Computational Distinguishability of Quantum Channels

Total Page:16

File Type:pdf, Size:1020Kb

Computational Distinguishability of Quantum Channels Computational Distinguishability of Quantum Channels by William Rosgen A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Computer Science Waterloo, Ontario, Canada, 2009 c William Rosgen 2009 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract The computational problem of distinguishing two quantum channels is central to quantum computing. It is a generalization of the well-known satisfiability problem from classical to quantum computation. This problem is shown to be surprisingly hard: it is complete for the class QIP of problems that have quantum interactive proof systems, which implies that it is hard for the class PSPACE of problems solvable by a classical computation in polynomial space. Several restrictions of distinguishability are also shown to be hard. It is no easier when restricted to quantum computations of logarithmic depth, to mixed-unitary channels, to degradable channels, or to antidegradable channels. These hardness results are demonstrated by finding reductions between these classes of quantum channels. These techniques have applications outside the distinguishability problem, as the construction for mixed-unitary channels is used to prove that the additivity problem for the classical capacity of quantum channels can be equivalently restricted to the mixed unitary channels. iii Acknowledgements I would like to thank my supervisor John Watrous for years of guidance, support, and insight. Without his help this would not have been possible. I would also like to thank the rest of my committee, Richard Cleve, Stephen Fenner, Achim Kempf, and Ben Reichardt, for providing helpful comments on an earlier draft of this thesis. I would also like to thank Lana for putting up with me during the writing of this thesis and supporting me throughout the process. v Contents List of Figures xii List of Symbols xiii 1 Introduction 1 1.1 Overview . .2 1.2 Quantum information . .6 1.3 Classes of quantum channels . 18 2 Quantum Computational Complexity 25 2.1 Quantum circuits . 26 2.2 Quantum complexity classes . 35 3 Measures for Quantum Information 41 3.1 Entropy . 42 3.2 Schatten p-norms . 45 3.3 The classical capacity of a quantum channel . 47 3.4 The trace norm . 53 3.5 The diamond norm . 57 3.6 Fidelity . 64 3.7 Polarization of the diamond norm . 69 3.8 Conclusion . 76 vii 4 The Close Images Problem 77 4.1 Log-depth mixed-state quantum circuits . 78 4.2 QIP completeness of close images . 79 4.3 The swap test . 83 4.4 Reduction to logarithmic depth . 87 4.5 Correctness of the reduction . 93 4.6 Conclusion . 98 5 Distinguishability of Quantum Computations 99 5.1 Overview of distinguishability problems . 100 5.2 Quantum circuit distinguishability . 102 5.3 QIP protocol . 104 5.4 Reduction from Close Images . 107 5.5 Correctness of the reduction . 110 5.6 Distinguishing log-depth computations . 115 5.7 Conclusion . 116 6 Degradable and Antidegradable Channels 117 6.1 Degradable and antidegradable channels . 118 6.2 Simulation by a degradable channel . 119 6.3 Distinguishing degradable channels . 121 6.4 Simulation by an antidegradable channel . 123 6.5 Distinguishing antidegradable channels . 126 6.6 Conclusion . 127 7 Mixed-Unitary Channels 129 7.1 Mixed-unitary channels . 130 7.2 Unital channels . 132 7.3 Mixed-unitary approximation . 134 7.4 Properties of the constructed channel . 142 viii 7.5 Multiplicativity of mixed-unitary transformations . 145 7.6 Mixed-unitaries and minimum output entropy . 147 7.7 Circuit constructions . 149 7.8 QIP-completeness of distinguishing mixed-unitary circuits . 156 7.9 Conclusion . 160 8 Conclusion 161 Bibliography 163 Index 177 ix List of Figures 1.1 Optimal strategy for channel distinguishability . .3 1.2 Reductions presented in the thesis . .4 2.1 An example quantum circuit . 27 2.2 Gates in the unitary circuit model . 29 2.3 Simulation of the swap gate with three controlled-not gates . 29 2.4 Controlled-U gate . 30 2.5 Non-unitary gates in the mixed state circuit model . 31 2.6 Simulations of three of the gates in the mixed-state circuit model . 31 2.7 Simulating a channel with a unitary circuit . 32 2.8 Log-depth implementation of controlled operation on n qubits . 34 2.9 Constant depth implementation of controlled operation on n qubits . 35 2.10 Known relationships between complexity classes . 36 2.11 A three message quantum interactive proof system . 38 3.1 Circuits output by the construction in Lemma 3.26 . 72 3.2 Circuits output by the construction in Lemma 3.28 . 74 4.1 Transformations in a quantum interactive proof system . 80 4.2 Reduction from QIP to Close Images ..................... 81 4.3 Constant-depth implementation of a swap gate . 84 4.4 Circuit implementation of the swap test . 84 4.5 Decomposition of a circuit into constant depth pieces . 88 xi 4.6 Testing procedure used in reduction to log-depth circuits . 89 4.7 Overview of the output spaces of the constructed log-depth circuits . 90 4.8 The output of the reduction to log-depth circuits . 91 5.1 Complexity classes and distinguishability problems . 101 5.2 Input circuits for the reduction . 108 5.3 Circuit to apply either input circuit based on a control qubit . 108 5.4 Circuits output by the reduction . 109 6.1 Reduction to a degradable channel . 120 6.2 Degrading channel for the channel in Figure 6.1 . 121 6.3 Reduction to an antidegradable channel . 124 6.4 Anti-degrading channel for the channel in Figure 6.3 . 125 7.1 Channel to be approximated by a mixed-unitary . 135 7.2 One stage of the circuit for the ancilla simulation procedure . 153 7.3 Circuit performing the ancilla simulation procedure . 154 7.4 The mixed-unitary circuit that simulates the original circuit . 154 xii List of Symbols 11˜ H completely mixed state on H, 11˜ H = 11H= dim H δij Kronecker delta function: δij = 1 if i = j and 0 otherwise F(ρ, σ) fidelity of states ρ and σ Fmax(Φ, Ψ) Maximum output fidelity of channels Φ and Ψ H, K,... finite dimensional Hilbert spaces isomorphism between Hilbert spaces log base-two logarithm k·k diamond norm k·kp Schatten p-norm k·ktr trace norm ν(·) Maximum output p-norm S(ρ) von Neumann entropy of the state ρ Smin(Φ) minimum output entropy of the channel Φ Classes of Operators D(H) density operators on H L(H, K) set of all linear operators from H to K T(H, K) set of all channels from L(H) to L(K) U(H) unitary operators on H U(H, K) isometries mapping H to K xiii Complexity Classes BQP quantum efficiently solvable problems EXP classicaly solvable problems in exponential time NP classicaly efficiently verifiable problems P classicaly efficiently solvable problems PSPACE classicaly solvable problems in polynomial space QIP quantum efficiently interactively verifiable problems QMA quantum efficiently verifiable problems Operators 11H identity operator on L(H, H) H Hadamard matrix IH identity transformation on L(H) trK Partial trace over the system in K W Swap operation: Wjaijbi = jbijai X Pauli X matrix Y Pauli Y matrix Z Pauli Z matrix Quantum Circuits j0i Introduction of ancillary qubits in j0i state Controlled-not gate t d t Controlled U gate U D Completely dephasing channel D(jiihjj) = δijjiihjj xiv H Hadamard gate 7 Measurement in the computational basis fj0i, j1ig N Completely depolarizing channel N(ρ) = 11=d Partial trace ? Two-qubit swap gate W Multi-qubit swap gate W(jaijbi) = jbijai X Pauli X gate Z Pauli Z gate Computational Problems CI Close Images Problem QCD Quantum Circuit Distinguishability problem xv Chapter 1 Introduction Distinguishing two quantum channels is one of the most important tasks in quantum information. This is the problem of determining if there is an input state on which the two channels to produce output states that are distinguishable. When this is phrased as a computational problem it is complete for the complexity class QIP of problems that have quantum interactive proof systems. This problem seems to be computationally much more difficult than other variants of the problem, such as distinguishing classical circuits or distinguishing unitary quantum circuits. In light of this hardness, it is natural to consider restricted versions of the problem. Many of these special cases are also hard: reductions can be found to some of the more interesting classes of quantum channels. These results suggest that this problem is not likely to be tractable even on many of the restricted channels that can be realized by experiment. This is, however, not a surprise: distinguishing two channels is a restricted version of quantum process tomography, which is computationally intractable for large systems. These reductions provide simulations of general quantum channels by channels in restricted classes. While these simulations do not accurately model all aspects of the original channel, the constructed simulations do share many properties with the original channel. Many of these results can be applied outside the narrow focus of distinguishing quantum channels: it is hoped that these techniques will prove useful for a number of problems in quantum information theory. Contents 1.1 Overview . .2 1.2 Quantum information . .6 1.2.1 Hilbert spaces . .7 1 1.2.2 Pure states . .9 1.2.3 Linear operators . 10 1.2.4 Mixed states .
Recommended publications
  • Pilot Quantum Error Correction for Global
    Pilot Quantum Error Correction for Global- Scale Quantum Communications Laszlo Gyongyosi*1,2, Member, IEEE, Sandor Imre1, Member, IEEE 1Quantum Technologies Laboratory, Department of Telecommunications Budapest University of Technology and Economics 2 Magyar tudosok krt, H-1111, Budapest, Hungary 2Information Systems Research Group, Mathematics and Natural Sciences Hungarian Academy of Sciences H-1518, Budapest, Hungary *[email protected] Real global-scale quantum communications and quantum key distribution systems cannot be implemented by the current fiber and free-space links. These links have high attenuation, low polarization-preserving capability or extreme sensitivity to the environment. A potential solution to the problem is the space-earth quantum channels. These channels have no absorption since the signal states are propagated in empty space, however a small fraction of these channels is in the atmosphere, which causes slight depolarizing effect. Furthermore, the relative motion of the ground station and the satellite causes a rotation in the polarization of the quantum states. In the current approaches to compensate for these types of polarization errors, high computational costs and extra physical apparatuses are required. Here we introduce a novel approach which breaks with the traditional views of currently developed quantum-error correction schemes. The proposed solution can be applied to fix the polarization errors which are critical in space-earth quantum communication systems. The channel coding scheme provides capacity-achieving communication over slightly depolarizing space-earth channels. I. Introduction Quantum error-correction schemes use different techniques to correct the various possible errors which occur in a quantum channel. In the first decade of the 21st century, many revolutionary properties of quantum channels were discovered [12-16], [19-22] however the efficient error- correction in quantum systems is still a challenge.
    [Show full text]
  • Analysis of Quantum Error-Correcting Codes: Symplectic Lattice Codes and Toric Codes
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Caltech Theses and Dissertations Analysis of quantum error-correcting codes: symplectic lattice codes and toric codes Thesis by James William Harrington Advisor John Preskill In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute of Technology Pasadena, California 2004 (Defended May 17, 2004) ii c 2004 James William Harrington All rights Reserved iii Acknowledgements I can do all things through Christ, who strengthens me. Phillipians 4:13 (NKJV) I wish to acknowledge first of all my parents, brothers, and grandmother for all of their love, prayers, and support. Thanks to my advisor, John Preskill, for his generous support of my graduate studies, for introducing me to the studies of quantum error correction, and for encouraging me to pursue challenging questions in this fascinating field. Over the years I have benefited greatly from stimulating discussions on the subject of quantum information with Anura Abeyesinge, Charlene Ahn, Dave Ba- con, Dave Beckman, Charlie Bennett, Sergey Bravyi, Carl Caves, Isaac Chenchiah, Keng-Hwee Chiam, Richard Cleve, John Cortese, Sumit Daftuar, Ivan Deutsch, Andrew Doherty, Jon Dowling, Bryan Eastin, Steven van Enk, Chris Fuchs, Sho- hini Ghose, Daniel Gottesman, Ted Harder, Patrick Hayden, Richard Hughes, Deborah Jackson, Alexei Kitaev, Greg Kuperberg, Andrew Landahl, Chris Lee, Debbie Leung, Carlos Mochon, Michael Nielsen, Smith Nielsen, Harold Ollivier, Tobias Osborne, Michael Postol, Philippe Pouliot, Marco Pravia, John Preskill, Eric Rains, Robert Raussendorf, Joe Renes, Deborah Santamore, Yaoyun Shi, Pe- ter Shor, Marcus Silva, Graeme Smith, Jennifer Sokol, Federico Spedalieri, Rene Stock, Francis Su, Jacob Taylor, Ben Toner, Guifre Vidal, and Mas Yamada.
    [Show full text]
  • QIP 2010 Tutorial and Scientific Programmes
    QIP 2010 15th – 22nd January, Zürich, Switzerland Tutorial and Scientific Programmes asymptotically large number of channel uses. Such “regularized” formulas tell us Friday, 15th January very little. The purpose of this talk is to give an overview of what we know about 10:00 – 17:10 Jiannis Pachos (Univ. Leeds) this need for regularization, when and why it happens, and what it means. I will Why should anyone care about computing with anyons? focus on the quantum capacity of a quantum channel, which is the case we understand best. This is a short course in topological quantum computation. The topics to be covered include: 1. Introduction to anyons and topological models. 15:00 – 16:55 Daniel Nagaj (Slovak Academy of Sciences) 2. Quantum Double Models. These are stabilizer codes, that can be described Local Hamiltonians in quantum computation very much like quantum error correcting codes. They include the toric code This talk is about two Hamiltonian Complexity questions. First, how hard is it to and various extensions. compute the ground state properties of quantum systems with local Hamiltonians? 3. The Jones polynomials, their relation to anyons and their approximation by Second, which spin systems with time-independent (and perhaps, translationally- quantum algorithms. invariant) local interactions could be used for universal computation? 4. Overview of current state of topological quantum computation and open Aiming at a participant without previous understanding of complexity theory, we will discuss two locally-constrained quantum problems: k-local Hamiltonian and questions. quantum k-SAT. Learning the techniques of Kitaev and others along the way, our first goal is the understanding of QMA-completeness of these problems.
    [Show full text]
  • Reliably Distinguishing States in Qutrit Channels Using One-Way LOCC
    Reliably distinguishing states in qutrit channels using one-way LOCC Christopher King Department of Mathematics, Northeastern University, Boston MA 02115 Daniel Matysiak College of Computer and Information Science, Northeastern University, Boston MA 02115 July 15, 2018 Abstract We present numerical evidence showing that any three-dimensional subspace of C3 ⊗ Cn has an orthonormal basis which can be reliably dis- tinguished using one-way LOCC, where a measurement is made first on the 3-dimensional part and the result used to select an optimal measure- ment on the n-dimensional part. This conjecture has implications for the LOCC-assisted capacity of certain quantum channels, where coordinated measurements are made on the system and environment. By measuring first in the environment, the conjecture would imply that the environment- arXiv:quant-ph/0510004v1 1 Oct 2005 assisted classical capacity of any rank three channel is at least log 3. Sim- ilarly by measuring first on the system side, the conjecture would imply that the environment-assisting classical capacity of any qutrit channel is log 3. We also show that one-way LOCC is not symmetric, by providing an example of a qutrit channel whose environment-assisted classical capacity is less than log 3. 1 1 Introduction and statement of results The noise in a quantum channel arises from its interaction with the environment. This viewpoint is expressed concisely in the Lindblad-Stinespring representation [6, 8]: Φ(|ψihψ|)= Tr U(|ψihψ|⊗|ǫihǫ|)U ∗ (1) E Here E is the state space of the environment, which is assumed to be initially prepared in a pure state |ǫi.
    [Show full text]
  • Potential Capacities of Quantum Channels 2
    WINTER AND YANG: POTENTIAL CAPACITIES OF QUANTUM CHANNELS 1 Potential Capacities of Quantum Channels Andreas Winter and Dong Yang Abstract—We introduce potential capacities of quantum chan- Entangled inputs between different quantum channels open the nels in an operational way and provide upper bounds for these door to all kinds of effects that are impossible in classical quantities, which quantify the ultimate limit of usefulness of a information theory. An extreme phenomenon is superactivation channel for a given task in the best possible context. Unfortunately, except for a few isolated cases, potential capac- [13]; there exist two quantum channels that cannot transmit ities seem to be as hard to compute as their “plain” analogues. quantum information when they are used individually, but can We thus study upper bounds on some potential capacities: For transmit at positive rate when they are used together. the classical capacity, we give an upper bound in terms of the The phenomenon of superactivation, and more broadly of entanglement of formation. To establish a bound for the quantum super-additivity, implies that the capacity of a quantum channel and private capacity, we first “lift” the channel to a Hadamard channel and then prove that the quantum and private capacity does not adequately characterize the channel, since the utility of a Hadamard channel is strongly additive, implying that for of the channel depends on what other contextual channels are these channels, potential and plain capacity are equal. Employing available. So it is natural to ask the following question: What these upper bounds we show that if a channel is noisy, however is the maximum possible capability of a channel to transmit close it is to the noiseless channel, then it cannot be activated information when it is used in combination with any other into the noiseless channel by any other contextual channel; this conclusion holds for all the three capacities.
    [Show full text]
  • Simulation of BB84 Quantum Key Distribution in Depolarizing Channel
    Proceedings of 14th Youth Conference on Communication Simulation of BB84 Quantum Key Distribution in depolarizing channel Hui Qiao, Xiao-yu Chen* College of Information and Electronic Engineering, Zhejiang Gongshang University, Hangzhou, 310018, China [email protected] Abstract: In this paper, we employ the standard BB84 protocol as the basic model of quantum key distribution (QKD) in depolarizing channel. We also give the methods to express the preparation and measurement of quantum states on classical computer and realize the simulation of quantum key distribution. The simulation results are consistent with the theoretical results. It was shown that the simulation of QKD with Matlab is feasible. It provides a new method to demonstrate the QKD protocol. QKD; simulation; depolarizing channel; data reconciliation; privacy amplification Keywords: [4] 1. Introduction 1989 . In 1993, Muller, Breguet, and Gisin demonstrated the feasibility of polarization-coding The purpose of quantum key distribution (QKD) [5] fiber-based QKD over 1.1km telecom fiber and and classical key distribution is consistent, their Townsend, Rarity, and Tapster demonstrated the difference are the realization methods. The classical key feasibility of phase-coding fiber-based QKD over 10km distribution is based on the mathematical theory of telecom fiber[6]. Up to now, the security transmission computational complexity, whereas the QKD based on [7] distance of QKD has been achieved over 120km . the fundamental principle of quantum mechanics. The At present, the study of QKD is limited to first QKD protocol is BB84 protocol, which was theoretical and experimental. The unconditionally secure proposed by Bennett and Brassard in 1984 [1].The protocol in theory needs further experimental verification.
    [Show full text]
  • Experimental Observation of Coherent-Information Superadditivity in a Dephrasure Channel
    Experimental observation of coherent-information superadditivity in a dephrasure channel 1, 2 1, 2 3, 1, 2 1, 2 1, 2 1, 2 Shang Yu, Yu Meng, Raj B. Patel, ∗ Yi-Tao Wang, Zhi-Jin Ke, Wei Liu, Zhi-Peng Li, 1, 2 1, 2 1, 2, 1, 2, 1, 2 Yuan-Ze Yang, Wen-Hao Zhang, Jian-Shun Tang, † Chuan-Feng Li, ‡ and Guang-Can Guo 1CAS Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei, 230026, China 2CAS Center For Excellence in Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, 230026, P.R. China 3Clarendon Laboratory, Department of Physics, Oxford University, Parks Road OX1 3PU Oxford, United Kingdom We present an experimental approach to construct a dephrasure channel, which contains both dephasing and erasure noises, and can be used as an efficient tool to study the superadditivity of coherent information. By using a three-fold dephrasure channel, the superadditivity of coherent information is observed, and a substantial gap is found between the zero single-letter coherent information and zero quantum capacity. Particularly, we find that when the coherent information of n channel uses is zero, in the case of larger number of channel uses, it will become positive. These phenomena exhibit a more obvious superadditivity of coherent information than previous works, and demonstrate a higher threshold for non-zero quantum capacity. Such novel channels built in our experiment also can provide a useful platform to study the non-additive properties of coherent information and quantum channel capacity. Introduction.—Channel capacity is at the heart of in- capacity [16, 17].
    [Show full text]
  • A Mathematical Elements
    A Mathematical elements The language of quantum mechanics is rooted in linear algebra and functional analysis. It often expands when the foundations of the theory are reassessed, which they periodically have been. As a result, additional mathematical struc- tures not ordinarily covered in physics textbooks, such as the logic of linear subspaces and Liouville space, have come to play a role in quantum mechan- ics. Information theory makes use of statistical quantities, some of which are covered in the main text, as well as discrete mathematics, which are also not included in standard treatments of quantum theory. Here, before describ- ing the fundamental mathematical structure of quantum mechanics, Hilbert space, some basic mathematics of binary arithmetic, finite fields and random variables is given. After a presentation of the basic elements of Hilbert space theory, the Dirac notation typically used in the literature of quantum informa- tion science, and operators and transformations related to it, some elements of quantum probability and quantum logic are also described. A.1 Boolean algebra and Galois fields n A Boolean algebra Bn is an algebraic structure given by the collection of 2 subsets of the set I = {1, 2,...,n} and three operations under which it is closed: the two binary operations of union (∨) and intersection (∧), and a unary operation, complementation (¬). In addition to there being comple- ments (and hence the null set ∅ being an element), the following axioms hold. (i) Commutativity: S ∨ T = T ∨ S and S ∧ T = T ∧ S; (ii) Associativity: S ∨(T ∨U)=(S ∨T )∨U and S ∧(T ∧U)=(S ∧T )∧U; (iii) Distributivity: S ∧ (T ∨ U)=(S ∧ T ) ∨ (S ∧ U)andS ∨ (T ∧ U)= (S ∨ T ) ∧ (S ∨ U); (iv) ¬∅ = I, ¬I = ∅,S∧¬S = ∅,S∨¬S = I, ¬(¬S)=S , for all its elements S, T, U.
    [Show full text]
  • Quantum Interactive Proofs and the Complexity of Separability Testing
    THEORY OF COMPUTING www.theoryofcomputing.org Quantum interactive proofs and the complexity of separability testing Gus Gutoski∗ Patrick Hayden† Kevin Milner‡ Mark M. Wilde§ October 1, 2014 Abstract: We identify a formal connection between physical problems related to the detection of separable (unentangled) quantum states and complexity classes in theoretical computer science. In particular, we show that to nearly every quantum interactive proof complexity class (including BQP, QMA, QMA(2), and QSZK), there corresponds a natural separability testing problem that is complete for that class. Of particular interest is the fact that the problem of determining whether an isometry can be made to produce a separable state is either QMA-complete or QMA(2)-complete, depending upon whether the distance between quantum states is measured by the one-way LOCC norm or the trace norm. We obtain strong hardness results by proving that for each n-qubit maximally entangled state there exists a fixed one-way LOCC measurement that distinguishes it from any separable state with error probability that decays exponentially in n. ∗Supported by Government of Canada through Industry Canada, the Province of Ontario through the Ministry of Research and Innovation, NSERC, DTO-ARO, CIFAR, and QuantumWorks. †Supported by Canada Research Chairs program, the Perimeter Institute, CIFAR, NSERC and ONR through grant N000140811249. The Perimeter Institute is supported by the Government of Canada through Industry Canada and by the arXiv:1308.5788v2 [quant-ph] 30 Sep 2014 Province of Ontario through the Ministry of Research and Innovation. ‡Supported by NSERC. §Supported by Centre de Recherches Mathematiques.´ ACM Classification: F.1.3 AMS Classification: 68Q10, 68Q15, 68Q17, 81P68 Key words and phrases: quantum entanglement, quantum complexity theory, quantum interactive proofs, quantum statistical zero knowledge, BQP, QMA, QSZK, QIP, separability testing Gus Gutoski, Patrick Hayden, Kevin Milner, and Mark M.
    [Show full text]
  • AQIS16 Preface Content
    The Theory of Statistical Comparison with Applications in Quantum Information Science……………………………………………………………………….….……...………..… Introduction to measurement-based quantum computation…………………………. Engineering the quantum: probing atoms with light and light with atoms in a transmon circuit QED system…………………………………………………………….……….3 The device-independent outlook on quantum physics……………………..…...……. Superconducting qubit systems: recent experimental progress towards fault-tolerant quantum computing at IBM……………………………………...… Observation of frequency-domain Hong-Ou-Mandel interference……. Realization of the contextuality-nonlocality tradeoff with a qubit-qutrit photon pair…………………………………………………………………………………….….... One-way and reference-frame independent EPR-steering………...… Are Incoherent Operations Physically Consistent? — A Physical Appraisal of Incoherent Operations and an Overview of Coherence Measures………............................. Relating the Resource Theories of Entanglement and Quantum Coherence An infinite dimensional Birkhoff’s Theorem and LOCC- convertibility………..… How local is the information in MPS/PEPS tensor networks……………......….. Information-theoretical analysis of topological entanglement entropy and multipartite correlations ……................................................................................................ Phase-like transitions in low-number quantum dots Bayesian magnetometry... Separation between quantum Lovász number and entanglement-assisted zero-error classical capacity ………..……..............................................................………...
    [Show full text]
  • The Private Classical Capacity of a Partially Degradable Quantum Channel
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Repository of the Academy's Library The Private Classical Capacity of a Partially Degradable Quantum Channel Laszlo Gyongyosi 1 Quantum Technologies Laboratory, Department of Telecommunications Budapest University of Technology and Economics 2 Magyar tudosok krt, Budapest, H-1117, Hungary 2 MTA-BME Information Systems Research Group Hungarian Academy of Sciences 7 Nador st., Budapest, H-1051, Hungary [email protected] Abstract For a partially degradable (PD) channel, the channel output state can be used to simulate the degraded environment state. The quantum capacity of a PD channel has been proven to be additive. Here, we show that the private classical capacity of arbitrary dimensional PD channels is equal to the quantum capacity of the channel and also single-letterizes. We prove that higher rates of private classical communication can be achieved over a PD channel in comparison to standard degradable channels. Keywords: private classical capacity, partial degradation, quantum Shannon theory. 1 Introduction The existence of partially degradable (PD) channels has been recently investigated, and it was shown that PD channels exist in the world of those qudit channels that have entanglement- binding complementary channels [1]. The PD channel set involves conjugate-PD channels, which represent a subset in the conjugate degradable channels; this set was introduced by Bradler et al. [11]. The sets of more capable and less noisy quantum channels were defined by Watanabe [2], and it was further demonstrated that other, well-characterized channel sets could be defined be- yond the degradable and conjugate-degradable channels.
    [Show full text]
  • An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model
    ARTICLE Received 12 Sep 2013 | Accepted 10 Feb 2014 | Published 12 Mar 2014 DOI: 10.1038/ncomms4418 An experimental implementation of oblivious transfer in the noisy storage model C. Erven1,2,N.Ng3, N. Gigov1, R. Laflamme1,4, S. Wehner3,5 & G. Weihs1,6 Cryptography’s importance in our everyday lives continues to grow in our increasingly digital world. Oblivious transfer has long been a fundamental and important cryptographic primitive, as it is known that general two-party cryptographic tasks can be built from this basic building block. Here we show the experimental implementation of a 1-2 random oblivious transfer protocol by performing measurements on polarization-entangled photon pairs in a modified entangled quantum key distribution system, followed by all of the necessary classical postprocessing including one-way error correction. We successfully exchange a 1,366 bit random oblivious transfer string in B3 min and include a full security analysis under the noisy storage model, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of using today’s quantum technologies to implement secure two-party protocols. 1 Institute for Quantum Computing and Department of Physics & Astronomy, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1. 2 Centre for Quantum Photonics, H. H. Wills Physics Laboratory & Department of Electrical and Electronic Engineering, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol BS8 1UB, UK. 3 Center for Quantum Technologies, National University of Singapore, 2 Science Drive 3, Singapore 117543. 4 Perimeter Institute, 31 Caroline Street North, Waterloo, Ontario, Canada N2L 2Y5. 5 School of Computing, National University of Singapore, 13 Computing Drive, Singapore 117417.
    [Show full text]