Skip to main content

One-Qubit Manipulations

  • Chapter
  • First Online:
  • 3477 Accesses

Part of the book series: Lecture Notes in Physics ((LNP,volume 827))

Abstract

Numerous principles and methods of q-theory as well as q-information theory can already be demonstrated on a two-state q-system, i.e., on a single qubit. Entanglement can certainly not, we shall present it on composite systems in Chap. 7. The present chapter teaches the elements of q-state manipulation and various simple instances of the q-informatic approach.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The notations \(|{\uparrow}\!{s}\rangle,|{\downarrow}\!{s}\rangle\) mean \(|{\uparrow}\!\user2{n}\rangle,|\downarrow\!\user2{n}\rangle\), resp., where \(\user2{n}=\user2{s}/\vert\user2{s}\vert\).

  2. 2.

    Despite identical notations, one should not confuse \(|0\rangle, |{1}\rangle\) in this chapter with the computational basis in the rest of the volume.

  3. 3.

    This idea of Wiesner from cca. 1969 remained unpublished for many years until [3].

  4. 4.

    This is Bennett’s version BB92 [4] of the original four-state BB84 protocol [5] by Bennett and Brassard. For a review on q-cryptography, cf. Gisin et al. [6].

References

  1. Wootters, W.K., Zurek, W.K.: Nature 299, 802 (1982)

    Article  ADS  Google Scholar 

  2. Ivanovic, I.D.: Phys. Lett. A 123, 257 (1987)

    Article  MathSciNet  ADS  Google Scholar 

  3. Wiesner, S.: SIGACT News 15, 77 (1983)

    Article  Google Scholar 

  4. Bennett, C.H.: Phys. Rev. Lett. 68, 3121 (1992)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  5. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing, In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, IEEE Press, New York (1984)

    Google Scholar 

  6. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Rev. Mod. Phys. 74, 145 (2002)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lajos Diósi .

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Diósi, L. (2011). One-Qubit Manipulations. In: A Short Course in Quantum Information Theory. Lecture Notes in Physics, vol 827. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16117-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16117-9_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16116-2

  • Online ISBN: 978-3-642-16117-9

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics