DOI: 10.14704/nq.2019.17.2.1938

Optimal and Approximate Analysis of an Information Network

Daegene Song


The subjectivity seen in quantum theory has been the topic of major debate ever since the theory was first introduced about a century ago. The idea of treating the subject and the object independently has been difficult to accept in the science community; however, the subjective limit of knowledge has been discussed in philosophy for centuries. On the other hand, one of the important outcomes of recent studies of quantum theory is developing useful and practical applications from often controversial and philosophical debates such as the simultaneous existence of multiple states or superluminal influencing, which appears to violate the locality imposed by relativity. Establishing a long-distance correlation may be effective in a number of applications in quantum information technology. In this paper, an entanglement swapping scheme for three 2-level states is examined using numerical methods. In particular, it is studied that there is a class of non-maximal states that approximate the optimal outcome, namely, the weakest link.


Numerical simulation, Entanglement, Network

Full Text:



Bell J. Speakable and unspeakable in quantum mechanics, Cambridge University press, 1971.

Bennett CH and Brassard G. Quantum cryptography: public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December, 1984; pp175-179.

Bose S, Vedral V, Knight PL. Multiparticle generalization of entanglement swapping. Phys Rev A 1998; 57: 822-829.

Boulant N, Edmonds K, Yang J, Pravia MA, and Cory DG. Experimental demonstration of an entanglement swapping operation and improved control in NMR quantum-information processing. Phys Rev A 2003; 68: 032305.

Descartes R. Principles of philosophy, 1644.

Deutsch D. Quantum theory, the Church-Turing principle and the universal quantum computer. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 1985; 400(1818):97-117.

Ekert AK. Quantum cryptography based on Bell's theorem. Phys Rev Lett 1991; 67: 661-663.

Hardy L. Method of areas for manipulating the entanglement properties of one copy of a two-particle pure entangled state. Phys Rev A 1999; 60: 1912-1923.

Hardy L and Song D. Entanglement swapping chains for general pure states. Phys Rev A 2000; 62: 052315.

Jonathan D and Plenio MB. Minimal conditions for local pure-state entanglement manipulation. Phys Rev Lett 1999; 83: 1455-1458.

Kaltenbaek R, Prevedel R, Aspelmeyer M and Zeilinger A. High-fidelity entanglement swapping with fully independent sources. Phys Rev A 2009; 79: 040302(R).

Kok P et al. Linear optical quantum computing with photonic qubits. Rev Mod Phys 2007; 79: 135-174.

Ladd TD et al. Quantum computers. Nature 2010; 464: 45-53

Nielsen MA and Chuang I. Quantum computation and quantum information, Cambridge University press, 2000.

Peres A. Quantum theory: concepts and methods, Kluwer, Dordrecht, 1997.

Shi B-S, Jiang Y-K and Guo G-C. Optimal entanglement purification via entanglement swapping. Phys Rev A 2000; 62: 054301.

Song D. Efficiency in Simulating Information Networks, submitted, 2018a.

Song D. Numerical Approach to Information Network Manipulation, submitted, 2018b.

Zukowski M, Zeilinger A, Horne MA and Ekert AK. ‘‘Event-ready-detectors’’ Bell experiment via entanglement swapping. Phys Rev Lett 1993; 71: 4287-4290.

Supporting Agencies

| NeuroScience + QuantumPhysics> NeuroQuantology :: Copyright 2001-2019