Sam Cree
YOU?
Author Swipe
View article: Macroscopic self-trapping in the dynamical tunneling of a Bose-Einstein condensate
Macroscopic self-trapping in the dynamical tunneling of a Bose-Einstein condensate Open
A Bose-Einstein condensate in a modulated, one-dimensional, anharmonic potential can exhibit dynamical tunneling between islands of regular motion in phase space. With increasingly repulsive atomic interactions, dynamical tunneling is pred…
View article: Macroscopic self-trapping in the dynamical tunneling of a Bose-Einstein condensate
Macroscopic self-trapping in the dynamical tunneling of a Bose-Einstein condensate Open
A Bose-Einstein condensate in a modulated, one-dimensional, anharmonic potential can exhibit dynamical tunneling between islands of regular motion in phase space. With increasingly repulsive atomic interactions, dynamical tunneling is pred…
View article: Code-routing: a new attack on position verification
Code-routing: a new attack on position verification Open
The cryptographic task of position verification attempts to verify one party's location in spacetime by exploiting constraints on quantum information and relativistic causality. A popular verification scheme known as -routing involves requ…
View article: Holography as a resource for non-local quantum computation
Holography as a resource for non-local quantum computation Open
If two parties share sufficient entanglement, they are able to implement any channel on a shared bipartite state via non-local quantum computation -- a protocol consisting of local operations and a single simultaneous round of quantum comm…
View article: Non-local computation of quantum circuits with small light cones
Non-local computation of quantum circuits with small light cones Open
The task of non-local quantum computation requires implementation of a unitary on $n$ qubits between two parties with only one round of communication, ideally with minimal pre-shared entanglement. We introduce a new protocol that makes use…
View article: Approximate Petz Recovery from the Geometry of Density Operators
Approximate Petz Recovery from the Geometry of Density Operators Open
View article: Geometric conditions for saturating the data processing inequality
Geometric conditions for saturating the data processing inequality Open
The data processing inequality (DPI) is a scalar inequality satisfied by distinguishability measures on density matrices. For some distinguishability measures, saturation of the scalar DPI implies an operator equation relating the argument…
View article: Code-routing: a new attack on position verification
Code-routing: a new attack on position verification Open
The cryptographic task of position verification attempts to verify one party's location in spacetime by exploiting constraints on quantum information and relativistic causality. A popular verification scheme known as $f$-routing involves r…
View article: Fault-Tolerant Logical Gates in Holographic Stabilizer Codes Are Severely Restricted
Fault-Tolerant Logical Gates in Holographic Stabilizer Codes Are Severely Restricted Open
We evaluate the usefulness of holographic stabilizer codes for fault-tolerant quantum computing by studying their allowed sets of fault-tolerantly implementable gates. We treat them as subsystem codes and show that the set of transversally…