdropper has either access to an identity (...
Preprint
Full-text available
Controllable multipartite entanglement is a crucial element in quantum information processing. Here we present a scheme that generates switchable bipartite and genuine tripartite entanglement between microwave and optical photons via an optoelectromechanical interface, where microwave and optical cavities are coupled to a mechanical mode with contr...
Article
Full-text available
Upper bounds for private communication over quantum channels can be derived by adopting channel simulation, protocol stretching, and relative entropy of entanglement. All these ingredients have led to single-letter upper bounds to the secret-key capacity which can be directly computed over suitable resource states. For bosonic Gaussian channels, th...
Preprint
Full-text available
In Gaussian quantum key distribution eavesdropping attacks are conventionally modeled through the universal entangling cloner scheme, which is based on the premise that the whole environment is under control of the adversary, i.e., the eavesdropper purifies the system. This assumption implies that the eavesdropper has either access to an identity (...
Article
Entanglement of formation quantifies the entanglement of a state in terms of the entropy of entanglement of the least entangled pure state needed to prepare it. An analytical expression for this measure exists only for special cases, and finding a closed formula for an arbitrary state remains an open problem. In this work we focus on two-mode Gauss...
Article
Measures of entanglement can be employed for the analysis of numerous quantum information protocols. Due to computational convenience, logarithmic negativity is often the choice in the case of continuous-variable systems. In this work, we analyze a continuous-variable measurement-based entanglement distillation experiment using a collection of enta...
Preprint
Full-text available
Entanglement of formation quantifies the entanglement of a state in terms of the entropy of entanglement of the least entangled pure state needed to prepare it. An analytical expression for this measure exists only for special cases, and finding a closed formula for an arbitrary state still remains an open problem. In this work we focus on two-mode...
Preprint
Full-text available
Measures of entanglement can be employed for the analysis of numerous quantum information protocols. Due to computational convenience, logarithmic negativity is often the choice in the case of continuous variable systems. In this work, we analyse a continuous variable measurement-based entanglement distillation experiment using a collection of enta...
Article
Gaussian channels are the typical way to model the decoherence introduced by the environment in continuous-variable quantum states. It is known that those channels can be simulated by a teleportation protocol using as a resource state either a maximally entangled state passing through the same channel, i.e., the Choi state, or a state that is entan...
Preprint
Upper bounds for private communication over quantum channels can be computed by adopting channel simulation, protocol stretching, and relative entropy of entanglement. All these ingredients have led to single-letter upper bounds to the secret key capacity which are easily computed over suitable resource states. For bosonic Gaussian channels, the ti...
Article
Full-text available
We present a comparative study of several information and statistical complexity measures in order to examine a possible correlation with certain experimental properties of atomic structure. Comparisons are also carried out quantitatively using Pearson correlation coefficient. In particular, it is shown that Fisher information in momentum space is...
Article
We study the implications of quantum tunneling on information entropy measures (Shannon and Fisher), disequilibrium and LMC complexity in a Double Square Well Potential (DSWP), using the ammonia molecule as a test bed. We also apply a similar analysis to the Infinite Square Well Potential (ISWP) in order to compare the corresponding results with a...
Article
Full-text available
We present a comparative study of several information and statistical complexity measures in order to examine a possible correlation with certain experimental properties of atomic structure. Comparisons are also carryed out quantitatively using Pearson correlation coefficient. In particular, we show that Fisher information in momentum space is very...

Network

Cited By