arXiv:quant-ph/0407061v2 9 Aug 2006 rjc EQudrcnrc o IST-2001-37559. supp no. acknowledges contract furthermore under he visi RESQ done; hos project a was the during work for Information, present the grateful Quantum for is th AW Institute acknowledges Foundation. Caltech’s PH Fairchild EIA-0086038. Sherman no. the grant under Foundation a.j.winter@br (email: Kingdom United 1UB, BS8 tol,Bristol U 91125, CA graeme@cal Pasadena, [email protected], 107–81, [email protected], Caltech Information, Quantum nteaon fcmuiainrqie.Rcl htevery reductio that a Recall into required. directly communication translates of shared amount be the to in entangle state partial even the that in finding effect, this at of advantage sender the from communication no with all. prepared st be entangled maximally can Indeed, states. non-entangled than oig ihyetnldsae r much superdense are about states observations to entangled basic failed highly consumption most however, the coding: the result, with of That along one randomness. rate, exploit (Bob shared ebit receiver some and a qubit of with state same asymptot- entangled the can qubit [2] at (Alice) two In sender a [3]. a share [2], that ically entanglement shown one of furthermore was bit transmitting it tw one physically consuming asymptotically, by and that, communicated qubit be result can the qubits with possible, becomes osmto foeei.I h edrkosteiett of of identity coding the and superdense knows sent, bit sender be quantum the to bits If one state classical the ebit. of one two transmission of of the consumption super- by communication perhaps information the is of [1], phenomenon The coding entanglement. this dense share of parties example two best-known the if enhanced quently th showed paper earlier case minimal an the a states, In a at communication. unentangled receiver quantum preparing a and of and entanglement sender of a cost between states entangled ypyial rnmtigonly transmitting physically by icto,rmt tt rprto,spres coding superdense preparation, state remote tification, nei stoqubits. capacit two identification is sour shared quantum ebit memoryless the any an a that by demonstration of produced a result: and superdense states use our optimal entangled the of the for of protocol achievability applications without the two of res be proof all present direct two-for-one to also case, earlier need We unentangled that randomness. that the the find qubits and al of we of states at number entangled, entangled communication the no are maximally in between prepared interpolating reduction be transmitted, a to is states there the When consuming 2 A H n Sakoldetespoto h SNtoa Scie National US the of support the acknowledge University GS Mathematics, and of PH, Institute Department AA, the the with with is are Winter Smith A. G. and Hayden P. Abeyesinghe, A. nti ae,w osrc aiyo rtcl httake that protocols of family a construct we paper, this In edrspwrt omnct iharcie sfre- is receiver a with communicate to power sender’s A Abstract ne Terms Index l qbtqatmsaecudb omnctdt receiver a to communicated be could state quantum -qubit pia uednecdn fetnldstates entangled of coding superdense Optimal epeetaoeso ehdfrpeaigpure preparing for method one-shot a present We — l bt fetnlmn n oesae randomness. shared some and entanglement of ebits ocnrto fmaue nageet iden- entanglement, measure, of concentration — .I I. nr bysnh,PtikHye,Gam mt,adAndre and Smith, Graeme Hayden, Patrick Abeyesinghe, Anura NTRODUCTION l + o ( l ) uisi diinto addition in qubits unu states quantum easier tech.edu) owihpr of part which to t is.ac.uk) iaiyo the of pitality r yteEC the by ort oprepare to upr of support e A(email: SA fBris- of coding ment for l also ates of y nce ult ce, for at o n a ) U iertasomtosfrom transformations linear ewe w states two between ilhv ibr pc localled also space Hilbert a have will iatt system bipartite ttd sae a epr rmxd h est operator density The mixed. or pure be | can “state” a stated, tt a endfie hudb assumed: be should the defined which on been subsystem has largest the state case which in subsystems, tt on state as paper. tw is Notation: ebit an of capacity Specifically qubits. identification thi [14]. quantum [13], protocol, the identification that the of show of theory the source application to memoryless another time a provides by V pro generated optimal Section states an preparing developing typi for of of task tocol application the easy to an techniques contains subspace IV protoc Section preparation III. state al remote Section optimality, associated its the prove of then that with and superd states for entangled protocol of universal coding the presenting by II, Section presen we protocol the exist. should that here evidence circumstantial pro techniques strong Harrow’s [12]. protocols o preparation re use pre-existing state made and [11] that communication setting classical memoryless coherent construction this alternative in triple inspirat Harrow’s protocols was An the optimal work [10]. present of wi memoryless the [9], combined points for a coding when rate from [8], trade-off in optimal quantum-classical drawn studied the states trade-off cbit-qubit-ebit all of generates preparation source the to it ic h numbers the Since mitting rtcl.Cmoigi ihtlpraingnrtsa op communication an state generates teleportation visible with timal noiseless, it the Composing protocols. of “father” the iatt uesaecnb rte nteform the in written be can state pure bipartite bt.W loso htteertsaeesnilyoptimal essentially are rates these that show also We ebits. n consuming and P h nylclivrat of invariants local only the uednecdn,w n hti stelretSchmidt least largest at fidelity the one-shot with of is s can, we specifically, case it Alice More role. the how that crucial a In find plays that state. coefficient we the coding, of superdense features nonlocal the n uesaeta a euto nBbssse fdimen- of system Bob’s on reduction has sion that state pure any ϕ ( ih h eto h ae ssrcue sflos ebgn in begin, We follows. as structured is paper the of rest The ntesii f[] hsnwpooo a evee as viewed be can protocol new this [5], of spirit the In i d ϕ ϕ √ ) If . d | eoe h ntr ru on group unitary the denotes λ S eoesaepreparation state remote log ftepr state pure the of i | 1 2 n aiu cmd coefficient Schmidt maximum and e ϕ A i log AB and i| euetefloigcnetostruhu the throughout conventions following the use We as f i d i sasaeon state a is exp S where , ϕ 1 2 + A A log oeie eoi usrpslabelling subscripts omit we Sometimes . 2 1 r lastknbase taken always are ⊗ ρ √ log d and λ S B h i − λ e | nw as known , o xml.Asse ecall we system A example. for , ϕ i max 2 1 | σ i e log j C ilfeunl ewitnsimply written be frequently will A sWinter as as i + | d ϕ = O ⊗ λ F AB oisl.W rt h fidelity the write We itself. to max h 6,[]pooo.Applying protocol. [7] [6], (log(1 B ( f ,σ ρ, i i erfrt h reduced the to refer we , C hyetrl determine entirely they , | + f cmd coefficients Schmidt A d j O 1 = ) and , i /κ ihadimension a with − (log(1 = 2 o log log ) κ k δ nesotherwise Unless . √ ij hr ihBob with share , √ ϕ B ρ ( λ and /κ = C √ max d σ o log log ) ϕ ) d λ k AB | S h e of set the i 1 2 ϕ ytrans- by ) ≥ AB n the and qubits nthe in vided 0 l in ol, mote are , i ense we , how ong d d [4]. ion cal S . A of th = A o s ) 1 f - - t . . 2
2 1 1 dB von Neumann entropy of a state ρ as S(ρ)= Tr ρ log ρ. where we may choose C = (8π ln 2)− , and β = . − ln 2 rdA It generalizes the following lemma for rank-one ϕ, which II. THE UNIVERSAL PROTOCOL was proved in [3]. To begin, suppose that Alice would like to share a maxi- mally entangled state with Bob. Clearly, this can be accom- Lemma II.2 Let ϕ be chosen according to the Haar mea- | i plished without any communication – Alice need only perform sure on A B. Then, if 3 dB dA, operations on her half of a fixed maximally entangled state ⊗ ≤ ≤ shared between them. In particular, if ψ is an arbitrary maxi- Pr S(ϕB) < log dB α β | i d − − mally entangled state and we denote by Φ = 1 i i α2C d √d i=1 (5) | i | i| i exp (dBdA 1) 2 , a fixed maximally entangled state, then ψ can be expressed ≤ − − (log dB) | i P as 2 1 1 dB where C = (8π ln 2)− as before and β = ln 2 d . ψ = Vψ IB Φd , (1) A ⊓⊔ | i ⊗ | i Proof (of Lemma II.1) If we let R be a space of dimension r where Vψ is a unitary transformation of Alice’s system which and τABR be a uniformly distributed state on A B R, then depends on ψ. This identity is equivalent to the following 1 | i ⊗ ⊗ Π is equal in distribution to U ϕU † , where Π circuit diagram, in which time runs from left to right: r τAB AB AB τAB is the projector onto the support of τAB. Let σ denote the r 1 I A unitary transformation − e(j+1 mod r) ej + ΠτAB that j=0 | ih | − Vψ implements a cyclic permutation on the eigenvectors ej of τ corresponding to non-zeroP eigenvalues. (There are{| r i}such Φd ψ AB | i B | i eigenvalues except on a set of measure zero, which we will (2) ignore.) We then have r 1 Of course, in general, we would like to prepare an arbitrary 1 1 − k k ΠτAB = σ τAB σ− . (6) state ψAB that may not be maximally entangled, and to do r r k=0 so by| usingi as few resources as possible. Our general method X is as follows. Alice and Bob initially share a fixed maximally Eq. (6), together with the concavity of entropy, implies r entangled state Φd , to which Alice applies an isometry Vψ. | B i 1 1 k k She then sends a subsystem of dimension to Bob, who S TrA ΠτAB S(TrA σ τAB σ− ), (7) A2 dA2 r ≥ r applies a fixed unitary † . Alice’s goal is to make as k=1 UA2B dA2 X small as possible while still reliably preparing ψAB . The which in turn gives procedure can again be summarized with a circuit| diagram,i Pr S(TrA UABϕU † ) < log dB α β although this time it is much less clear whether there exist AB − − choices of the operations Vψ and UA2B that will do the job: r 1 k k Pr S(TrA σ τABσ− ) < log dB α β A ≤ r − − 1 k ! X=1 Vψ k k r Pr S(TrA σ τABσ− ) < log dB α β A2 ≤ − − ψ = r Pr S(τ ) < log d α β , (8) B B ΦdB | i − − | i ❯ B where the final step is a result of the unitary invariance of UA† 2B (3) τABR. Applying Lemma II.2 to Eq. (8) with A AR and B B reveals that → Circuit (3) does provide a method for preparing the state → I ψ as long as UA2B ψ is maximally entangled across Pr S(TrA UABϕUAB† ) < log dB α β |thei A A B cut.⊗ (All such| statesi are related by an operation − − 1 2| α2C on Alice’s system alone.) We will now use this observa- (9) 12r exp rdB dA 2 . tion, together with the fact that high-dimensional states are ≤ − 4(log dB) generically highly entangled [15], [16], [17], [18], [19], [20], ⊓⊔ to construct a protocol that prepares an arbitrary state with The idea behind the protocol is then simple: we will show I high fidelity. The precise statement about the entanglement of that there exists a single unitary UA2B such that A1 ⊗ generic states that we will need is the following lemma. UA2B ψA1A2B is almost maximally entangled across the | i A A B cut for all states ψA1A2B satisfying a bound on 1 2| | i Lemma II.1 Let ϕ be a state on A B proportional to their Schmidt coefficients and whose support on A2 B ⊗ ⊗ a projector of rank r and let UAB U(dAdB) be chosen lies in a large subspace S A2 B. Since any such ∈ I ⊂ ⊗ according to the Haar measure. Then, if 3 dB dA, A1 UA2B ψA1A2B is almost maximally entangled, we can ≤ ≤ then⊗ find an|exactly maximallyi entangled state which closely Pr S(TrA UABϕU † ) < log dB α β AB − − approximates it. This state, in turn, can be prepared by the α2C method of Circuit (3). More formally, the following general 12r exp rdAdB , (4) ≤ − (log d )2 prescription can be made to succeed: B 3
Protocol: To send an arbitrary pure state with maximal have Schmidt coefficient √λmax and reduction of Bob’s system ≤ Pr inf S(TrA2 UA2BϕS UA† 2B) to dimension dS. ϕ ′ | A1S i < log dB α β δ η(γ) (12) 1) Alice and Bob share a maximally entangled state of − − − − 1 log dB = (log dS log λmax)+o(log dS) ebits on their γ 2 ′ † − A S Pr S(TrA2 UA2BϕS UA2B)