arxiv: v2 [quant-ph] 13 Dec 2012

Size: px
Start display at page:

Download "arxiv: v2 [quant-ph] 13 Dec 2012"

Transcription

1 Generalized teleportation and entanglement recycling arxiv:09.683v [quant-ph] 3 Dec 0 Sergii Strelchu,, Michał Horodeci, and Jonathan Oppenheim 3 Department of pplied Mathematics and Theoretical Physics, University of Cambridge, Cambridge CB3 0W, U.K. Institute for Theoretical Physics and strophysics, University of Gdańs, Gdańs, Poland 3 Department of pplied Mathematics and Theoretical Physics, University of Cambridge, Cambridge CB3 0W, U.K. University College of London, Department of Physics & stronomy, London, WCE 6BT and London Interdisciplinary etwor for Quantum Science We introduce new teleportation protocols which are generalizations of the original teleportation protocols that use the Pauli group [] and the port-based teleportation protocols, introduced by Hiroshima and Ishizaa [], that use the symmetric permutation group. We derive sufficient condition for a set of operations, which in general need not form a group, to give rise to a teleportation protocol and provide examples of such schemes. This generalization leads to protocols with novel properties and is needed to push forward new schemes of computation based on them. Port-based teleportation protocols and our generalizations use a large resource state consisting of singlets to teleport only a single qubit state reliably. We provide two distinct protocols which recycle the resource state to teleport multiple states with error linearly increasing with their number. The first protocol consists of sequentially teleporting qubit states, and the second teleports them in a bul. Teleportation lies at the very heart of quantum information theory, being the pivotal primitive in a variety of tass. Teleportation protocols are a way of sending an unnown quantum state from one party to another using a resource in the form of an entangled state shared between two parties, lice and Bob, in advance. First, lice performs a measurement on the state she wants to teleport and her part of the resource state, then she communicates the classical information to Bob. He applies the unitary operation conditioned on that information to obtain the teleported state. notable use of teleportation is in relation to computing, where it plays a ey role enabling universal quantum computation and establishing a strong lin between a particular teleportation protocol and a ind of computation possible to be implemented using it [3]. Recently, Hiroshima and Ishizaa introduced portbased teleportation [] which has the distinct property that Bob does not need to apply a correction after lice s measurement. It is an important primitive for programmable quantum processors [, 5 7], which rely on an efficient way of storing a unitary transformation and acting it on an arbitrary quantum state. This protocol evades the fundamental limitations of the no-go theorem proved in [7], which states that universal deterministic programmable quantum processors cannot exist. Even though the protocol maes it possible to execute arbitrary instructions deterministically, the result will be inherently noisy. Port-based teleportation has already found its use in instantaneous non-local quantum computation [8]. In the latter tas, using it as the underlying teleportation routine dramatically reduced the amount of entanglement required to perform it. Such computations proved to be instrumental in attac schemes on position-based quantum cryptography [9 ]. Currently, it is nown that the minimum amount of entanglement an adversary needs to perform a successful attac on the scheme must be at least linear in the number of communicated qubits []. lso, an adversary having access to at most an exponential amount of entanglement can successfully brea any position-based cryptography scheme [8]. However, we do not now how much entanglement is necessary to brea all schemes of this ind. ny improvement of the underlying teleportation protocol will invariably lead to the decrease of amount of entanglement required to brea them, and potentially render such attacs more feasible. Port-based teleportation wors as follows: at the beginning of the protocol lice and Bob share a resource state, which consists of singlets Ψ B 0 0, termed ports. lice performs a measurement in the form of POVM on the joint system, that includes the state she wants to teleport and her resource state. She obtains the measurement outcome i from to and communicates it to Bob, who traces out all the port subsystems except for i-th one, discarding the remaining entanglement. The i-th port now contains the teleported state. lthough conceptually appealing, port-based teleportation relies on the properties of the symmetric permutation group, which limits its scope. In particular, it restricts the use of such teleportation protocols to implement gates specific to the underlying group. In the case of ordinary teleportation these gates correspond to Clifford-type computation [3]. nother drawbac of port-based teleportation is that it requires an enormous amount of entanglement in the resource state to teleport a single quantum state with high fidelity. This maes it extremely ill-suited for practical purposes. Decreas-

2 ing the amount of entanglement required to teleport a sequence of quantum states will result in more efficient storage of the program encoded in unitary transformation as well as maing efficient instantaneous non-local quantum computation, and tass that depend on it. In this Letter we address the two issues above. First, we find sufficient condition for the generalized teleportation protocols, which is needed to push forward new schemes of computation based on them. Second, we introduce a recycling scheme, which drastically reduces the amount of entanglement used in port-based teleportation, and therefore allows for efficient attacs on position based cryptography. To tacle the first problem, we find sufficient condition that lice s operations have to satisfy in order to mae them amenable to be used in more general teleportation protocols and provide examples. From a grouptheoretic perspective all currently nown teleportation protocols can be classified into two inds: those that exploit the Pauli group [] and those, which use the symmetric permutation group []. Such a simple change of the underlying group structure leads to two protocols with striing differences in the properties: the former protocol uses a finite resource state to teleport the state perfectly, but the receiver must mae the correction to obtain the state, whereas the latter protocol require an infinitely big resource state to teleport the state perfectly, while not needing a correction on the receiver s side. The former teleportation scheme was used in the celebrated result of Gottesman and Chuang [3] to perform universal Clifford-based computation using teleportation over the Pauli group. The generalized teleportation protocol introduced in this Letter embraces both nown protocols, and paves the way for protocols which lead to programmable processors capable of executing new inds of computation beyond Clifford-type operations. The operations in the generalized teleportation protocol need not form a group. lso, because teleportation is nown to be intimately connected to the variety of other fundamental tass in quantum information processing [3], its generalized version brings the potential for protocols with new properties, which depend on its implementation. To address the second problem we introduce two distinct protocols, which recycle the entanglement available in the resource state. Using a single resource state comprised of ports, they teleport any number of systems which is sublinear in with an error that linearly increases with the number of teleported states. The first protocol amounts to sequentially teleporting qubit states, recycling the original resource state. This can be viewed as the application of the original port-based teleportation with the resource state, followed by a resource recycling step. The resource degrades with every teleported state. In the second protocol lice teleports her states in one go, performing the POVM, which randomly assigns each of the teleported states to one of the ports. The latter protocol, rather remarably, provides the same finite case and asymptotic performance as the former: both of the protocols operate with an error, which is linear in the number of systems teleported. similar idea about recycling the entangled state was used in the context of a remote state preparation protocol [4]. The ability to recycle entanglement in such protocols has an immediate effect on the entanglement consumption of the instantaneous computation and position-based cryptography: an adversary may conduct an attac on any position-based cryptography scheme using a linear amount of entanglement in the number of communicated qubits for the case when communicating parties are constrained to product measurements. Generalized Teleportation. Until now, grouptheoretic aspects of the teleportation protocols were largely overlooed. Currently, there are two distinct groups, which undergird different teleportation protocols. The first one is the Pauli group, which appeared in the first teleportation protocol of Bennett et al. []. nother one, the symmetric permutation groups was implicitly used in the port-based teleportation protocol of [, 6]. Therefore, we recast the description of the portbased teleportation protocol to elicit its connection with S, and provide the basis for generalized teleportation protocols. This port-based teleportation protocol [] can be equivalently viewed as such where lice applies a measurement, which corresponds to the action of some element g from some set G on her total state. In the next step, lice sends the description of g to Bob who then applies the unitary transformation U g conditioned on g to his overall state, to reach some predefined terminating state. We say that the teleportation protocol P successfully terminates when Bob obtains the state σ B φ B0, where φ B0 is the teleported state, and σ B is the state of the remaining ports. In the case of port-based teleportation U g acts as a swap operation between the port where the state was teleported and the first port. ow we consider the generalized form of the teleportation protocol where all the operations on lice are members of some set G, G K, which in general need not form a group. The protocol that is able to teleport an unnown quantum state reliably under lice s operations which belong to the set G is denoted asp G. Recall that the tas of teleportation is in correspondence with the problem of signal discrimination for qudits [8]: the probability p s G of successfully discriminating a set of signals {η g } g G, where η g U g Tr B...B \B g Ψ in Ψ in B U g after lice applied her operation is related to the fidelity of teleportation protocols in the qudit case as FP

3 3 K d p s G. In the generalized protocol, parties start with the resource state Ψ in B i Ψ i B i, and perform the following steps:. lice applies Π g B φ0 Ψ in B θ0 B, where Π g η g η g, g G.. lice communicates the identity of the element g to Bob. 3. Bob applies U g to his subsystems. The following Lemma presents the sufficient condition which lice s operations must satisfy in order to induce the reliable teleportation scheme: Lemma. Define η avg K g G η g. For all G, the protocol P G reaches terminal state Ω B such that Ω B σ B φ B0 ǫ with ǫ 0 in the limit if Tr [ ] η avg, ǫd+ where d denotes the dimension of each of the subsystem. The proof of Lemma is located in Section of the Supplemental Material. particular example of the unitaries, which possess the property required by Lemma is any -design [5] {U g U g } g G based on some group G. nother example of the set {U g } g G that induces {η g } g G is the set of random unitaries introduced in [4], and it is easy to construct plenty of others. particular example of the set {U g } g G that induces{η g } g G is the set of random unitaries introduced in [4], and it is easy to construct plenty of others. Recycling of the resource state. We now introduce two schemes that recycle entanglement in the resource state. Our first protocol consists of sequentially teleporting a sequence of qubits using a pre-shared resource state, which is made of singlets. One can view it as the multiple application of the port-based teleportation protocol introduced in [], where instead of getting rid of the resource state in the end of the protocol, the parties eep it. For the programmable processor, this corresponds to executing instructions using a simple queue. To ensure that the protocol is indeed capable of teleporting multiple states while recycling the original resource state, it suffices to show that the latter does not degrade much. We do so by finding that the upper bound on the amount of distortion the resource state incurs after the next teleportation round is small, or, equivalently, we find that the fidelity of the resource state with the maximally entangled state does not change much with recycling. More formally, consider lice and Bob who start with the initial state ρ port i Ψ i B i. We will henceforth refer to each i B i as a port, with the subsystems i, B i being held by lice and Bob respectively. In addition, they hold a state ρ 0 R 0 Ψ 0 R 0 Ψ 0 R 0, and lice wants to teleport the state of subsystem 0 to Bob with R 0 serving as a reference system which neither party has access to. The total state resource state together with the state to be teleported they share at the beginning of the protocol is Ψ in Ψ 0 R 0 ρ port. We define the recycling protocolp rec to be the following sequence of actions:. lice performs a measurement Π i with i Π i 0..., getting an outcome z... Port z now contains the teleported state.. lice communicates z to Bob. 3. Bob applies a SWP operator to ports z and. 4. lice and Bob mar port and do not use it in the next rounds of teleportation. 5. lice and Bob repeat steps -4 using unmared ports. s in the original deterministic teleportation protocol from [], in step lice performs a measurement POVM on 0... with elements Π i ρ σ i ρ, where ρ i σi, and σ i P 0 i 0 i ; P 0 i is the projector onto Ψ 0 i. We will further adopt the notation i... \ i. To determine the success of the subsequent rounds of teleportation we compare the state of all of the ports Ψ i out after lice measures Π i with the special reference state Ψ i id Ψ 0 Ψ i R 0 B i j,j i Ψ j B, which corresponds to j the idealized situation when the successful teleportation is carried out without any disturbance to the remaining ports. To show that after the first three steps ofp rec the state of the remaining ports is sufficiently good to be recycled in further teleportation rounds, it is enough to demonstrate that the output state ρ i out Ψi out Ψi out has high average fidelity with Ψ i id Ψi id Ψi id : FP rec p i F ρ i out, Ψ i id, 3 i where the superscripts in ρ i out, Ψi id denote the corresponding states after the teleported state goes to port i, and the last term denotes the probability that the teleportation fails. Our first result is that the protocol P rec does not degrade the total resource state by much: Theorem. fter the steps -4 of P rec : FP rec 4 + O. 4

4 4 The proof of the Theorem is located in Section of the Supplemental Material. We will further omit the quadratic terms in the bounds. Once we have established that it is possible to recycle the resource state, it is important to understand how the error accumulates after each round of teleportation. When the number of ports and rounds is relevant we denote it together with the protocol as P rec,. It turns out that lice and Bob can guarantee that the error is at most additive in the number of rounds: Lemma. fter teleporting qubits the resulting fidelity is lower bounded as: FP rec,. 5 The proof of Lemma is located in Section of the Supplemental Materials. Simultaneous teleportation. We now present the second protocol, which recycles the entanglement in the resource state much differently to that of the first one. Consider lice, wishing to teleport qubits simultaneously to Bob. Parties share the resource state ρ port i Ψ i B i, and lice wants to teleport the systems The protocol for simultaneous teleportation is similar to steps -3 of P rec, with the following changes. Instead of POVM elements, there are!! of them, each corresponding to the possible ports that the teleported states could appear in. fter the measurement, instead of a single port number lice reveals the identity of ports where the states went to. We denote the protocol that uses ports and teleports qubits simultaneously as P sim,. Theorem shows that this protocol can indeed teleport > states at once efficiently. From the Theorem it follows that the resource state degrades proportionally to the number of qubits teleported. Theorem. The fidelity of simultaneous teleportation of qubits using steps -5 of the port-based teleportation protocol above is FP sim, 4. 6 The proof of the Theorem is located in the Section 3 of the Supplemental Material. One can see that in the limit the teleportation scheme wors with perfect fidelity when the number of systems that lice can teleport is sublinear in. Parallel repetition of port-based protocol. In addition to the two protocols above, we introduce the protocol, which maes it possible for concurrent teleportation of the states from lice to Bob which does not require recycling of the original state. It does so by means of partitioning the resource state into smaller parts and running the original port-based teleportation [] on each of the parts independently. More precisely, the protocol, denoted as Ppar, consists of teleporting qubits by running port-based teleportation protocol times in parallel each utilizing ports each time to teleport a single qubit. We will see that this protocol is substantially worse than the previous two. Performance of the port-based protocols. Let us now bring togetherp rec,,p sim, andppar, in order to compare their performance in the tas of teleporting states when the resource state consists of ports. To show how they stac up against each other we introduce a common measure of the performance of the protocols in the following definitions: Definition: the port-based teleportation protocol P, q is said to be reliable if it requires ports singlets to teleport a sequence q q of qubits with fidelity of teleportation satisfying lim FP, q. 7 Definition: we say that the reliable protocol P, q is efficient if it can teleport Q P arg max q P, q. One can establish a partial order on the set of efficient protocols: the protocol P, q is more efficient than B P, q denoted as, q B, q if there exist sequences Q, Q B such that 0 0 : Q Q B. The Lower bounds. The achievable fidelity of the total teleportation of Ppar is FPpar Therefore, the lower bound for the performance of the protocol is: Q P o. 9 par From Lemma it follows that by using P rec we can teleport at least a sublinear number of qubits in the number of ports reliably, thus: Q Prec g, 0 where g o. Lastly, for P sim, using the result of Theorem we get: Q Psim g, where g o. Even though P rec, and P sim, are the protocols with completely dissimilar modes of operation, and being, strictly speaing, incomparable, they achieve the same asymptotic figure of merit teleporting a sublinear number of systems. While both protocols achieve perfect fidelity of teleportation in the limit, one cannot be reduced to another, as

5 5 they use the resource state for teleportation in an entirely different way. In the former protocol lice applies a POVM that induces a permutation, which assigns the teleported state to one of the ports and communicates its identity to Bob via the classical channel. In the latter one, she applies a single large permutation that assigns each of the teleported qubits to some unique port, followed by a single round of classical communication. The action of the permutation in P sim, cannot always be simulated by the repeated application of the permutation and classical communication from P rec,, because permutations do not commute in general. Upper bound. The way we approached the calculation of the fidelity of teleportation in all of the protocols enabled us to find lower bounds for each of the protocols, but it gave no insight as to whether they are optimal. In what follows, we present a simple protocol-independent upper bound based on no-signalling principle. Observation 3. For any port-based teleportation protocol P, we have Q P. To justify this bound, consider a generalized portbased teleportation protocol where at the beginning lice randomly pics one of two states to teleport: Ψ 0 0 or Ψ. She performs a measurement prescribed by the protocol and is yet to communicate its outcome to Bob. If the protocol succeeds in transmitting > reliably, then there is no need to send any classical communication to Bob because he could measure each of the ports getting outcomes 0 and, and taing the majority vote to determine the teleported message with certainly. However, this is impossible, as it violates the no-signalling principles, which prohibits superluminal communication between lice and Bob. Therefore, the maximum number of qubits that lice can reliably communicate to Bob using port-based protocol is. 3 It is an intriguing open question which structures satisfy the sufficient condition of the Lemma, and, more importantly, what novel forms of computation might lead from here. In other words, what sets of unitaries{u g } g G lead to interesting computation schemes. n important open question is whether one can find a set of such unitaries which allow for new teleportation based computation schemes beyond those considered in [3]. Finally, having established the possibility of recycling and simultaneous teleportation in the port-based protocols, maes the implementation of the programmable processors more feasible, as one can now carry out the operations using less entanglement. The true potential of these protocols is yet to be fully explored. cnowledgements. We than Fernando Brandão for suggesting the protocol of simultaneous teleportation P sim. long with Matthias Christandl, he independently performed a similar calculation for its lower bound. S.S. thans Trinity College, Cambridge, for its support throughout his Ph.D. studies. M.H. is supported by EU grant QESSECE, the project QUSR of the ational Centre for Research and Development of Poland and by Polish Ministry of Science and Higher Education grant J.O. acnowledges the support of the Royal Society. Supplemental Material. GEERLIZED TELEPORTTIO Proof of Lemma : Consider the expression for teleportation fidelity expressed in terms of hypotheses testing in Lemma. of [8]: FP K d p sg, 4 where p s G is the probability to successfully distinguish a set of states induced by lice s operations from G the case when K and G S was originally introduced in []. The expression for p s G can be conveniently presented in terms of the states, induced by operations from G: [ ] p s G K K i ranη g Trη avg K d Trη avg. 5 where η g have the form of in the main body. If operations in G that achieve the terminal state Ω B with Ω B σ B φ B0 ǫ, then at the end of teleportation protocol the fidelity is at least: FP ǫ. 6 Substituting expressions from 4 and 5 we see that the action of the set G on the ports must be Trη avg ǫd + 7 to achieve the reliable teleportation. This proves the result.

6 6. ETGLEMET RECYCLIG We first find the expression for the total state after lice s measurement and the ideal state respectively. It is followed by the explicit expression of the fidelity, which precedes the proof of Theorem. For convenience of notation, we will further label the reference system R 0 to be B 0. The application of Π i results in Ψ i out Π i Ψ in + Π Π i Ψ in TrΠ i Ψ in, i where Ψ in i0 Ψ i B i and 8 Πi Ψ in Ψ in Π i Ψ in + TrΠ i. 9 Similarly, Ψ i id σ i Ψ in. 0 The average fidelity has the form: FP rec p i Fρ i out, Ψi id + p 0F f ail p Fρ out, Ψ id, i where without loss of generality we can assume that lice obtains outcome z, and the teleported state lands in the first port. Therefore, p TrΠ + TrΠ +, so FP rec + TrΠ Fρ out, Ψ id + TrΠ Tr σ Π, 3 TrΠ We further mae some simplifications: σ P, where P Ψ Thus σ P σ σ. 4 Therefore, Tr σ Π Trσ Π. Substituting it in Eqn. we get the resulting expression for fidelity: FP rec 4 TrΠ Trσ Π. 5 Proof of Theorem : We essentially need to compute TrΠ and Trσ Π. In particular, we show that TrΠ + and Trσ Π up to the leading order. We provide detailed calculation for TrΠ, as Trσ Π can be obtained in a completely analogous way. We proceed by first representing the operators in the Schur basis, which simplifies the computation of the product of operators in each case. Then we explicitly compute the expressions to which both of them converge in distribution. Consider the representation of the states ρ out and σ i in Schur basis ofh +. In this representation we have a direct sum sh s of blocs with total spin s, eachh s H H H H. The representation of ρ out, σ in this picture is σ i Ψ 0 Ψ ρ out [ ] λ + s Q Q + λ s Q Q, 7 s where Q Ψ I λ +, m, β Ψ s+ I λ +, m, β, s+ 8 Q Ψ I λ, m, β Ψ s I λ, m, β, s 9 Q Ψ II λ +, m, β Ψ s+ II λ +, m, β, s+ 30 Q Ψ II λ, m, β Ψ s II λ, m, β, s 3 with Ψ III λ ±, m, β defined in Eqn. 4-5 of [6]. s± The parameter β denotes the additional degree of freedom of the spin eigenbasis. s in the original protocol, we will consider only the space for irreps of the permutation group. From equations 9-3 in [6] we get the following relations: Q ψ 0 0, 3 Q ψ s 0 s+ ψ 0..., 33 Q ψ s+ 0 s+ ψ 0..., 34 Q ψ 0 0, 35 where... n s s.... We will further identify Q Q, and Q Q +. This leads to a more concise representation: ρ out s σ i s s U λ +Q + λ Q 36 s U Rs i, 37 where Q ± correspond to eigenspaces with eigenvalues λ ±, and R s± i β ψ β ψ β is a projector such that

7 ψ β Q + ψ β s+ s, and ψ β Q ψ β s+ s+. To compute TrΠ we first consider a more general expression: X σ X, where σ σ, and operator X can be written as: where Ψ ± I Ψ Iλ ±, m, β, s± 4 Ψ ± II Ψ IIλ ±, m, β. s± 4 7 X s From Eqn it follows that: [ γ + s Q + γ s Q ]. 38 X σ X 39 [γ s + γ + s Q s + σ Qs + + γ s + γ s Q s + σ Qs s,s 40 + γs γ+ s Q s σ Qs + + γ s γ s Q s σ Qs ], where we put superscripts s, s on top for clarity. ote that by virtue of belonging to different irreps indexed by s, blocs with different eigenvalues are orthogonal, therefore all the terms in the direct sum where s s will be zero. Evaluating each term individually, we get Q s + σ Qs + s s+ Ψ I Ψ I, ss+ Q s + σ Qs s+ Ψ I Ψ+ II, ss+ Q s σ Qs + s+ Ψ + II Ψ I, Q s σ Qs s s+ Ψ + II Ψ+ II, Only the terms where Q has the same sign on the left and on the right from σ will result in non-zero contribution to the trace of Eqn. 39: Tr X σ X Tr ψ 0 ψ 0 43 [ γ s + s s+ + γs s+ s+ ]s.... is: s 44 Recalling that γ s ±, the explicit form for TrΠ TrΠ ss m λ s λ ± s s s+ + λ + s s+ d s, s+ 45 where s m 0 when is oddeven, and d s dimh s U Hs P s+g s. From the equations 7, 9 of [6] we now that g s λ + s λ + s+ λ s λ s s+! s! + + s!, + s+ 3, s+. Finally, substituting them in the Eqn. 45: TrΠ Trρ σ ρ ss m s s+ + s+ + s+ 3 s+! s! + s+!, 46 We will further compute TrΠ up to terms O first symmetrically extending the corresponding sums to the range s [0, ] for odd and s [, ] for even. Then we note that the obtained expressions are by the expectation values of a function of the random variable with binomial distribution. Then, using de Moivre Laplace theorem [6] in the limit of large we replace the binomial random variables by the ones distributed as 0,. Then, we compute the expectations directly, obtaining the result:

8 8 TrΠ s0 E E E + s s+ + s+ s+! + s+ 3 s! 47 + s+! [ ] Z+ Z Z Z+ Z+ [ Z Z Z Z + ] Z [ Z 3 4+ ] 4+ 3Z Z 3 Z 3 + O O 6 + O 3, In 48 we used the substitution s + and symmetrized the sum to include the range[ +, ], moving the discrete probability function to the right side of the sum. We note that Eqn. 49 is the expectation of the function f : of the random variable Binom,. In the limit of large, is well approximated by the random variable Z 0, : d + Z. 54 Then, in Eqns. 50, 5 we simplify the expression inside the expectation using the expansion + x x + x, which is valid when x 0 this holds when. Lastly, in Eqn. 5 we use the fact that E[Z m+ ] 0, and E[Z m ] m!!. We now turn to compute Tr Π : Tr σ Tr Π σ Tr where cs, y ρ σ ρ σ ss m σ sρ 4 sσ sρ 4 s 57 cs, 4s+g s, 58 ss m s s+ λ y + s+ s s+ λ + y. s+ In Eqn. 57 we mae use of the equality σ n σ. Substituting values of λ± and simplifying s± the calculation analogously to 47-5 we get:

9 9 Tr σ Π + s+ 3 4 s++ s+ 4! s ss m s! + s+! E d 4 E Z Z+ + 4 Z Z+ E Z Z + 4 Z+ + Z O 65 + O 3/ Finally, FP rec, 4 TrΠ Tr 4 + O Lemma σ Π In what follows without loss of generality we will assume that the teleported state goes to port. We will also use the notation: ρ out,b ρ out and Ψ id,b Ψ id. From Theorem it follows that the fidelity of the overall state after the teleportation Fρ out,b, Ψ id,b 4, 69 where B 0 B 0 B... B, with Ψ id,b defined in Eqn. 0. Unlie the original teleportation protocol [6] where the subsystems B... B were traced out, we eep them to use in the following rounds. However, it is necessary to understand how much noise is piced up by each port individually to rule the situation where the state of each port degrades disproportionately to others, affecting the state, which lands in that port. Using the fact that fidelity does not increase under partial trace, it turns out that the state of the ports are close to copies of EPR state: 4 Fρ out,b, Ψ id,b 70 F ρ out,b\{0 B 0 }, Ψ id,b\{ 0 B 0 }. 7 Therefore, it follows that the fidelity of each individual port with singlet after the teleportation has the same lower bound as 69. Proof of Lemma : May the total state at the beginning of the protocol be Ω 0 ω C...C φ B... B, 7 where ω C...C denote a -qubit state that lice wants to teleport to Bob using P rec, and φ B... B denote the ports. fter the first round of the teleportation protocol the state of the qubit in subsystem C goes to, and the total state becomes: From Theorem we now that Ω θ C...C B... B. 73 θ B... B Ψ 4. 74

10 0 fter teleportation, the subsystems B... B may be entangled with the teleported state. In order to decorrelate them, lice and Bob apply the following operation: ρ duu U ρu U 75 Ud to the subsystems B... B. This results in Ω tw id C...C Ω pπ C...C φ B... B + pσ C...C B... B, where p 4. From the port-based teleportation protocol we now that θ C...C ω C...C 4, 76 because we teleport only the C subsystem, and leave other intact, hence pπ C...C + pσ C...C ω C...C 4, 77 which, combined with 74 gives π C...C ω C...C. 78 Repeating the teleportation times we obtain the statement of the Lemma. 3. SIMULTEOUS TELEPORTTIO To get the lower bounds on the efficiency of this protocol we use the observation that the tas of teleporting an unnown quantum state and signal discrimination are equivalent, as shown in [8] see also [7] for a different treatment of port-based teleportation. There, authors show that the average fidelity of teleportation corresponds to the average fidelity of discriminating a set of signals with each signal representing different ports where teleported state arrives to. Given that we want to teleport multiple states at once, our set of states {η g } g S corresponds to all possible ways in which teleported systems arrive in ports: η g U g [ ] Tr B...B \B g...b g Φ + Φ + i B i U g, 79 where U g permutes the subsystems according to some g S symmetric permutation group on elements. Proof of Theorem : we prove the result of the Theorem for qudits, where lice wants to teleport the subsystems... of the state σ B... B. To simplify the i calculations we tae σ j0 Ψ j B j. The total number of POVM elements that lice has at her disposal is M!!. We now compute the fidelity of! successful teleportation by estimating FP sim, M d p s, 80 where p s. From the structure of states η g M rtr η it follows that r M g S ranη g ηg 0, as d all states η g have the same ran. What remains to be computed is Tr η M g g Tr η g ηg. To compute Tr η g ηg we need to loo on a few different cases depending on the relative location of maximally entangled states in the corresponding states. We use the following notation: denotes the /d subsystem in the tensor product, xx denotes Φ +. Consider a particular case: fix η g xx xx and vary η g 7,. The following table illustrates the possible values of the trace of the pairwise product, depending on the relative position of the maximally entangled states in η g, with respect to ηg. The results are easily generalized for the case of arbitrary. Subsystems in bold denote partial odd number of TBLE I. The effect of relative position of the MES on the value of trace. η g Tr η g ηg xx xx d + xx xx d + xx xx d + xx xx d + 4 subsystems or full even number of subsystems overlaps between η g and ηg. The cases with partial overlaps contribute in the same way as no overlap at all. d + nd in case of full overlaps, we subtract from the exponent twice the number t of overlapping MES, yielding d. The expression Tr + t η consists of the sum of the terms for some t {0,..., }, depending on the d + t index of the permutation. We will determine the multiplicity of each of the terms indexed by t. For this, fix g, and consider all g g that result in Tr η g ηg d + t 8 for some fixed t. There are t! t ways to pic g such that the there are t full overlaps. In order to position the

11 remaining t maximally entangled states in η g, we must tae into the acount t forbidden positions of η g the location of the remaining maximally entangled states, where there must be no full overlaps, but only partial ones. This leaves + t t t good positions. ccounting for all possible permutations of the remaining maximally entangled states, there are t! t t ways to fill the rest of the good positions. Therefore, the total number of g that for fixed g, t results in 8 is Due to symmetry, L,,t is the same for each g. Finally, Tr η M Trη g ηg + Trη g ηg g g g Md + M Md + M t!!!! 83! t! t!! d + t 84 d d + d 85 Md + d, 86 d+ d t L,,t t! t! t t! t! t!!. 8 where we used M!, and noted that 84 is! geometric progression with b 0!! d, r + d. The resulting fidelity of teleportation has the form: FP sim M d Md d M + d M + d d d d d [4] Setting d, ǫ and taing limit we obtain the result. ss870@cam.ac.u [] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa,. Peres, and W. K. Wootters. Teleporting an unnown quantum state via dual classical and Einstein-Podolsy-Rosen channels. Physical Review Letters, 703: , Mar [] S. Ishizaa and T. Hiroshima. symptotic teleportation scheme as a universal programmable quantum processor. Physical Review Letters, 04:4050, Dec [3] D. Gottesman and I. L. Chuang. Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. ature, : , ov [4] C. Bennett, P. Hayden, D. Leung, P. Shor, and. Winter. Remote preparation of quantum states. IEEE Transactions on Information Theory, 5:56 74, Jan [5] Č. Bruner, J.-W. Pan, C. Simon, G. Weihs, and. Zeilinger. Probabilistic instantaneous quantum computation. Physical Review, 673:034304, Mar [6] S. Ishizaa and T. Hiroshima. Quantum teleportation scheme by selecting one of multiple output ports. Physical Review, 794:04306, pr [7] M.. ielsen and I. L. Chuang. Programmable quantum gate arrays. Physical Review Letters, 79:3 34, July 997. [8] S. Beigi and R. König. Simplified instantaneous nonlocal quantum computation with applications to positionbased cryptography. ew Journal of Physics, 39:093036, Sept. 0. [9] G. Brassard. Quantum information: The conundrum of secure positioning. ature, : , ov. 0. [0] H. Buhrman,. Chandran, S. Fehr, R. Gelles, V. Goyal, R. Ostrovsy, and C. Schaffner. Position-Based quantum cryptography: Impossibility and constructions. In P. Rogaway, editor, dvances in Cryptology CRYPTO 0, volume 684 of Lecture otes in Computer Science, pages Springer Berlin / Heidelberg, 0. [] H. Buhrman, S. Fehr, C. Schaffner, and F. Speelman. The Garden-Hose game: new model of computation, and application to Position-Based quantum cryptography. arxiv:09.563, Sept. 0.

12 []. Kent, W. J. Munro, and T. P. Spiller. Quantum tagging: uthenticating location via quantum information and relativistic signalling constraints. arxiv:008.47, ug. 00. Phys. Rev. 84, [3] R. F. Werner. ll teleportation and dense coding schemes. Journal of Physics : Mathematical and General, 3435: , Sept. 00. [4] Patric Hayden, Debbie Leung, Peter W. Shor and ndreas Winter. Randomizing Quantum States: Constructions and pplications. Commun. Math. Phys. 50, [5] C. Danert, R. Cleve, J. Emerson, and E. Livine. Exact and approximate unitary -designs and their application to fidelity estimation. Physical Review, 80:0304, July 009. [6] W. Feller. n Introduction to Probability Theory and Its pplications, Vol., 3rd Edition. Wiley, Jan [7] Damián Pitalúa-García. Deduction of an upper bound on the success probability of port-based teleportation from the no-cloning theorem and the no-signaling principle. arxiv:

Port-based teleportation and its applications

Port-based teleportation and its applications 2 QUATUO Port-based teleportation and its applications Satoshi Ishizaka Graduate School of Integrated Arts and Sciences Hiroshima University Collaborator: Tohya Hiroshima (ERATO-SORST) Outline Port-based

More information

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis

More information

arxiv: v3 [quant-ph] 17 Dec 2018

arxiv: v3 [quant-ph] 17 Dec 2018 Unconstrained Summoning for relativistic quantum information processing Adrian Kent Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce

More information

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Probabilistic exact cloning and probabilistic no-signalling. Abstract Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract

More information

Quantum Teleportation Pt. 3

Quantum Teleportation Pt. 3 Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation

More information

Lecture 11 September 30, 2015

Lecture 11 September 30, 2015 PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

Is Entanglement Sufficient to Enable Quantum Speedup?

Is Entanglement Sufficient to Enable Quantum Speedup? arxiv:107.536v3 [quant-ph] 14 Sep 01 Is Entanglement Sufficient to Enable Quantum Speedup? 1 Introduction The mere fact that a quantum computer realises an entangled state is ususally concluded to be insufficient

More information

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 3 Oct 2000 Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping

More information

Asymptotic Pure State Transformations

Asymptotic Pure State Transformations Asymptotic Pure State Transformations PHYS 500 - Southern Illinois University April 18, 2017 PHYS 500 - Southern Illinois University Asymptotic Pure State Transformations April 18, 2017 1 / 15 Entanglement

More information

Quantum entanglement and symmetry

Quantum entanglement and symmetry Journal of Physics: Conference Series Quantum entanglement and symmetry To cite this article: D Chrucisi and A Kossaowsi 2007 J. Phys.: Conf. Ser. 87 012008 View the article online for updates and enhancements.

More information

CS120, Quantum Cryptography, Fall 2016

CS120, Quantum Cryptography, Fall 2016 CS10, Quantum Cryptography, Fall 016 Homework # due: 10:9AM, October 18th, 016 Ground rules: Your homework should be submitted to the marked bins that will be by Annenberg 41. Please format your solutions

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Instantaneous Nonlocal Measurements

Instantaneous Nonlocal Measurements Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.

More information

Compression and entanglement, entanglement transformations

Compression and entanglement, entanglement transformations PHYSICS 491: Symmetry and Quantum Information April 27, 2017 Compression and entanglement, entanglement transformations Lecture 8 Michael Walter, Stanford University These lecture notes are not proof-read

More information

arxiv: v7 [quant-ph] 20 Mar 2017

arxiv: v7 [quant-ph] 20 Mar 2017 Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute

More information

Quantum Information Types

Quantum Information Types qitd181 Quantum Information Types Robert B. Griffiths Version of 6 February 2012 References: R. B. Griffiths, Types of Quantum Information, Phys. Rev. A 76 (2007) 062320; arxiv:0707.3752 Contents 1 Introduction

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam Centrum Wiskunde & Informatica Winter 17 QuantumDay@Portland

More information

1. Basic rules of quantum mechanics

1. Basic rules of quantum mechanics 1. Basic rules of quantum mechanics How to describe the states of an ideally controlled system? How to describe changes in an ideally controlled system? How to describe measurements on an ideally controlled

More information

Unambiguous Discrimination Between Linearly Dependent States With Multiple Copies

Unambiguous Discrimination Between Linearly Dependent States With Multiple Copies Unambiguous Discrimination Between Linearly Dependent States With Multiple Copies Anthony Chefles Department of Physical Sciences, University of Hertfordshire, Hatfield AL10 9AB, Herts, UK arxiv:quant-ph/0105016v3

More information

Introduction to Quantum Mechanics

Introduction to Quantum Mechanics Introduction to Quantum Mechanics R. J. Renka Department of Computer Science & Engineering University of North Texas 03/19/2018 Postulates of Quantum Mechanics The postulates (axioms) of quantum mechanics

More information

arxiv: v2 [quant-ph] 21 Oct 2013

arxiv: v2 [quant-ph] 21 Oct 2013 Genuine hidden quantum nonlocality Flavien Hirsch, 1 Marco Túlio Quintino, 1 Joseph Bowles, 1 and Nicolas Brunner 1, 1 Département de Physique Théorique, Université de Genève, 111 Genève, Switzerland H.H.

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

ON THE ROLE OF THE BASIS OF MEASUREMENT IN QUANTUM GATE TELEPORTATION. F. V. Mendes, R. V. Ramos

ON THE ROLE OF THE BASIS OF MEASUREMENT IN QUANTUM GATE TELEPORTATION. F. V. Mendes, R. V. Ramos ON THE ROLE OF THE BASIS OF MEASREMENT IN QANTM GATE TELEPORTATION F V Mendes, R V Ramos fernandovm@detiufcbr rubens@detiufcbr Lab of Quantum Information Technology, Department of Teleinformatic Engineering

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state Perfect quantum teleportation and dense coding protocols via the -qubit W state Wang Mei-Yu( ) a)b) and Yan Feng-Li( ) a)b) a) College of Physics Science and Information Engineering, Hebei ormal University,

More information

Lecture 4: Postulates of quantum mechanics

Lecture 4: Postulates of quantum mechanics Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying

More information

Squashed entanglement

Squashed entanglement Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Lecture 2: Quantum bit commitment and authentication

Lecture 2: Quantum bit commitment and authentication QIC 890/891 Selected advanced topics in quantum information Spring 2013 Topic: Topics in quantum cryptography Lecture 2: Quantum bit commitment and authentication Lecturer: Gus Gutoski This lecture is

More information

arxiv: v2 [quant-ph] 7 Apr 2014

arxiv: v2 [quant-ph] 7 Apr 2014 Quantum Chernoff bound as a measure of efficiency of quantum cloning for mixed states arxiv:1404.0915v [quant-ph] 7 Apr 014 Iulia Ghiu Centre for Advanced Quantum Physics, Department of Physics, University

More information

Single-photon quantum error rejection and correction with linear optics

Single-photon quantum error rejection and correction with linear optics Single-photon quantum error rejection and correction with linear optics Demetrios Kalamidas Institute for ltrafast Spectroscopy and Lasers, City College of the City niversity of New York, 138 Street &

More information

Fidelity of Quantum Teleportation through Noisy Channels

Fidelity of Quantum Teleportation through Noisy Channels Fidelity of Quantum Teleportation through Noisy Channels Sangchul Oh, Soonchil Lee, and Hai-woong Lee Department of Physics, Korea Advanced Institute of Science and Technology, Daejon, 305-701, Korea (Dated:

More information

arxiv:quant-ph/ Oct 2002

arxiv:quant-ph/ Oct 2002 Measurement of the overlap between quantum states with the use of coherently addressed teleportation Andrzej Grudka* and Antoni Wójcik** arxiv:quant-ph/00085 Oct 00 Faculty of Physics, Adam Mickiewicz

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Lecture 11: Quantum Information III - Source Coding

Lecture 11: Quantum Information III - Source Coding CSCI5370 Quantum Computing November 25, 203 Lecture : Quantum Information III - Source Coding Lecturer: Shengyu Zhang Scribe: Hing Yin Tsang. Holevo s bound Suppose Alice has an information source X that

More information

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Bit-Commitment and Coin Flipping in a Device-Independent Setting Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).

More information

THE NUMBER OF ORTHOGONAL CONJUGATIONS

THE NUMBER OF ORTHOGONAL CONJUGATIONS THE NUMBER OF ORTHOGONAL CONJUGATIONS Armin Uhlmann University of Leipzig, Institute for Theoretical Physics After a short introduction to anti-linearity, bounds for the number of orthogonal (skew) conjugations

More information

CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/2 PARTICLES

CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/2 PARTICLES CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/ PARTICLES S. Ghosh, G. Kar, and A. Roy Physics and Applied Mathematics Unit Indian Statistical Institute 03, B. T. Road Calcutta 700 035 India. E

More information

Borromean Entanglement Revisited

Borromean Entanglement Revisited Borromean Entanglement Revisited Ayumu SUGITA Abstract An interesting analogy between quantum entangled states and topological links was suggested by Aravind. In particular, he emphasized a connection

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

arxiv: v1 [quant-ph] 3 Jan 2008

arxiv: v1 [quant-ph] 3 Jan 2008 A paradigm for entanglement theory based on quantum communication Jonathan Oppenheim 1 1 Department of Applied Mathematics and Theoretical Physics, University of Cambridge U.K. arxiv:0801.0458v1 [quant-ph]

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

Introduction to Quantum Information Hermann Kampermann

Introduction to Quantum Information Hermann Kampermann Introduction to Quantum Information Hermann Kampermann Heinrich-Heine-Universität Düsseldorf Theoretische Physik III Summer school Bleubeuren July 014 Contents 1 Quantum Mechanics...........................

More information

Lecture 6: Quantum error correction and quantum capacity

Lecture 6: Quantum error correction and quantum capacity Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem

More information

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 Lecturer: Dr. Mark Tame Introduction With the emergence of new types of information, in this case

More information

5. Communication resources

5. Communication resources 5. Communication resources Classical channel Quantum channel Entanglement How does the state evolve under LOCC? Properties of maximally entangled states Bell basis Quantum dense coding Quantum teleportation

More information

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Unitary evolution: this axiom governs how the state of the quantum system evolves in time. CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the

More information

Solving the Einstein Podolsky Rosen puzzle: The origin of non-locality in Aspect-type experiments

Solving the Einstein Podolsky Rosen puzzle: The origin of non-locality in Aspect-type experiments Front. Phys., 2012, 7(5): 504 508 DOI 10.1007/s11467-012-0256-x RESEARCH ARTICLE Solving the Einstein Podolsky Rosen puzzle: The origin of non-locality in Aspect-type experiments Werner A. Hofer Department

More information

A single quantum cannot be teleported

A single quantum cannot be teleported 1 quant-ph/010060 A single quantum cannot be teleported Daniele Tommasini Departamento de Física Aplicada, Universidad de Vigo, 3004 Ourense, Spain Due to the Heisemberg uncertainty principle, it is impossible

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

arxiv: v2 [quant-ph] 16 Nov 2018

arxiv: v2 [quant-ph] 16 Nov 2018 aaacxicdvhlsgmxfe3hv62vvswncwelkrmikdlgi7cqc1yfwyro+mthmasibkjlgg+wk3u/s2/wn8wfsxs1qsjh3nuosckjhcuhb8fry5+yxfpejyawv1bx2jxnm8tto1hftcs23ui7aohciwcjnxieojjf/xphvrdcxortlqhqykdgj6u6ako5kjmwo5gtsc0fi/qtgbvtaxmolcnxuap7gqihlspyhdblqgbicil5q1atid3qkfhfqqo+1ki6e5f+cyrt/txh1f/oj9+skd2npbhlnngojzmpd8k9tyjdw0kykioniem9jfmxflvtjmjlaseio9n9llpk/ahkfldycthdga3aj3t58/gwfolthsqx2olgidl87cdyigsjusbud182x0/7nbjs9utoacgfz/g1uj2phuaubx9u6fyy7kljdts8owchowj1dsarmc6qvbi39l78ta8bw9nvoovjv1tsanx9rbsmy8zw==

More information

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties

Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties Commun. Theor. Phys. 67 (2017) 377 382 Vol. 67, No. 4, April 1, 2017 Probabilistic Teleportation of an Arbitrary Two-Qubit State via Positive Operator-Valued Measurement with Multi Parties Lei Shi ( 石磊

More information

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c

o. 5 Proposal of many-party controlled teleportation for by (C 1 ;C ; ;C ) can be expressed as [16] j' w i (c 0 j000 :::0i + c 1 j100 :::0i + c Vol 14 o 5, May 005 cfl 005 Chin. Phys. Soc. 1009-1963/005/14(05)/0974-06 Chinese Physics and IOP Publishing Ltd Proposal of many-party controlled teleportation for multi-qubit entangled W state * Huang

More information

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36 QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING

More information

Lecture 20: Bell inequalities and nonlocality

Lecture 20: Bell inequalities and nonlocality CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 0: Bell inequalities and nonlocality April 4, 006 So far in the course we have considered uses for quantum information in the

More information

Multiparty Quantum Remote Control

Multiparty Quantum Remote Control Multiparty Quantum Remote Control Yu-Ting Chen and Tzonelih Hwang Abstract This paper proposes a multiparty quantum remote control (MQRC) protocol, which allows several controllers to perform remote operations

More information

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v2 17 Sep 2002 Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,

More information

Quantum Setting with Applications

Quantum Setting with Applications in the Quantum Setting with Applications Frédéric Dupuis 1 Serge Fehr 2 Philippe Lamontagne 3 Louis Salvail 3 2 CWI, Amsterdam, The Netherlands 1 Faculty of Informatics, Masaryk University, Brno, Czech

More information

Quantum Teleportation. Gur Yaari for HEisenberg's Seminar on Quantum Optics

Quantum Teleportation. Gur Yaari for HEisenberg's Seminar on Quantum Optics Quantum Teleportation Gur Yaari for HEisenberg's Seminar on Quantum Optics Bell States Maximum Entangled Quantum States: The usual form of the CHSH inequality is: E(a, b) E(a, b ) + E(a, b) + E(a

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

The controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows:

The controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows: C/CS/Phys C9 Qubit gates, EPR, ell s inequality 9/8/05 Fall 005 Lecture 4 Two-qubit gate: COT The controlled-not (COT) gate exors the first qubit into the second qubit ( a,b a,a b = a,a + b mod ). Thus

More information

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences

More information

Instantaneous Non-Local Computation of Low T-Depth Quantum Circuits

Instantaneous Non-Local Computation of Low T-Depth Quantum Circuits Instantaneous Non-Local Computation of Low T-Depth Quantum Circuits Florian Speelman Centrum Wiskunde & Informatica, Amsterdam, the Netherlands f.speelman@cwi.nl Abstract Instantaneous non-local quantum

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

arxiv: v2 [quant-ph] 26 Mar 2012

arxiv: v2 [quant-ph] 26 Mar 2012 Optimal Probabilistic Simulation of Quantum Channels from the Future to the Past Dina Genkina, Giulio Chiribella, and Lucien Hardy Perimeter Institute for Theoretical Physics, 31 Caroline Street North,

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Schur-Weyl duality, quantum data compression, tomography

Schur-Weyl duality, quantum data compression, tomography PHYSICS 491: Symmetry and Quantum Information April 25, 2017 Schur-Weyl duality, quantum data compression, tomography Lecture 7 Michael Walter, Stanford University These lecture notes are not proof-read

More information

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

Ph 219/CS 219. Exercises Due: Friday 20 October 2006 1 Ph 219/CS 219 Exercises Due: Friday 20 October 2006 1.1 How far apart are two quantum states? Consider two quantum states described by density operators ρ and ρ in an N-dimensional Hilbert space, and

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Entanglement and nonlocality

Entanglement and nonlocality Entanglement and nonlocality (collected notes) Fabio Grazioso 2015-06-24 23:06 EDT 2 Contents 1 Introduction 5 1.1 foreword.................................... 5 1.2 general picture................................

More information

Technical Report Communicating Secret Information Without Secret Messages

Technical Report Communicating Secret Information Without Secret Messages Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

The entanglement of indistinguishable particles shared between two parties

The entanglement of indistinguishable particles shared between two parties The entanglement of indistinguishable particles shared between two parties H.M. Wiseman 1, and John. Vaccaro 1,2 1 Centre for Quantum Computer Technology, Centre for Quantum Dynamics, School of Science,

More information

arxiv: v2 [quant-ph] 9 Oct 2018

arxiv: v2 [quant-ph] 9 Oct 2018 Quantum to Classical One-Way Function and Its Applications in Quantum Money Authentication arxiv:1801.01910v2 [quant-ph] 9 Oct 2018 Amit Behera Department of Mathematics & Computer Science, Chennai Mathematical

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

A Holevo-type bound for a Hilbert Schmidt distance measure

A Holevo-type bound for a Hilbert Schmidt distance measure Journal of Quantum Information Science, 205, *,** Published Online **** 204 in SciRes. http://www.scirp.org/journal/**** http://dx.doi.org/0.4236/****.204.***** A Holevo-type bound for a Hilbert Schmidt

More information

Quantum Data Compression

Quantum Data Compression PHYS 476Q: An Introduction to Entanglement Theory (Spring 2018) Eric Chitambar Quantum Data Compression With the basic foundation of quantum mechanics in hand, we can now explore different applications.

More information

arxiv: v3 [quant-ph] 12 Jun 2018

arxiv: v3 [quant-ph] 12 Jun 2018 Masing quantum information is impossible arxiv:1608.01695v3 [quant-ph] 12 Jun 2018 Kavan Modi, 1, run Kumar Pati, 2, diti Sen(De), 2, and Ujjwal Sen 2, 1 School of Physics & stronomy, Monash University,

More information

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Ph 219/CS 219. Exercises Due: Friday 3 November 2006 Ph 9/CS 9 Exercises Due: Friday 3 November 006. Fidelity We saw in Exercise. that the trace norm ρ ρ tr provides a useful measure of the distinguishability of the states ρ and ρ. Another useful measure

More information

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi

More information

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing: Foundations to Frontier Fall Lecture 3 Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about

More information

Entropy in Classical and Quantum Information Theory

Entropy in Classical and Quantum Information Theory Entropy in Classical and Quantum Information Theory William Fedus Physics Department, University of California, San Diego. Entropy is a central concept in both classical and quantum information theory,

More information

Quantum Dense Coding and Quantum Teleportation

Quantum Dense Coding and Quantum Teleportation Lecture Note 3 Quantum Dense Coding and Quantum Teleportation Jian-Wei Pan Bell states maximally entangled states: ˆ Φ Ψ Φ x σ Dense Coding Theory: [C.. Bennett & S. J. Wiesner, Phys. Rev. Lett. 69, 88

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev

Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev The Superposition Principle (Physicists): If a quantum

More information

Lecture 21: HSP via the Pretty Good Measurement

Lecture 21: HSP via the Pretty Good Measurement Quantum Computation (CMU 5-859BB, Fall 205) Lecture 2: HSP via the Pretty Good Measurement November 8, 205 Lecturer: John Wright Scribe: Joshua Brakensiek The Average-Case Model Recall from Lecture 20

More information

Relativistic quantum pseudo-telepathy

Relativistic quantum pseudo-telepathy Relativistic quantum pseudo-telepathy P. Gawron Ł. Pawela Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Bałtycka 5, 44-100 Gliwice, Poland 09.IX.2014 arxiv:1409.2708v1 [quant-ph]

More information

Distinguishing different classes of entanglement for three qubit pure states

Distinguishing different classes of entanglement for three qubit pure states Distinguishing different classes of entanglement for three qubit pure states Chandan Datta Institute of Physics, Bhubaneswar chandan@iopb.res.in YouQu-2017, HRI Chandan Datta (IOP) Tripartite Entanglement

More information

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable,

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable, Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable, A qubit: a sphere of values, which is spanned in projective sense by two quantum

More information

Substituting a qubit for an arbitrarily large amount of classical communication

Substituting a qubit for an arbitrarily large amount of classical communication Substituting a qubit for an arbitrarily large amount of classical communication Ernesto F. Galvão and Lucien Hardy Centre for Quantum Computation, Clarendon Laboratory, University of Oxford, Parks Road,

More information

CS/Ph120 Homework 1 Solutions

CS/Ph120 Homework 1 Solutions CS/Ph0 Homework Solutions October, 06 Problem : State discrimination Suppose you are given two distinct states of a single qubit, ψ and ψ. a) Argue that if there is a ϕ such that ψ = e iϕ ψ then no measurement

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing

More information

arxiv: v1 [quant-ph] 16 Dec 2009

arxiv: v1 [quant-ph] 16 Dec 2009 Singlet Generation in Mixed State Quantum Networks S. roadfoot, 1 U. Dorner, 1 and D. Jaksch 1,2 1 Clarendon Laboratory, University of Oxford, Parks Road, Oxford OX1 3PU, United Kingdom 2 Centre for Quantum

More information

Gilles Brassard. Université de Montréal

Gilles Brassard. Université de Montréal Gilles Brassard Université de Montréal Gilles Brassard Université de Montréal VOLUME 76, NUMBER 5 P H Y S I C A L R E V I E W L E T T E R S 29 JANUARY 1996 Purification of Noisy Entanglement and Faithful

More information

Concentrating partial entanglement by local operations

Concentrating partial entanglement by local operations PHYSICAL REVIEW A VOLUME 53, NUMBER 4 APRIL 1996 Concentrating partial entanglement by local operations Charles H. Bennett IBM Research Division, T. J. Watson Center, Yorktown Heights, New York 10598 Herbert

More information

Quantum Error Correction Codes-From Qubit to Qudit. Xiaoyi Tang, Paul McGuirk

Quantum Error Correction Codes-From Qubit to Qudit. Xiaoyi Tang, Paul McGuirk Quantum Error Correction Codes-From Qubit to Qudit Xiaoyi Tang, Paul McGuirk Outline Introduction to quantum error correction codes (QECC) Qudits and Qudit Gates Generalizing QECC to Qudit computing Need

More information

arxiv: v2 [quant-ph] 3 Jul 2008

arxiv: v2 [quant-ph] 3 Jul 2008 Deterministic Dense Coding and Faithful Teleportation with Multipartite Graph States Ching-Yu Huang 1, I-Ching Yu 1, Feng-Li Lin 1, and Li-Yi Hsu 2 1 Department of Physics, National Taiwan Normal University,

More information