Letter


Nature Physics 3, 256 - 259 (2007)
Published online: 25 February 2007 | doi:10.1038/nphys549

Subject Categories: Quantum physics | Information theory and computation | Condensed-matter physics

Entanglement percolation in quantum networks

Antonio Acín1,2,4, J. Ignacio Cirac3,4 & Maciej Lewenstein1,2,4


Quantum networks are composed of nodes that can send and receive quantum states by exchanging photons1. Their goal is to facilitate quantum communication between any nodes, something that can be used to send secret messages in a secure way2, 3, and to communicate more efficiently than in classical networks4. These goals can be achieved, for instance, via teleportation5. Here we show that the design of efficient quantum-communication protocols in quantum networks involves intriguing quantum phenomena, depending both on the way the nodes are connected and on the entanglement between them. These phenomena can be used to design protocols that overcome the exponential decrease of signals with the number of nodes. We relate the problem of establishing maximally entangled states between nodes to classical percolation in statistical mechanics6, and demonstrate that phase transitions7 can be used to optimize the operation of quantum networks.


Quantum networks8, 9, 10, 11, 12, 13, 14, where different nodes are entangled, leading to quantum correlations that can be exploited by making local measurements at each node, will be the basis for the future of quantum communication. For instance, a set of quantum repeaters10 can be considered as a simple quantum network where the goal is to establish quantum communication over long distances. To optimize the operation of such a network, it is required to establish efficient protocols of measurements in such a way that the probability of success in obtaining maximally entangled states between different nodes is maximized. This probability may behave very differently as a function of the number of nodes if we use different protocols: in some cases it may decay exponentially, something that makes the repeaters useless, whereas for some protocols it may decay only polynomially, something that would make them very efficient.

A general network may be characterized by a quantum state, rho, shared by the different nodes. The goal is then, given two nodes A and B, to find the measurements to be made at the nodes, assisted with classical communication, such that A and B share a maximally entangled state, or singlet, with maximal probability. We call this probability the singlet conversion probability (SCP). This, or other related quantities such as the localizable entanglement15, 16, can be used as a figure of merit to characterize the state rho and therefore the performance of the quantum network. Here, we focus on the SCP because of its operational meaning. These quantities cannot be determined in general, given that they require the optimization over all possible measurements in the different nodes, which is a formidable task even for small networks.

In this work we concentrate on some particular quantum networks, which, despite their apparent simplicity, contain a very rich and intriguing behaviour. The simplification comes from two facts (see Fig. 1). First, the nodes are spatially distributed in a regular way according to some geometry. Second, each pair of nodes is connected by a pure state, Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com. Up to local change of bases, any of these states can be written as17

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

where lambdai are the (real) Schmidt coefficients such that lambda1greater than or equal tolambda2greater than or equal toctdotgreater than or equal tolambdadgreater than or equal to0. This configuration reminds us of the states underlying the so-called projected pair-entangled states18, and thus we call these networks pair-entangled pure networks. For these geometries, we first introduce a series of protocols that are closely related to classical percolation6, a concept that appears in statistical mechanics. We then determine the optimal protocols for several one-dimensional configurations, where some counterintuitive phenomena occur. We use these phenomena to introduce various protocols in more complex two-dimensional configurations.

Figure 1: Quantum networks.

Figure 1 : Quantum networks.

a, A general quantum-communication network consists of an arbitrary number of nodes in a given geometry sharing some quantum correlations, given by a global state rho. b, Here we consider a simplified network where the nodes are disposed according to a well-defined geometry, for example the two-dimensional square lattice shown here, where each pair of nodes is connected by the same pure state |phiright fence.

Full size image (41 KB)

We show that these new protocols provide a dramatic improvement over those based on classical percolation, in the sense that we can obtain perfect quantum communication even though the classical percolation protocols give rise to an exponential decay of the success probability with the number of nodes. In fact, we will argue that there exists an entanglement phase transition in the quantum networks, which may be exploited to obtain very efficient protocols. Thus, this work opens a new set of problems in quantum-information theory, which are related to statistical physics, but pose completely new challenges in these fields. As opposed to most of the recent work on entanglement theory, which has been devoted to using some of the tools developed so far in quantum-information theory to analyse problems in statistical mechanics18, 19, 20, 21, the present work takes a step in the converse direction.

Let us start by considering a natural measurement consisting of all the pairs of nodes locally transforming their states into singlets with optimal
probability pok. Recall that the SCP for a state (1) is known to be equal
to pok=min(1,2(1-lambda1)) (ref. 22). Then, a perfect quantum channel between the nodes is established with probability pok, otherwise no entanglement is left. This problem is equivalent to a standard bond-percolation situation6, where one distributes connections among the nodes of a lattice in a probabilistic way: with probability p an edge connecting a pair of nodes is established, otherwise the nodes are kept unconnected. We call this measurement strategy classical entanglement percolation (CEP). In bond percolation, for each lattice geometry there exists a percolation threshold probability, pth, such that an infinite connected cluster can be established if and only if p>pth (see also Table 1). The probability theta(p) that a given node belongs to an infinite cluster, or percolation probability, is strictly positive for p>pth, and zero otherwise (in the limit of an infinite number of nodes). Then, the probability that two given distant nodes can be connected by a path is distance independent and is given, correspondingly, by theta2(p) for p>pth; for pless than or equal topth this probability decays exponentially with the number of nodes, N, separating the two distant ones.


The threshold probabilities define a minimal amount of entanglement for the initial state such that CEP is possible. In the case of one-dimensional chains (see Fig. 2) percolation is possible if and only if p=1. Therefore, the SCP decays exponentially with N unless the states are more entangled than the singlet, in the sense that pok=1. In a square two-dimensional lattice, the entanglement threshold derived from percolation arguments (see Table 1) is pok=2(1-lambda1)=1/2.

Figure 2: Quantum repeaters in the one-dimensional chain.

Figure 2 : Quantum repeaters in the one-dimensional chain.

The upper diagram shows the simplest one-repeater configuration, which is generalized below. The first step of the optimal strategy for the one-repeater configuration and qubits, where Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com, consists of entanglement swapping at the repeater. The resulting states between nodes A and B are Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com with probability (lambda12+lambda22)/2 and Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com with probability lambda1lambda2. Collecting all these terms, the average SCP between A and B is equal to 2(lambda1lambda2+lambda22)=2lambda2=p ok, which is known to be optimal.

Full size image (21 KB)

The CEP strategy already shows that the distribution of entanglement through quantum networks defines a critical phenomenon. For instance, for two-dimensional lattices and qubits, there exists a continuous interval for lambda2 such that the probability of having an infinitely connected entangled path is unity, whereas for product states, that is when lambda2=0, this probability is zero. Because there is no analytic function fulfilling these requirements, the probability of infinite distance entanglement must be non-analytic, indicating a sharp transition.

Now, it is natural to wonder whether CEP is optimal for any geometry and number of nodes, and if not to see whether, at least, it predicts the correct decay of entanglement in the asymptotic limit. Next, we show that, for one-dimensional chains, although CEP is not optimal for some finite N, it gives the right asymptotic behaviour. Moving to two-dimensional networks, we prove that CEP is not optimal even in the asymptotic case. Thus, the problem of entanglement distribution through quantum networks defines a new type of critical phenomenon, with new threshold values, which we call entanglement percolation.

The scenario of a one-dimensional chain configuration (see Fig. 2) consists of two end nodes connected by several repeaters10. As said, all the bonds are equal to |phiright fence. We start out with the case of qubits, d=2. A surprising result already appears in the first non-trivial situation consisting of one repeater. An upper bound to the SCP in the one-repeater scenario is obtained by putting nodes A and R1 together, which implies that the SCP cannot be larger than pok. This bound can indeed be achieved by means of a rather simple protocol involving entanglement swapping23 at the repeater. However, if CEP is applied, the obtained SCP is simply (pok)2. This proves that CEP is not optimal already for the one-repeater configuration. We find it rather counter-intuitive that the intermediate repeater does not decrease the optimal SCP. This behaviour, however, does not survive in the asymptotic limit. In this limit the so-called concurrence24, another measure of entanglement, decreases exponentially with the number of repeaters, unless the connecting states are maximally entangled (see the Methods section). The exponential decay of the SCP automatically follows.

Most of these results can be generalized to higher-dimensional systems, d>2. For the one-repeater configuration, the SCP is again equal to pok. It suffices to map the initial state into a two-qubit state, without changing the SCP, and then apply the previous protocol. Moving to the asymptotic limit, an exponential decay of the SCP with N can be proven in the scenario where the measurement strategies involve only one-way communication. First, a measurement is made at the first repeater. The result is communicated to the second repeater, where a second measurement is applied. The results of the two measurements are communicated to the third, and so on until the last repeater, where the final measurement depends on all the previous results.

Putting all these results together, a unified picture emerges for the distribution of entanglement in one-dimensional chains: despite some remarkable effects for finite N, the SCP decreases exponentially with the number of repeaters whenever the connecting bonds have less entanglement than a singlet. The CEP strategy fails for some finite configurations, but predicts the correct behaviour in the asymptotic limit.

The situation becomes much richer for two-dimensional geometries. First, we consider finite two-dimensional lattices. The non-optimality of CEP can be shown already for the simplest 2times2 square lattice and qubits. Consider the two non-neighbouring sites in the main diagonal of the square. The SCP obtained by CEP is 1-(1-(pok)2)2. By concatenating the optimal measurement strategy for the one-repeater configuration, the SCP is 1-(1-pok)2. However none of these strategies exploits the richness of the two-dimensional configuration. Indeed, we can design strategies such that a singlet can be established with unit probability whenever |phiright fence satisfies 1/2less than or equal tolambda1less than or equal to0.6498. Thus, there are two-dimensional network geometries where, although the connections are not maximally entangled, the entanglement is still sufficient to establish a perfect quantum channel.

Let us now see whether the thresholds defined by standard percolation theory are optimal for asymptotically large networks. In the next lines, we construct an example that goes beyond the classical percolation picture, proving that the CEP strategy is not optimal. The key ingredient for this construction is the measurement derived above for the one-repeater configuration, which gave rise to an SCP equal to pok. Our example considers a honeycomb lattice where each node is connected by two copies of the same two-qubit state Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com (see Fig. 3a). If, as above, the Schmidt coefficients of the two-qubit state are lambda1greater than or equal tolambda2, the SCP of Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com is given by pok=2(1-lambda12). We choose this conversion probability smaller than the percolation threshold for the honeycomb lattice, which gives

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

Therefore, CEP is useless. Now, half of the nodes carry out the optimal strategy for the one-repeater configuration, mapping the honeycomb lattice into a triangular lattice, as shown in Fig. 3. The SCP for the new bonds is exactly the same as for the state |phi2right fence, that is 2lambda2. This probability is larger than the percolation threshold for the triangular lattice, because

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

The nodes can now apply CEP to the new lattice and succeed. Thus, this strategy, which combines entanglement swapping and CEP, allows us to establish a perfect quantum channel in a network where CEP fails.

Figure 3: Example of a quantum network where entanglement percolation and CEP are not equivalent.

Figure 3 : Example of a quantum network where entanglement percolation and CEP are not equivalent.

Each node is connected by a state consisting of two copies of the same two-qubit state, Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com. The nodes marked in a make the optimal measurement for the one-repeater configuration on pairs of qubits belonging to different connections, as shown in the inset. A triangular lattice is then obtained, where the SCP for each connection is the same as for the two-qubit state Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com. The remaining nodes carry out CEP on the new lattice.

Full size image (84 KB)

Two comments are relevant at this point. First, although the previous strategy uses classical percolation concepts, this is not necessarily the case for the optimal (unknown) strategy, which may exploit different techniques. Second, our results do not exclude the possibility that for two-dimensional lattices the critical amount of entanglement is zero. The bound for the entanglement phase transition would then be somewhat trivial, but the implications from a quantum-communication viewpoint would be very relevant: any amount of entanglement between the nodes would be sufficient for entanglement percolation.

We have shown that the distribution of entanglement through quantum networks defines a framework where statistical methods and concepts, such as classical percolation theory and beyond, naturally apply. It leads to a novel type of critical phenomenon, an entanglement phase transition that we call entanglement percolation. The corresponding critical parameter is the minimal amount of entanglement necessary to establish a perfect distant quantum channel with significant (non-exponentially decaying) probability. Further understanding of optimal entanglement-percolation strategies is necessary for the future development and prosperity of quantum networks.

Top

Methods

One-dimensional chains

We start by showing that the concurrence decays exponentially with the number of nodes in a one-dimensional chain of qubits when the connecting states are not maximally entangled. Recall that, given a two-qubit pure state Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com, its concurrence reads C(phi)=2|det(T)|, where T is the 2times2 matrix such that (T)ij=tij.

When considering the repeater configuration, the maximization of the averaged concurrence turns out to be equal to

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

Here M briefly denotes the choice of measurements, whereas phik represent the 2times2 diagonal matrices given by the Schmidt coefficients of the states |phikright fence. Mrk are also 2times2 matrices, corresponding to the pure state |rkright fence associated with the measurement result rk of the kth repeater, that is Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com. Note that the computational bases i and j in the previous expressions are the Schmidt bases for the states |phikright fence and |phik+1right fence entering the repeater k. Using the fact that det(AB)=det(A)det(B), the previous maximization gives25

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

Note that 2|det(phik)|=1 if and only if |phikright fence is maximally entangled, which proves the announced result.

Most of the results derived in the qubit case can be generalized to arbitrary dimension. Let us first consider the one-repeater configuration. Given a state |phikright fence, see equation (1), it is always possible to transform this state in a deterministic way into a two-qubit state of Schmidt coefficients (lambda1,1-lambda1) by local operations and classical communication. This follows from the application of majorization theory to the study of local operations and classical communication transformations between entangled states26. Note that the SCP for the two states is the same, pok=min(1,2(1-lambda1)).

In the case of arbitrary N, an exponential decay for the qubit concurrence can be shown for protocols with one-way communication. Given an arbitrary chain, we consider the almost identical chain where the first state is replaced by a two-qubit entangled state. It is relatively easy to prove that the SCP decays exponentially in the first chain if and only if it does it in the second one. We start with the simplest one-repeater configuration. The quantity to be optimized reads

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

where, as above, phi1 (phi2) is the 2times2 (dtimesd) matrix corresponding to |phi1right fence (|phi2right fence), whereas Mr is a 2timesd matrix associated with the measurement outcome r at the repeater. Thus, we recognize in the r.h.s. of equation (2) the optimal average concurrence we can obtain out of |phi2right fence by measurements on one particle that correspond to operators of rank 2. We denote this quantity by Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com, the Schmidt coefficients corresponding to |phi2right fence by lambda1greater than or equal tolambda2greater than or equal toctdotgreater than or equal tolambdad and its SCP by pok, as above. For the outcome r, which occurs with probability pr, mu1rgreater than or equal tomu2r denotes the Schmidt coefficients corresponding to the resulting two-qubit state |phirright fence. With this notation, we have

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

where

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

and the last inequality follows from the majorization criterion26. The optimal value is obtained for x=pok/2, which is achieved when p1=1 and saturates the two previous inequalities. Thus, we obtain the equality

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

Note that Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com, with equality if and only if pok=1. Note also, and this is important for what follows, that the optimal strategy depends only on |phi2right fence, and not on the first two-qubit state, |phi1right fence.

This strategy can be generalized to the case of N repeaters when the measurements proceed from left to right. We show this generalization for the case N=2; the case of arbitrary N will immediately follow. Consider the measurement step in the second repeater. After receiving the information about the measurement result in the first repeater, r1, R2 has to measure its particles. For each value of r1, and because A is a qubit, A and R2 share a two-qubit pure state, |phir1right fence. Therefore, for each measurement result, R2 is back at the previous one-repeater situation. The optimal measurement strategy in this case was independent of the entanglement of the first two-qubit state. Thus, up to local unitary transformations, the measurement to be applied in the second repeater is independent of r1, and

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

where pkok is defined as above for the state |phikright fence. It is straightforward that this reasoning generalizes to an arbitrary number of repeaters, so

Unfortunately we are unable to provide accessible alternative text for this. If you require assistance to access this image, or to obtain a text description, please contact npg@nature.com

Therefore, the average concurrence decreases exponentially with the number of repeaters unless the connecting pure states have pok=1. A non-exponential decay of the SCP when pok<1 would contradict this result.

Top

Acknowledgements

We thank F. Verstraete, J. Wehr and M. M. Wolf for discussion. We acknowledge support from Deutsche Forschungsgemeinschaft, EU IP Programmes 'SCALA' and 'QAP', European Science Foundation PESC QUDEDIS, MEC (Spanish Government) under contracts FIS 2005-04627, FIS 2004-05639, 'Ramón y Cajal' and Consolider QOIT.

Competing interests statement:

The authors declare that they have no competing financial interests.

Received 19 October 2006; Accepted 21 December 2006; Published online 25 February 2007.

Top

References

  1. Cirac, J. I., Zoller, P., Kimble, H. J. & Mabuchi, H. Quantum state transfer and entanglement distribution among distant nodes in a quantum network. Phys. Rev. Lett. 78, 3221–3224 (1997). | Article | ISI | ChemPort |
  2. Bennett, C. H. & Brassard, G. in Proc. Int. Conf. on Computer Systems and Signal Processing, Bangalore175–179 (IEEE, New York, 1984).
  3. Ekert, A. K. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett. 67, 661–664 (1991). | Article | PubMed | ISI |
  4. Buhrman, H., Cleve, R., Watrous, J. & de Wolf, R. Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001). | Article | PubMed | ChemPort |
  5. Bennett, C. H. et al. Teleporting an unknown quantum state via dual classical and Einstein–Podolski–Rosen channels. Phys. Rev. Lett. 70, 1895–1898 (1993). | Article | PubMed | ISI |
  6. Grimmett, G. Percolation (Springer, Berlin, 1999).
  7. Sachdev, S. Quantum Phase Transitions (Cambridge Univ. Press, Cambridge, 1999).
  8. Knill, E., Laflamme, R. & Milburn, G. J. A scheme for efficient quantum computation with linear optics. Nature 409, 46–52 (2001). | Article | PubMed | ISI | ChemPort |
  9. Duan, L. M., Lukin, M. D., Cirac, J. I. & Zoller, P. Long-distance quantum communication with atomic ensembles and linear optics. Nature 414, 413–418 (2001). | Article | PubMed | ISI | ChemPort |
  10. Briegel, H. J., Dür, W., Cirac, J. I. & Zoller, P. Quantum repeaters: The role of imperfect local operations in quantum communication. Phys. Rev. Lett. 81, 5932–5935 (1998). | Article | ISI | ChemPort |
  11. Chanelière, T. et al. Storage and retrieval of single photons transmitted between remote quantum memories. Nature 438, 833–836 (2005). | Article | PubMed | ChemPort |
  12. Tanzilli, S. et al. A photonic quantum information interface. Nature 437, 116–120 (2005). | Article | PubMed | ChemPort |
  13. Törmä, P. Transitions in quantum networks. Phys. Rev. Lett. 81, 2185–2189 (1998). | Article |
  14. Leung, D., Oppenheim, J. & Winter, A. Quantum network communication—the butterfly and beyond. Preprint at <http://arxiv.org/abs/quant-ph/0608223> (2006).
  15. Verstraete, F., Popp, M. & Cirac, J. I. Entanglement versus correlations in spin systems. Phys. Rev. Lett. 92, 027901 (2004). | Article | PubMed | ChemPort |
  16. Popp, M., Verstraete, F., Martín-Delgado, M. A. & Cirac, J. I. Localizable entanglement. Phys. Rev. A 71, 042306 (2005). | Article | ChemPort |
  17. Nielsen, M. A. & Chuang, I. L. Quantum Computation and Quantum Information (Cambridge Univ. Press, Cambridge, 2000).
  18. Verstraete, F. & Cirac, J. I. Renormalization algorithms for quantum-many body systems in two and higher dimensions. Preprint at <http://arxiv.org/abs/cond-mat/0407066> (2004).
  19. Osterloh, A., Amico, L., Falci, G. & Fazio, R. Scaling of entanglement close to a quantum phase transition. Nature 416, 608–610 (2002). | Article | PubMed | ISI | ChemPort |
  20. Osborne, T. J. & Nielsen, M. A. Entanglement in a simple quantum phase transition. Phys. Rev. A 66, 032110 (2002). | Article | ChemPort |
  21. Vidal, G., Latorre, J. I., Rico, E. & Kitaev, A. Entanglement in quantum critical phenomena. Phys. Rev. Lett. 90, 227902 (2003). | Article | PubMed | ChemPort |
  22. Vidal, G. Entanglement of pure states for a single copy. Phys. Rev. Lett. 83, 1046–1049 (1999). | Article | ChemPort |
  23. Z dotukowski, M., Zeilinger, A., Horne, M. A. & Ekert, A. K. Event-ready detectors Bell experiment via entanglement swapping. Phys. Rev. Lett. 71, 4287–4290 (1993). | Article | PubMed | ISI |
  24. Wootters, W. K. Entanglement of formation of an arbitrary state of two qubits. Phys. Rev. Lett. 80, 2245–2248 (1998). | Article | ISI | ChemPort |
  25. Verstraete, F., Martín-Delgado, M. A. & Cirac, J. I. Diverging entanglement length in gapped quantum spin systems. Phys. Rev. Lett. 92, 087201 (2004). | Article | PubMed | ChemPort |
  26. Nielsen, M. A. Conditions for a class of entanglement transformations. Phys. Rev. Lett. 83, 436–439 (1999). | Article | ChemPort |
  1. ICFO-Institut de Ciencies Fotoniques, E-08860, Castelldefels, Spain
  2. ICREA-Institució Catalana de Recerca i Estudis Avançats, E-08010, Barcelona, Spain
  3. Max-Planck Institut für Quantenoptik, D-85748, Garching, Germany
  4. These authors contributed equally to this work

Correspondence to: J. Ignacio Cirac3,4 e-mail: Ignacio.Cirac@mpq.mpg.de

MORE ARTICLES LIKE THIS

These links to content published by NPG are automatically generated.

REVIEWS

Quantum computers

Nature Review (04 Mar 2010)

See all 5 matches for Reviews

NEWS AND VIEWS

Quantum mechanics Dynamics of entanglement

Nature Physics News and Views (01 Feb 2008)

Quantum mechanics Entangled families

Nature News and Views (11 Sep 2008)

See all 9 matches for News And Views