SUPPLEMENTARY INFORMATION

Size: px
Start display at page:

Download "SUPPLEMENTARY INFORMATION"

Transcription

1 doi:0.038/nature03 I. MAIN RESULTS Erasure, work-extraction and their relation to Maxwell s demon have spurred rather extensive literature (for overviews see [ 4]) as well as debates (see, e.g., [5 8]). Several approaches have been proposed in the past to formalize the idea of a thermal process and to study erasure, work-extraction and their relation to Maxwell s demon [9 9]. Correlations and entanglement can affect erasure and work-extraction, as has been noted by several authors. For instance, in [0] the system to be erased is bipartite and the observer is restricted to local operations and classical communication (LOCC); the difference between quantum and classical demons is addressed in []; see also [] for a discussion on local and global demons in the context of the thermodynamic arrow of time. Here, we assume a setting as described in the manuscript, where an observer with a quantum memory, Q, tries to erase a system, S, using a heat bath and a battery. Memory contents about other systems must be preserved. We introduce a reference system, R, that includes those other systems and purifies the initial global state; information-conservation then means that the joint state ρ QR must be preserved. The final Hamiltonian of S and Q should equal the initial one, which is totally degenerate. A. General single-shot results In general, the work required to erase a system is a random variable. We characterize a single instance of erasure with a probabilistic statement, and later we consider the average work cost of erasure in a thermodynamic limit. Supplementary Theorem I. guarantees that the cost of erasing a system does not exceed a bound given in terms of the entropy of S conditioned on Q, except with a small probability. Supplementary Theorem I.. [Theorem from the Methods Summary] Given a system, S, and a memory, Q, in initial joint state ρ, there exists a process, P, to erase S that acts at temperature T, whose work cost, denoted W P (S Q) T ρ, satisfies W P (S Q) T ρ [H ε max(s Q) ρ + ] kt ln, except with probability less than δ =,ε 0. + ε, The quantity H ε max(s Q) denotes the ε-smooth maxentropy of system S conditioned on the quantum memory Q, a single-shot generalization of the von Neumann entropy [3] (definition and properties in Supplementary Section II). The term can be chosen to be small and does not scale with the size of the systems involved, so it may be neglected in the limit of large systems. For instance, to allow a maximum probability of failure of only δ = 3%, one pays a price of approximately 0 kt ln in the work consumption of the process (in addition to the one dictated by the entropy), assuming that ε is negligible. In proving Supplementary Theorem I. we are faced with the problem that, in general, the joint state of S, Q, and R may be not as neat and clean as in the example of Quasimodo given in the manuscript, where we had a maximally entangled state between S and a subsystem of Quasimodo s memory. Nevertheless, this special example contains the essence of the general case. Proof of Theorem I.. The erasure process, P, that gives the bounds of Theorem I. can be described as follows. Firstly we find a subsystem of S Q, X, that is δ-close to a pure state. Supplementary Theorem III. tells us that there is such a subsystem, of size log X log S H ε max(s Q)+log (δ ε). We can then apply the elementary work-extraction procedure on X to gain energy log X kt ln, leaving X in a fully mixed state (see Supplementary Theorem IV.). To satisfy the information-preservation condition, the joint state of Q and R must be preserved when the pure state of X is replaced with a fully mixed state. This is guaranteed by Supplementary Theorem III., because the state of X is maximally entangled between a subsystem of S and a subsystem of the combination of S and Q. Finally, we let S thermalize and apply the elementary erasure process on S, performing work log S kt ln (Supplementary Corollary IV.). The total work cost of erasing S using this process, P, is W P (S Q) T ρ = [log S log X ] kt ln [H ε max(s Q) ρ log (δ ε)] kt ln.

2 The fact that the state of X is at most δ-distant from the desired pure state bounds the probability of error of the procedure (see Supplementary Lemma IV.3). As a byproduct of the above proof we find an analogous result for work-extraction. The goal of this process is to extract work from a system, S, under the assumption that the state ρ QR is kept intact (while the final state of S is arbitrary). Supplementary Corollary I.. Given an n-qubit system, S, and a memory, Q, in initial joint state ρ, there exists a work-extraction process, P ex, acting at temperature T, with work gain, W Pex, that satisfies W Pex (S Q) T ρ [n H ε max(s Q) ρ ] kt ln, except with a probability of at most δ =,ε 0. B. Asymptotic limit + ε, We typically expect thermal fluctuations to disappear in macroscopic systems. Theoretically, this is usually handled by taking a thermodynamic limit, where we in some sense increase the size of the system such that fluctuations are averaged away. In a similar spirit we imagine to perform the erasure on a large collection of identical and independently distributed (iid) systems. We define the work cost rate of an erasure process as the average work cost of an optimal erasure process in this limit. Supplementary Definition I.3 (work cost rate). Given a system, S, and a memory, Q, in initial joint state ρ, the work cost rate of erasure of S is defined as w(s Q) T ρ := inf{w : {P n } n : [ ] lim inf Prob W Pn (S Q) T n ρ nw =}. n Here, P n is a process that erases n iid copies of S given the knowledge of n copies of Q. This definition gives the optimal average work cost of erasure in the limit of large n: we take the best process (i.e., the one with the least work cost) among those that always succeed in the asymptotic limit. Using the Asymptotic Equipartition Property (AEP; see Supplementary equation (II.3)), we can bound the work cost rate of erasure as follows. Supplementary Corollary I.4. Given a system, S, and a memory, Q, in initial joint state ρ, the work cost rate of S at temperature T is bounded as w(s Q) T ρ H(S Q) ρ kt ln. One can prove the converse bound under a natural assumption: Landauer s principle for a classical observer. Supplementary Lemma I.5. If the erasure of any system, Z, correlated with a classical memory, C, in a quantum-classical state, ρ, at temperature T has work cost rate w(z C) T ρ H(Z C) ρ kt ln, then the work cost rate of erasing a system S conditioned on a quantum memory, Q, initially in an arbitrary bipartite quantum state, ρ, is bounded as Proof. We can write w(s Q) T ρ H(S Q) ρ kt ln. w(s QC) T ρ + H(Q C) ρ kt ln w(s QC) T ρ + w(q C) T ρ w(sq C) T ρ H(SQ C) ρ kt ln. The first inequality comes from Supplementary Corollary I.4. The second inequality stands because erasing S given the knowledge of Q and later erasing Q is one particular way of erasing SQ. The last inequality comes from Landauer s principle for a classical observer (with Z = SQ). Rearranging the terms, we obtain w(s QC) T ρ [H(SQ C) ρ H(Q C) ρ ] kt ln = H(S QC) ρ kt ln, which recovers the desired result. The following lemma shows that local operations on the memory cannot decrease the work cost of erasure. This may be used to demonstrate the data processing inequality [4 6], as shown in the manuscript. Supplementary Lemma I.6. Let ρ be a state of S Q R, ξ a trace-preserving completely positive map from the memory Q to a system Q, and ρ = ξ Q I SR (ρ). The work cost rate of erasing S cannot decrease after applying ξ, w(s Q) T ρ w(s Q ) T ρ. Proof. Using Stinespring dilation we find a system Q and an isometry U : Q Q Q such that ξ(σ) =Tr Q U(σ). Since Q and Q Q are related by an isometry, for every erasure process conditioned on Q there exists an equivalent process conditioned on Q Q, so w(s Q) T ρ = w(s Q Q ) T ρ. Clearly w(s Q ) T ρ w(s Q Q ) T ρ, because every erasure process conditioned on Q is a particular case of a process conditioned on Q Q that does not use the information of Q. Note that the information-preservation condition requires that the state of Q and Q be preserved even for processes conditioned only on Q, because Q can be considered part of the reference.

3 For the above results on the work cost rate we have limited ourselves to the case of iid states. Needless to say, increasing the size of a system does not necessarily correspond to taking many iid copies. However, the iid assumption is important for the above derivations only so far that it allows us to prove that the smooth max-entropy (per qubit, or some other elementary unit) converges to the corresponding von Neumann entropy, via the AEP. We could thus expect to obtain similar results for any family of states that satisfy this limit. That there exist reasonable non-iid generalizations of this type can be seen, for instance, from the Shannon-McMillan- Breiman theorem in classical information theory (see e.g., [7]), and similar results in quantum information theory (see e.g., [8, 9] and references therein). We note that there is a similar consideration in statistical mechanics, concerning the relation between the Gibbs entropy and Boltzmann s entropy formula S = k ln W, where W is interpreted as the effective phase space volume compatible with a given macro state (see [30] for a discussion). The latter is akin to the unconditional smooth max-entropy, which is the logarithm of the effective support size of the density operator. Similarly, the Gibbs entropy is essentially the Shannon or von Neumann entropy. II. SMOOTH ENTROPIES Our main result, Supplementary Theorem I., relies on the smooth max-entropy, H ε max, as a measure to quantify uncertainty [3]. Smooth entropies have, so far, mainly been used in information theory, where they proved to be the relevant quantities to characterize informationprocessing tasks such as randomness or entanglement distillation, channel coding, data compression, or key distribution. The formulation of the entropy-work relation in terms of the smooth max-entropy rather than the more standard von Neumann entropy has the advantage that the relation is valid independently of the structure of the underlying quantum states. A work-entropy relation involving the von Neumann entropy (Corollary I.4) is obtained from this general result by introducing appropriate assumptions, as explained below. In the following, we briefly review the definition of smooth entropies and show how they are related to the von Neumann entropy. For a more detailed discussion of smooth entropies, their properties, and their informationtheoretic significance, we refer to [3, 3 33]. S conditioned on Q can be expressed in terms of fidelity, F, as Hmax(S Q) ε ρ := inf sup log F (ρ SQ, ρ S σ Q ). SQ σ Q The supremum ranges over all density operators σ Q on Q. The infimum is taken over all (subnormalized) density operators ρ SQ that are ε-close to ρ SQ, where ε 0 is the smoothness parameter, which is usually chosen to be small but nonzero. Our technical arguments also involve the smooth minentropy, which can be seen as the dual of the smooth max-entropy, in the following sense. Consider a purification ρ SQR of the given bipartite state ρ SQ, with a purifying system R. The ε-smooth min-entropy of S conditioned on R then corresponds to the negative smooth max-entropy conditioned on Q [3, 34], H ε min(s R) ρ = H ε max(s Q) ρ. (II.) Smooth entropies have properties analogous to those of the conditional von Neumann entropy. For example, for ε 0, both Hmin ε (S Q) ρ and Hmin ε (S Q) ρ are 0 if the reduced state on S is pure, for a qubit S that is fully mixed and uncorrelated with Q, and for a qubit S that is maximally entangled with Q. Furthermore, they satisfy a data-processing inequality. It asserts that the entropy of S conditioned on Q can only increase if information is processed locally at Q. Formally, H ε max(s Q ) ρ H ε max(s Q) ρ, where ρ = ρ SQ is the state obtained from ρ SQ after applying a trace-preserving completely positive map M on system Q. B. Specialization to the von Neumann entropy For a bipartite quantum state ρ SQ, the von Neumann entropy of S conditioned on Q is defined by H(S Q) ρ = H(ρ SQ ) H(ρ Q ), where H(σ) denotes the usual (nonconditional) von Neumann entropy of σ, i.e., H(σ) = Tr(σ log σ). The conditional von Neumann entropy is always bounded by the smooth min- and max-entropies, lim ε 0 Hε min(s Q) ρ H(S Q) ρ lim H ε ε 0 max(s Q) ρ. (II.) In particular, if the smooth min- and max-entropies coincide, they are automatically equal to the von Neumann A. Definition and properties Let ρ = ρ SQ be the state of a bipartite system, consisting of subsystems S and Q. The ε-smooth max-entropy of Note that the fidelity can be defined for arbitrary (not necessarily normalized) positive operators, R and S, by F (R, S) := R S, where is the L -norm. Closeness is measured in terms of the purified distance [34]. 3

4 entropy. Hence, under this condition, the smooth maxentropy occurring in Supplementary Theorem I. can be replaced by the von Neumann entropy (Supplementary Corollary I.4). A typical situation where equation II. holds (approximately) with equality is that of a large n-partite system with weakly correlated parts. In the limit when the correlations disappear, the state of the system is of the form σ n (iid). Such states are common in information theory and physics they arise, for instance, naturally for systems with sufficiently high symmetries (e.g., when a system is invariant under permutations of its n parts [35]). One can show that the smooth min- and max-entropies converge for states of the form ρ S n Q n = σ SQ n [36]. Hence, by virtue of equation II., and using the fact that the von Neumann entropy is additive, one has, for any 0 <ε<, lim n n Hε max(s n Q n ) σ n n Hε min(s n Q n ) σ n = lim n = H(S Q) σ. (II.3) In other words, for iid states, the work-entropy relation of Supplementary Theorem I. asymptotically also holds for the von Neumann entropy. We note that equation II.3 can be seen as a reformulation of the Asymptotic Equipartition Property, which plays a crucial role in the area of information theory. There, operational quantities (such as the compression rate of a random source or the amount of randomness that can be distilled from a given source) are usually related to either the smooth min- or the smooth max-entropy. The widespread use of the von Neumann entropy in (text-book) information theory is therefore mainly a consequence of the fact that one typically considers asymptotic iid situations a limit where all these entropy measures are equal. III. PURITY EXTRACTION In this section we describe purity extraction, used in the first step of the erasure process of Supplementary Theorem I.. In this procedure we use correlations between two systems, S and Q, to find a pure state in a subsystem of S Q. We will often refer to the distance between two states, measured by the trace distance, D(ρ, σ) = ρ σ. We say that ρ and σ are δ-close if D(ρ, σ) δ. Supplementary Theorem III.. Consider a system, S Q R, in a pure state, ρ. There is an l-qubit system, S P, with S S and P S Q equally large systems, in a state δ-close to a pure state maximally entangled between S and P. The size of this system is bounded as l log S H ε max(s Q) ρ + log (δ ε), ε 0. The proof of Supplementary Theorem III. relies on the notion of decoupling, first introduced in [37] and generalized in [38]. Starting from recent tight bounds on decoupling [38], our proof proceeds in two steps, corresponding to Subsections A and B below (see also Fig. ). In the first step we show that a subsystem S S, of l/-qubits, can be decoupled from R. In the second step, we show that, since the global state is pure, S is purified by a subsystem of S Q of the same dimension. The pure state created has a total of l qubits. A. Decoupling In this first step, we give a bound on the size of the subsystem of S that can be decoupled from R, according to the following definition. Supplementary Definition III. (Decoupling). A system X is δ -decoupled from another system, R, if their joint state is δ -close to a product state where the reduced state of X is fully mixed, ( D ρ XR, X X ρ R ) δ. Lemma III.3 shows that the size of the decoupled system depends on the correlations between S and Q, as measured by an entropy measure, the smooth conditional max-entropy, Hmax(S Q). ε Supplementary Lemma III.3. Let ρ be a pure state of a system S Q R. There exists an l -qubit subsystem S S that is δ -decoupled from R, with l log S Hmax(S Q) ε ρ + log (δ ε), ε 0. Proof. Decoupling results [38, Cor. 6.] imply that the state obtained after applying a random unitary on S is close to the desired decoupled state if correlations between S and R are weak. We use a formulation proposed in [39], where those correlations are measured by the smooth conditional min-entropy, Hmin ε (S R) ρ, ) ) (Tr S ([U S R ] ρ SR, du S U S D S l/ ρ R (log S l+) Hε min (S R)ρ +6ε, (III.) where S = S S. Here, the integral is taken over all unitary operations on system S, U S, according to the Haar measure, and Hmin ε (S R) ρ is the smooth conditional min-entropy of S, given the information that R may provide about that system. The bound of equation III. applies to the average of a positive quantity over all unitaries. It follows that there is at least one fixed unitary, corresponding to a choice of basis of S, that respects the bound. If we fix an upper bound of δ on the distance between the desired and the obtained states, we have l log S + Hmin ε (S R) ρ + log (δ ε). (III.) 4

5 Reference S S P Q FIG. : Purity extraction. A subsystem S of S is decoupled from the reference. The size of S decreases with the strength of correlations between S and the reference, and therefore increases with correlations between S and the memory, Q (see Supplementary Section II). Since the global state is pure, S is purified by a system P of equal size that belongs to the remaining systems, S and Q. The state of S P is maximally entangled. The arrows symbolize correlations between systems. The global state is pure, so one may use the duality relation between entropy measures, introduced in equation II., H ε min (S R) ρ = H ε max (S Q) ρ, where the latter is the smooth max-entropy of system S conditioned on the memory. Inserting this in equation III., we obtain l log S Hmax(S Q) ε ρ + log (δ ε). B. Purification To complete the proof of Supplementary Theorem III., it remains to show that, given an l -qubit system S decoupled from R, it is possible to find an l-qubit subsystem of S Q in a state approximately pure. Note that the global state of S Q R is still pure. Supplementary Lemma III.4. Consider a system, (S S ) Q R, in a pure state, such that the l -qubit system S is δ -decoupled from R. There is an l -qubit subsystem P S Q such that the joint state of S P is δ -close to a fully entangled state. Proof. In a first step we assume that the state of S is perfectly decoupled from R (δ = 0). We can expand it as S l/ ρ R = l/ k k k S i λ i i i R. We can find systems A and A that purify ρ S and ρ R respectively. The composite system A A purifies ρ S ρ R, φ = φ SA φ RA = l/4 k k S k A i λi i R i A. The statement for δ = 0 follows from the fact that any two purifications of the same state are related by a unitary transformation on the purifying system. In particular, P is given as the image of A under this unitary. The claim for strictly positive δ follows similarly, using Uhlmann s theorem and properties of the trace distance [34, Lem. 6]. IV. WORK EXTRACTION Here we describe a process, similar to [, 6], that allows us to extract energy from a heat bath, given a system in a pure state, as illustrated in Fig.. We assume a setting where we can raise or lower energy levels of the system arbitrarily, i.e., we can change the energy E n of each level, n, into a new value E n. If the system is in level n we define the work gain of this operation as the difference E n E n, where we implicitly assume that this energy is added to a system that stores useful energy, i.e., the battery. To model the thermalization by a temperature T heat bath, we put the system in the Gibbs state corresponding to the given energies E n. In the context of the erasure process described in Supplementary Theorem I. we use this work-extraction scheme on system S P. This system is approximately in a pure state, as shown in Section III B. Note that since the Hamiltonian of S Q is assumed to be fully degenerate, it follows that the subsystem S P also has a well-defined and fully degenerate Hamiltonian. Hence, we can apply the following theorem. Supplementary Theorem IV.. Given an l-qubit system, with a fully degenerate Hamiltonian, in a pure state, there is a process at temperature T that extracts l kt ln of work. This process leaves the system in the maximally mixed state, and the final Hamiltonian is the same as the initial. Proof. If φ 0 is the initial state of the system, we extend it to an orthonormal basis { φ j } N j=0, where N =l. Since the initial Hamiltonian is fully degenerate, all the states { φ j } are energy eigenstates. We start by lifting all the energy levels,...,n to a high value E (Fig. a). This operation has no energy cost. Next we thermalize the system, which puts it in its temperature T Gibbs state. After this, the probability to find the system in one of the raised levels,...,n is p(e ) = [ + e β(e E 0) /N ]. We next lower the levels,...,n 5

6 Battery Battery Battery a b l k T ln c E 0 E 0 E 0 Heat bath T Heat bath T Heat bath T FIG. : Extracting work from a l-qubit system in a pure state. This process can be seen as the reverse of erasure. a) Only one state is occupied, at energy E 0; the energy of the empty levels is raised to a very high value at zero cost. b) We couple the system to the bath and slowly decrease the energy of the empty states. These will become gradually populated according to the Gibbs distribution. Lowering the partially occupied states results in energy gain of l kt ln in total. This energy is stored in the battery. c) In the end of the procedure, the Hamiltonian of the system is fully degenerate and the state is maximally mixed. by a small step. With probability p(e ) this yields a work gain of (Fig. b). If we repeat this we gain work with probability p(e ). This procedure is repeated until all levels,...,n are back at energy E 0. With a final thermalization, the state becomes maximally mixed (Fig. c). Furthermore, since all the levels are back at their original energy E 0, the final Hamiltonian is the same as the initial. In the limit 0 and E +, this process yields the average work gain E E lim p(e)de = lim de E E E 0 E 0 + eβ(e E 0 ) N = l kt ln. Assuming independence between the work gain in each small step,, one can show that the fluctuations around this average vanish in the limit 0. The process described in Supplementary Theorem IV. takes a system from a pure to a fully mixed state, extracting work. By inverting this process, one can bring a system from a fully mixed to a pure state in other words, erase the system. Supplementary Corollary IV.. Given an l-qubit system, with a fully degenerate Hamiltonian, in a fully mixed state, there exists a process at temperature T, which for a work cost of l kt ln takes the system to a pure state, with the final Hamiltonian the same as the initial. When compressing information between the system and the memory, we allowed the state created to be at most δ-distant from a pure state (Section III). The following lemma shows how that affects the probability of failure of the work-extraction procedure. Supplementary Lemma IV.3. If the process described in Supplementary Theorem IV. is applied to a state that is δ-close to a pure state, it succeeds with probability at least δ. Proof. Consider the following setting: we are given one of two possible states, ρ and σ, with equal probability, and have to guess which of them we have. We are allowed to apply any physical process to the state, such as a measurement after a unitary evolution. The probability of successfully distinguishing the states is upperbounded by P (ρ, σ) = [ + D(ρ, σ)], where D(ρ, σ) is the trace distance between those states [40, Theorem. 9.]. To prove Supplementary Lemma IV.3, let σ be thepure state we expected, and ρ be δ-close to σ. An example of a process to distinguish two states is the work-extraction procedure described in Supplementary Theorem IV.. If the process is applied to the expected pure state, σ, the probability of error is zero and the quantity of work extracted is l kt ln. We denote the probability of failure of the work-extraction process for an arbitrary state, ρ, by p ρ. Our guessing strategy is the following. We apply the work-extraction process from Supplementary Theorem IV.. If we obtain an amount of work less than l kt ln, we know that the state was ρ, and say so. This happens with probability p ρ /. On the other hand, if we extract work l kt ln, we should say we had state σ: the probability that we extract all the work and had ρ is only ( p ρ )/, while the probability of having σ (and extracting the same amount) is /. In total, we will be right with probability [ + p ρ]. This guessing probability is upper bounded by P (ρ, σ), so p ρ D(σ, ρ). Since we imposed a maximum distance δ between the pure state σ and ρ, the probability of failure of the process is at most δ. 6

7 V. ERASURE IN THE PERIOD-FINDING ALGORITHM In this section we demonstrate with a simple toy example that certain quantum algorithms can be made more thermodynamically efficient by a judicious application of memory erasure. A. The period-finding algorithm Given a function f as an input, a quantum computer can efficiently find the period of the function, i.e., the smallest number r such that f(x + r) =f(x) for all x (where x and r are assumed to be integers, and f to be integer valued). This seemingly innocent task has an important role, e.g., via order-finding in Shor s famous algorithm for efficient factoring [4]. In the following we give a brief account of a few pertinent aspects of the period finding algorithm. For more details the reader is referred to [40]. In the quantum computer the number x, regarded as a bit-string x = x n x 0, is represented as a computational basis state x = x n x 0 of a corresponding collection of qubits. Given a register X in state x X, and a register F in state 0 F, it is assumed that there exists a sub-routine (an oracle ) that can transform all states x X 0 F into x X f(x) F coherently. In other words, given x in register X, the value of the function, f(x), is put in register F. The first step of the period-finding algorithm is what we will refer to as a coherent evaluation of the function f, where the above operation is applied to a superposition of all possible inputs n x x X 0 F f = n x X f(x) F. (V.) The period-finding algorithm next proceeds by a clever choice of operations and measurements to extract the period of the function. We will refer to this as the periodextraction step of the the protocol. The details of the period-extraction procedure are irrelevant for our purposes. We only use the fact that the register F is not needed in any of the subsequent steps of the protocol. All the remaining operations and measurements can be done on register X alone, and register F can be discarded right after state ψ f has been formed. This may at first sight seem paradoxical, but the role of register F is to group all x that are mapped to the same value f(x) into a coherent superposition, while the coherence is destroyed between those groups. This can be seen from ψ f = n/ y ( x:f(x)=y x X) y F. According to our main result there exists a process that erases register F at the work cost H(F X) kt ln this conditional entropy is negative since X and F are entangled, so we would gain work. However, if we want to make such an erasure process part of the algorithm, x it must itself be computationally efficient, including an efficient description of the state to be erased. When thus restricting ourselves to efficient algorithms, we can reasonably only hope to achieve a part of the above work yield. In the following, we illustrate such partial work extraction with a toy example. The idea is to identify parts of the register F that are highly correlated with parts of register X, such that the state of these parts admits an efficient description, which in our case is even independent of the input, i.e., the function f. B. A toy example It is common to have some a priori information on the likelihood of the various inputs to a computational process. 3 Suppose, e.g., that we have the promise that with probability p the function f has a special dependence on the parity of the input, while with probability p it is arbitrary (and in both cases we assume they are drawn from some suitable ensembles of periodic functions). To specify the above-mentioned promise on f, note that a bit string can be decomposed as x = ( x, x 0 ), where x = x/, and where x 0 = x mod is the least significant bit, i.e., x 0 is 0 whenever x is even, and when x is odd. We then assume that with probability p there exists a function f such that f( x, x 0 )=( f( x),x 0 ). In particular, f maps even numbers to even numbers, and odd to odd. The coherent evaluation of such a function yields ψ f = n = n = x X f(x) F x x n x 0=0, x X x 0 X0 f( x) F x 0 F0 x X f( x) F x ( 0 X0 0 F0 + X0 F0 ). We thus find that the least significant qubits X 0 and F 0 of registers X and F are in the maximally entangled state χ = ( 00 + ). However, we also have to take into account that we get an arbitrary periodic function with probability p. As one intuitively may suspect, the reduced state of X 0 F 0 is to a good approximation close to the maximally mixed state when averaged over a sufficiently random ensemble of functions. 4 Hence, after the 3 Such a promise may be obtained simply by statistical analysis of the inputs, or by theoretical considerations. For example, if an overlying factoring algorithm is used to break cryptographic keys, the distribution of the inputs to the period finding algorithm can be inferred from the specification of the key generation scheme. 4 We can decompose the value of an arbitrary function as 7

8 coherent evaluation, the reduced state of the two qubits X 0 F 0 is the computer stores the output. The final state of these registers after the execution of the algorithm is ρ X0F 0 = p χ χ + ( p) 4 X 0F 0. ρ IO = f p f f f I output(f) output(f) O We have thus found a correlated state with a computationally trivial description (it is even independent of the input f). If we now consider the work cost of erasure in the iid limit 5 of erasing qubit F 0 conditioned on X 0 we find it to be proportional to (ideally, output(f) is the period of f). We want to make sure that if we insert an erasure procedure in the algorithm, as described here, the final state is not affected. To see that this is indeed the case, consider the state of the input register I and the two computer registers XF right before the erasure procedure, H(F 0 X 0 )= 4 ( + 3p) log ( + 3p) ρ IXF = f p f f f I ψ f ψ f XF, (V.) 3 4 ( p) log ( p). This is a monotonically decreasing function in p, which for sufficiently large p is negative (e.g., for p =3/4) and thus corresponds to a work gain in the erasure of F 0. C. The role of the information preservation condition The information preservation condition is crucial for the erasure process to maintain the correlations between the inputs and outputs of the computation. To see what we mean by this, imagine that we run the period finding algorithm over an ensemble of input functions, each with probability p f, storing the input f in an extra memory I. Similarly, we can imagine an output register O, where where ψ f is as defined in equation V.. The period extraction procedure can be described as a channel Φ X acting on register X alone, with an output in O. The joint state of the input and output memories can thus be written ρ IO =(I I Φ X )(Tr F ρ IXF ), (V.3) where the partial trace Tr F denotes that we have discarded register F (or simply ignored it), and I I denotes the identity channel on register I. An erasure of F (or a part of F ) conditioned on X (or a part of X) leads to a new state ρ IXF. However, by the information preservation condition, it follows that Tr F ρ IXF = Tr F ρ IXF. Note that I, and whatever parts of X and F that do not take part in the erasure, together with a purifying system, take the role of the reference. Hence, the state ρ IO, generated by the period extraction, is left unaffected. ( f( x, x0 ),f 0 ( x, x 0 ) ), where f 0 ( x, x 0 ) is the least significant bit of f( x, x 0 ). If the function f is picked with probability q f, the density operator of registers XF, after the coherent evaluation, is σ XF = f q f ψ f ψ f. It can be shown that the reduced density operator σ X0 F 0 = Tr X F σ XF is bounded as σ X0 F 0 4 w0 + w + q, where w 0 = (n ) x f 0 ( x, 0) f w = x (n ) f 0 ( x, ), f and q = (n ) { x : f( x, ) = f( x, } 0). f As an example, if we pick f uniformly over all functions f : {0, } n {0, } s, then w 0 = w =/, and q =/ s, i.e., the distance to the maximally mixed state is exponentially small in the number of bits in the output. 5 This application of the iid limit means that we run the computer on several independent inputs and apply the erasure jointly on all registers. While this iid consideration gives bounds that hold asymptotically, better estimates, for a finite number of runs, can be obtained using our one-shot bound., 8

9 [] Leff, H. S. & Rex, A. F. Maxwell s demon: Entropy, information, computing (Taylor and Francis, 990). [] Leff, H. S. & Rex, A. F. Maxwell s demon : Entropy, classical and quantum information, computing (Taylor and Francis, 00). [3] Plenio, M. B. & Vitelli, V. The physics of forgetting: Landauer s erasure principle and information theory. Contemporary Physics 4, 5 60 (00). [4] Maruyama, K., Nori, F. & Vedral, V. Colloquium: The physics of Maxwell s demon and information. Reviews of Modern Physics 8, 3 (009). [5] Earman, J. & Norton, J. D. Exorcist XIV: The wrath of Maxwell s demon. part i. from Maxwell to Szilard. Studies in the History and Philosophy of Modern Physics 9, (998). [6] Earman, J. & Norton, J. D. Exorcist XIV: The wrath of Maxwell s demon. Part II. from Szilard to Landauer and beyond. Studies in the History and Philosophy of Modern Physics 30, 40 (999). [7] Bub, J. Maxwell s demon and the thermodynamics of computation. Studies in History and Philosophy of Modern Physics 3, (00). [8] Bennett, C. H. Notes on Landauer s principle, reversible computation and Maxwell s demon. Studies in History and Philosophy of Modern Physics 34, (003). [9] Landauer, R. Dissipation and heat generation in the computing process. IBM Journal of Research and Development 5, (96). [0] Szilard, L. Über die Entropieverminderung in einem thermodynamischen System bei Eingriffen intelligenter Wesen. Zeitschrift für Physik 53, (99). [] Shizume, K. Heat generation required by information erasure. Physical Review E 5, (995). [] Piechocinska, B. Information erasure. Physical Review A 6, 0634 (000). [3] Janzing, D., Wocjan, P., Zeier, R., Geiss, R. & Beth, T. Thermodynamic cost of reliability and low temperatures: Tightening Landauer s principle and the second law. International Journal of Theoretical Physics 39, (000). [4] Parrondo, J. M. R. The Szilard engine revisited: Entropy, macroscopic randomness, and symmetry breaking phase transitions. Chaos, (00). [5] Allahverdyan, A. E., Balian, R. & Nieuwenhizen, T. I. M. Maximal work extractions from finite quantum systems. Europhysics Letters 67, (004). [6] Alicki, R., Horodecki, M., Horodecki, P. & Horodecki, R. Thermodynamics of quantum information systems Hamiltonian description. Open Systems & Information Dynamics, 05 7 (004). [7] Maroney, O. J. E. Generalizing Landauer s principle. Physical Review E 79, 0305 (009). [8] Hilt, S., Shabbir, S., Anders, J. & Lutz, E. Validity of Landauer s principle in the quantum regime (00). URL [9] Dahlsten, O., Renner, R., Rieper, E. & Vedral, V. The work value of information (009). URL org/abs/ v. [0] Oppenheim, J., Horodecki, M., Horodecki, P. & Horodecki, R. Thermodynamical approach to quantifying quantum correlations. Physical Review Letters 89, 8040 (00). [] Zurek, W. H. Quantum discord and Maxwell s demons. Physical Review A 67, 030 (003). [] Jennings, D. & Rudolph, T. Entanglement and the thermodynamic arrow of time. Physical Review E 8, 630 (00). [3] Renner, R. Security of quantum key distribution. Ph.D. thesis, ETH Zurich (005). URL abs/quant-ph/0558. [4] Lieb, E. H. & Ruskai, M. B. A fundamental property of quantum-mechanical entropy. Physical Review Letters 30, (973). [5] Lieb, E. H. Convex trace functions and the Wigner- Yanase-Dyson conjecture. Advances in Mathematics, (973). [6] Lieb, E. H. & Ruskai, M. B. Proof of the strong subadditivity of quantum-mechanical entropy. Journal of Mathematical Physics 4, (973). [7] Cover, T. M. & Thomas, J. A. Elements of Information Theory. Wiley Series in Telecommunications (Wiley- Interscience, 00). [8] Schoenmakers, B., Tjoelker, J., Tuyls, P. & Verbitskiy, E. Smooth Rényi entropy of ergodic quantum information sources (007). URL [9] Bjelaković, I., Krüger, T., Siegmund-Schultze, R. & Szko la, A. The Shannon-McMillan theorem for ergodic quantum lattice systems. Inventiones Mathematicae 55, 03 (004). [30] Jaynes, E. T. Gibbs vs Boltzmann entropies. American Journal of Physics 33, (965). [3] Renes, J. M. & Renner, R. One-shot classical data compression with quantum side information and the distillation of common randomness or secret keys (00). URL [3] König, R., Renner, R. & Schaffner, C. The operational meaning of min- and max-entropy. IEEE Transactions on Information Theory 55, (009). [33] Datta, N. & Renner, R. Smooth Rényi entropies and the quantum information spectrum. IEEE Transactions on information theory 55, (009). [34] Tomamichel, M., Colbeck, R. & Renner, R. Duality between smooth min- and max-entropies. IEEE Transactions on information theory 56, (00). [35] Renner, R. Symmetry of large physical systems implies independence of subsystems. Nature Physics 3, (007). [36] Tomamichel, M., Colbeck, R. & Renner, R. A fully quantum asymptotic equipartition property. IEEE Transactions on information theory 55, (009). [37] Horodecki, M., Oppenheim, J. & Winter, A. Partial quantum information. Nature 436, (005). [38] Dupuis, F. The decoupling approach to quantum information theory. Ph.D. thesis, Université de Montréal (009). URL [39] Dupuis, F., Berta, M., Wullschleger, J. & Renner, R. The decoupling theorem (00). URL org/abs/ [40] Nielsen, M. L. & Chuang, I. L. Quantum Computation and Quantum Information (Cambridge University Press, 000). [4] Shor, P. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 6, (997). 9

arxiv: v2 [quant-ph] 27 Jun 2011

arxiv: v2 [quant-ph] 27 Jun 2011 The thermodynamic meaning of negative entropy Lídia del Rio, 1 Johan Åberg, 1 Renato Renner, 1 Oscar Dahlsten, 1, 2, 3 and Vlatko Vedral 2, 3 1 Institute for Theoretical Physics, ETH Zurich, Switzerland.

More information

Fundamental work cost of quantum processes

Fundamental work cost of quantum processes 1607.03104 1709.00506 Fundamental work cost of quantum processes Philippe Faist 1,2, Renato Renner 1 1 Institute for Theoretical Physics, ETH Zurich 2 Institute for Quantum Information and Matter, Caltech

More information

Quantum Thermodynamics

Quantum Thermodynamics Quantum Thermodynamics In this chapter we wish to give some insights to quantum thermodynamics. It can be seen as an introduction to the topic, however not a broad one but rather an introduction by examples.

More information

The first law of general quantum resource theories

The first law of general quantum resource theories The first law of general quantum resource theories Carlo Sparaciari 1, Lídia del Rio 2, Carlo Maria Scandolo 3, Philippe Faist 4, and Jonathan Oppenheim 1 1 Department of Physics and Astronomy, University

More information

Quantum thermodynamics

Quantum thermodynamics Quantum thermodynamics a primer for the curious quantum mechanic Lídia del Rio, ETH Zurich QIP 2017 Seattle This talk is licensed under a Creative Commons Attribution 4.0 International License. Why quantum

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

ACENTRAL goal of information theory is the (quantitative)

ACENTRAL goal of information theory is the (quantitative) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 4337 The Operational Meaning of Min- and Max-Entropy Robert König, Renato Renner, and Christian Schaffner Abstract In this paper,

More information

Classical and Quantum Channel Simulations

Classical and Quantum Channel Simulations Classical and Quantum Channel Simulations Mario Berta (based on joint work with Fernando Brandão, Matthias Christandl, Renato Renner, Joseph Renes, Stephanie Wehner, Mark Wilde) Outline Classical Shannon

More information

Compression and entanglement, entanglement transformations

Compression and entanglement, entanglement transformations PHYSICS 491: Symmetry and Quantum Information April 27, 2017 Compression and entanglement, entanglement transformations Lecture 8 Michael Walter, Stanford University These lecture notes are not proof-read

More information

Efficient achievability for quantum protocols using decoupling theorems

Efficient achievability for quantum protocols using decoupling theorems Efficient achievability for quantum protocols using decoupling theorems Christoph Hirche and Ciara Morgan Institut für Theoretische Physik Leibniz Universität Hannover Appelstraße, D-3067 Hannover, Germany

More information

arxiv: v1 [quant-ph] 3 Jan 2008

arxiv: v1 [quant-ph] 3 Jan 2008 A paradigm for entanglement theory based on quantum communication Jonathan Oppenheim 1 1 Department of Applied Mathematics and Theoretical Physics, University of Cambridge U.K. arxiv:0801.0458v1 [quant-ph]

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION SUPPLEMENTARY INFORMATION doi: 0.038/nPHYS734 Supplementary Information The Uncertainty Principle in the Presence of Quantum Memory Mario Berta,, 2 Matthias Christandl,, 2 Roger Colbeck, 3,, 4 Joseph M.

More information

Multiplicativity of Maximal p Norms in Werner Holevo Channels for 1 < p 2

Multiplicativity of Maximal p Norms in Werner Holevo Channels for 1 < p 2 Multiplicativity of Maximal p Norms in Werner Holevo Channels for 1 < p 2 arxiv:quant-ph/0410063v1 8 Oct 2004 Nilanjana Datta Statistical Laboratory Centre for Mathematical Sciences University of Cambridge

More information

The Quantum Reverse Shannon Theorem Based on One-Shot Information Theory

The Quantum Reverse Shannon Theorem Based on One-Shot Information Theory Commun. Math. Phys. 306, 579 65 (0) Digital Object Identifier (DOI) 0.007/s000-0-309-7 Communications in Mathematical Physics The Quantum Reverse Shannon Theorem Based on One-Shot Information Theory Mario

More information

Entropy in Classical and Quantum Information Theory

Entropy in Classical and Quantum Information Theory Entropy in Classical and Quantum Information Theory William Fedus Physics Department, University of California, San Diego. Entropy is a central concept in both classical and quantum information theory,

More information

Lecture 11: Quantum Information III - Source Coding

Lecture 11: Quantum Information III - Source Coding CSCI5370 Quantum Computing November 25, 203 Lecture : Quantum Information III - Source Coding Lecturer: Shengyu Zhang Scribe: Hing Yin Tsang. Holevo s bound Suppose Alice has an information source X that

More information

Entanglement: concept, measures and open problems

Entanglement: concept, measures and open problems Entanglement: concept, measures and open problems Division of Mathematical Physics Lund University June 2013 Project in Quantum information. Supervisor: Peter Samuelsson Outline 1 Motivation for study

More information

The (absence of a) relationship between thermodynamic and logical reversibility

The (absence of a) relationship between thermodynamic and logical reversibility The (absence of a) relationship between thermodynamic and logical reversibility arxiv:physics/0406137v1 [physics.hist-ph] 27 Jun 2004 O J E Maroney Imperial College London Physics Department The Blackett

More information

PERFECTLY secure key agreement has been studied recently

PERFECTLY secure key agreement has been studied recently IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract

More information

A Holevo-type bound for a Hilbert Schmidt distance measure

A Holevo-type bound for a Hilbert Schmidt distance measure Journal of Quantum Information Science, 205, *,** Published Online **** 204 in SciRes. http://www.scirp.org/journal/**** http://dx.doi.org/0.4236/****.204.***** A Holevo-type bound for a Hilbert Schmidt

More information

Landauer s principle in the quantum domain

Landauer s principle in the quantum domain Landauer s principle in the quantum domain Janet Anders Dept of Physics & Astronomy University College London London WC1E 6BT, UK j.anders@ucl.ac.uk Saroosh Shabbir Stefanie Hilt Department of Physics

More information

Converse bounds for private communication over quantum channels

Converse bounds for private communication over quantum channels Converse bounds for private communication over quantum channels Mark M. Wilde (LSU) joint work with Mario Berta (Caltech) and Marco Tomamichel ( Univ. Sydney + Univ. of Technology, Sydney ) arxiv:1602.08898

More information

Universal recoverability in quantum information theory

Universal recoverability in quantum information theory Universal recoverability in quantum information theory Mark M. Wilde Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Center for Computation and Technology, Louisiana State

More information

Ensembles and incomplete information

Ensembles and incomplete information p. 1/32 Ensembles and incomplete information So far in this course, we have described quantum systems by states that are normalized vectors in a complex Hilbert space. This works so long as (a) the system

More information

Strong converse theorems using Rényi entropies

Strong converse theorems using Rényi entropies Strong converse theorems using Rényi entropies Felix Leditzky joint work with Mark M. Wilde and Nilanjana Datta arxiv:1506.02635 5 January 2016 Table of Contents 1 Weak vs. strong converse 2 Rényi entropies

More information

Lecture 4 Chiu Yuen Koo Nikolai Yakovenko. 1 Summary. 2 Hybrid Encryption. CMSC 858K Advanced Topics in Cryptography February 5, 2004

Lecture 4 Chiu Yuen Koo Nikolai Yakovenko. 1 Summary. 2 Hybrid Encryption. CMSC 858K Advanced Topics in Cryptography February 5, 2004 CMSC 858K Advanced Topics in Cryptography February 5, 2004 Lecturer: Jonathan Katz Lecture 4 Scribe(s): Chiu Yuen Koo Nikolai Yakovenko Jeffrey Blank 1 Summary The focus of this lecture is efficient public-key

More information

Lecture 6: Quantum error correction and quantum capacity

Lecture 6: Quantum error correction and quantum capacity Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem

More information

6.1 Main properties of Shannon entropy. Let X be a random variable taking values x in some alphabet with probabilities.

6.1 Main properties of Shannon entropy. Let X be a random variable taking values x in some alphabet with probabilities. Chapter 6 Quantum entropy There is a notion of entropy which quantifies the amount of uncertainty contained in an ensemble of Qbits. This is the von Neumann entropy that we introduce in this chapter. In

More information

DEMONS: MAXWELL S DEMON, SZILARD S ENGINE AND LANDAUER S ERASURE DISSIPATION

DEMONS: MAXWELL S DEMON, SZILARD S ENGINE AND LANDAUER S ERASURE DISSIPATION In: Proceedings of the first conference on Hot Topics in Physical Informatics (HoTPI, 2013 November). Paper is in press at International Journal of Modern Physics: Conference Series (2014). DEMONS: MAXWELL

More information

arxiv: v4 [quant-ph] 28 Oct 2009

arxiv: v4 [quant-ph] 28 Oct 2009 Max- Relative Entropy of Entanglement, alias Log Robustness arxiv:0807.2536v4 [quant-ph] 28 Oct 2009 Nilanjana Datta, Statistical Laboratory, DPMMS, University of Cambridge, Cambridge CB3 0WB, UK (Dated:

More information

Lecture 19 October 28, 2015

Lecture 19 October 28, 2015 PHYS 7895: Quantum Information Theory Fall 2015 Prof. Mark M. Wilde Lecture 19 October 28, 2015 Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

Recoverability in quantum information theory

Recoverability in quantum information theory Recoverability in quantum information theory Mark M. Wilde Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Center for Computation and Technology, Louisiana State University,

More information

Quantum algorithms for computing short discrete logarithms and factoring RSA integers

Quantum algorithms for computing short discrete logarithms and factoring RSA integers Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short

More information

to mere bit flips) may affect the transmission.

to mere bit flips) may affect the transmission. 5 VII. QUANTUM INFORMATION THEORY to mere bit flips) may affect the transmission. A. Introduction B. A few bits of classical information theory Information theory has developed over the past five or six

More information

Single-shot Quantum State Merging

Single-shot Quantum State Merging ETH ZICH arxiv:0912.4495v1 [quant-ph] 22 Dec 2009 Single-shot Quantum State Merging by Mario Berta A Diploma thesis submitted to the Institute for Theorectical Physics Department of Physics Supervisor

More information

Coherence, Discord, and Entanglement: Activating one resource into another and beyond

Coherence, Discord, and Entanglement: Activating one resource into another and beyond 586. WE-Heraeus-Seminar Quantum Correlations beyond Entanglement Coherence, Discord, and Entanglement: Activating one resource into another and beyond Gerardo School of Mathematical Sciences The University

More information

On the query complexity of counterfeiting quantum money

On the query complexity of counterfeiting quantum money On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum

More information

Gerardo Adesso. Davide Girolami. Alessio Serafini. University of Nottingham. University of Nottingham. University College London

Gerardo Adesso. Davide Girolami. Alessio Serafini. University of Nottingham. University of Nottingham. University College London Gerardo Adesso University of Nottingham Davide Girolami University of Nottingham Alessio Serafini University College London arxiv:1203.5116; Phys. Rev. Lett. (in press) A family of useful additive entropies

More information

Entropic Formulation of Heisenberg s Measurement-Disturbance Relation

Entropic Formulation of Heisenberg s Measurement-Disturbance Relation Entropic Formulation of Heisenberg s Measurement-Disturbance Relation arxiv:1311.7637 QPL 2014, Kyoto, 6. June 2014 Fabian Furrer Joint work with: Patrick Coles @ Different Uncertainty Trade-Offs Uncertainty

More information

Quantum Entanglement- Fundamental Aspects

Quantum Entanglement- Fundamental Aspects Quantum Entanglement- Fundamental Aspects Debasis Sarkar Department of Applied Mathematics, University of Calcutta, 92, A.P.C. Road, Kolkata- 700009, India Abstract Entanglement is one of the most useful

More information

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36 QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

Time Reversal and Exchange Symmetries of Unitary Gate Capacities

Time Reversal and Exchange Symmetries of Unitary Gate Capacities Time Reversal and Exchange Symmetries of Unitary Gate Capacities The MIT Faculty has made this article openly available Please share how this access benefits you Your story matters Citation As Published

More information

An Introduction to Quantum Computation and Quantum Information

An Introduction to Quantum Computation and Quantum Information An to and Graduate Group in Applied Math University of California, Davis March 13, 009 A bit of history Benioff 198 : First paper published mentioning quantum computing Feynman 198 : Use a quantum computer

More information

arxiv: v3 [quant-ph] 5 Jun 2015

arxiv: v3 [quant-ph] 5 Jun 2015 Entanglement and swap of quantum states in two qubits Takaya Ikuto and Satoshi Ishizaka Graduate School of Integrated Arts and Sciences, Hiroshima University, Higashihiroshima, 739-8521, Japan (Dated:

More information

The Uncertainty Principle in the Presence of Quantum Memory

The Uncertainty Principle in the Presence of Quantum Memory The Uncertainty Principle in the Presence of Quantum Memory Mario Berta,, 2 Matthias Christandl,, 2 Roger Colbeck, 3,, 4 Joseph M. Renes, 5 and Renato Renner Institute for Theoretical Physics, ETH Zurich,

More information

Verschränkung versus Stosszahlansatz: The second law rests on low correlation levels in our cosmic neighborhood

Verschränkung versus Stosszahlansatz: The second law rests on low correlation levels in our cosmic neighborhood Verschränkung versus Stosszahlansatz: The second law rests on low correlation levels in our cosmic neighborhood Talk presented at the 2012 Anacapa Society Meeting Hamline University, Saint Paul, Minnesota

More information

Quantum to Classical Randomness Extractors

Quantum to Classical Randomness Extractors Quantum to Classical Randomness Extractors Mario Berta, Omar Fawzi, Stephanie Wehner - Full version preprint available at arxiv: 1111.2026v3 08/23/2012 - CRYPTO University of California, Santa Barbara

More information

Schur-Weyl duality, quantum data compression, tomography

Schur-Weyl duality, quantum data compression, tomography PHYSICS 491: Symmetry and Quantum Information April 25, 2017 Schur-Weyl duality, quantum data compression, tomography Lecture 7 Michael Walter, Stanford University These lecture notes are not proof-read

More information

Asymptotic redundancy and prolixity

Asymptotic redundancy and prolixity Asymptotic redundancy and prolixity Yuval Dagan, Yuval Filmus, and Shay Moran April 6, 2017 Abstract Gallager (1978) considered the worst-case redundancy of Huffman codes as the maximum probability tends

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Entanglement Manipulation

Entanglement Manipulation Entanglement Manipulation Steven T. Flammia 1 1 Perimeter Institute for Theoretical Physics, Waterloo, Ontario, N2L 2Y5 Canada (Dated: 22 March 2010) These are notes for my RIT tutorial lecture at the

More information

Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions

Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions Password Cracking: The Effect of Bias on the Average Guesswork of Hash Functions Yair Yona, and Suhas Diggavi, Fellow, IEEE Abstract arxiv:608.0232v4 [cs.cr] Jan 207 In this work we analyze the average

More information

Entropy Accumulation in Device-independent Protocols

Entropy Accumulation in Device-independent Protocols Entropy Accumulation in Device-independent Protocols QIP17 Seattle January 19, 2017 arxiv: 1607.01796 & 1607.01797 Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick Outline

More information

arxiv:quant-ph/ v1 21 Feb 2002

arxiv:quant-ph/ v1 21 Feb 2002 QUANTUM DISCORD AND MAXWELL S DEMONS Wojciech Hubert Zurek Theory Division, T-6, MS B288, LANL, Los Alamos, NM87545 Abstract arxiv:quant-ph/0202123v1 21 Feb 2002 Quantum discord was proposed as an information

More information

Sending Quantum Information with Zero Capacity Channels

Sending Quantum Information with Zero Capacity Channels Sending Quantum Information with Zero Capacity Channels Graeme Smith IM Research KITP Quantum Information Science Program November 5, 2009 Joint work with Jon and John Noisy Channel Capacity X N Y p(y

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

Combinatorial Criteria for Uniqueness of Gibbs Measures

Combinatorial Criteria for Uniqueness of Gibbs Measures Combinatorial Criteria for Uniqueness of Gibbs Measures Dror Weitz* School of Mathematics, Institute for Advanced Study, Princeton, New Jersey 08540; e-mail: dror@ias.edu Received 17 November 2003; accepted

More information

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 Lecturer: Dr. Mark Tame Introduction With the emergence of new types of information, in this case

More information

Entropy and Ergodic Theory Notes 21: The entropy rate of a stationary process

Entropy and Ergodic Theory Notes 21: The entropy rate of a stationary process Entropy and Ergodic Theory Notes 21: The entropy rate of a stationary process 1 Sources with memory In information theory, a stationary stochastic processes pξ n q npz taking values in some finite alphabet

More information

Valerio Cappellini. References

Valerio Cappellini. References CETER FOR THEORETICAL PHYSICS OF THE POLISH ACADEMY OF SCIECES WARSAW, POLAD RADOM DESITY MATRICES AD THEIR DETERMIATS 4 30 SEPTEMBER 5 TH SFB TR 1 MEETIG OF 006 I PRZEGORZAłY KRAKÓW Valerio Cappellini

More information

Nullity of Measurement-induced Nonlocality. Yu Guo

Nullity of Measurement-induced Nonlocality. Yu Guo Jul. 18-22, 2011, at Taiyuan. Nullity of Measurement-induced Nonlocality Yu Guo (Joint work with Pro. Jinchuan Hou) 1 1 27 Department of Mathematics Shanxi Datong University Datong, China guoyu3@yahoo.com.cn

More information

1. Basic rules of quantum mechanics

1. Basic rules of quantum mechanics 1. Basic rules of quantum mechanics How to describe the states of an ideally controlled system? How to describe changes in an ideally controlled system? How to describe measurements on an ideally controlled

More information

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Coherence of Assistance and Regularized Coherence of Assistance by Ming-Jing Zhao, Teng Ma, and Shao-Ming Fei Preprint no.: 14 2018

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

THE fundamental physical resource for performing various

THE fundamental physical resource for performing various IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 8, AUGUST 2003 1895 On the Capacities of Bipartite Hamiltonians Unitary Gates Charles H Bennett, Aram W Harrow, Debbie W Leung, John A Smolin Abstract

More information

Squashed entanglement

Squashed entanglement Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication

More information

Lecture 11 September 30, 2015

Lecture 11 September 30, 2015 PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

04. Information and Maxwell's Demon. I. Dilemma for Information-Theoretic Exorcisms.

04. Information and Maxwell's Demon. I. Dilemma for Information-Theoretic Exorcisms. 04. Information and Maxwell's Demon. I. Dilemma for Information-Theoretic Exorcisms. Two Options: (S) (Sound). The combination of object system and demon forms a canonical thermal system. (P) (Profound).

More information

Basic Notions of Entropy and Entanglement

Basic Notions of Entropy and Entanglement Basic Notions of Entropy and Entanglement Frank Wilczek Center for Theoretical Physics, MIT, Cambridge MA 02139 USA March 3, 2014 Abstract Entropy is a nineteenth-century invention, with origins in such

More information

arxiv:cond-mat/ v2 [cond-mat.stat-mech] 25 Sep 2000

arxiv:cond-mat/ v2 [cond-mat.stat-mech] 25 Sep 2000 technical note, cond-mat/0009244 arxiv:cond-mat/0009244v2 [cond-mat.stat-mech] 25 Sep 2000 Jarzynski Relations for Quantum Systems and Some Applications Hal Tasaki 1 1 Introduction In a series of papers

More information

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector 1 Query model In the quantum query model we wish to compute some function f and we access the input through queries. The complexity of f is the number of queries needed to compute f on a worst-case input

More information

Quantum computation: a tutorial

Quantum computation: a tutorial Quantum computation: a tutorial Samuel L. Braunstein Abstract: Imagine a computer whose memory is exponentially larger than its apparent physical size; a computer that can manipulate an exponential set

More information

A Quantum Carnot Engine in Three-Dimensions

A Quantum Carnot Engine in Three-Dimensions Adv. Studies Theor. Phys., Vol. 8, 2014, no. 14, 627-633 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2014.4568 A Quantum Carnot Engine in Three-Dimensions Paul Bracken Department of Mathematics

More information

Semidefinite programming strong converse bounds for quantum channel capacities

Semidefinite programming strong converse bounds for quantum channel capacities Semidefinite programming strong converse bounds for quantum channel capacities Xin Wang UTS: Centre for Quantum Software and Information Joint work with Runyao Duan and Wei Xie arxiv:1610.06381 & 1601.06888

More information

Maximal Entanglement A New Measure of Entanglement

Maximal Entanglement A New Measure of Entanglement 1 Maximal Entanglement A New Measure of Entanglement Salman Beigi School of Mathematics, Institute for Research in Fundamental Sciences IPM, Tehran, Iran arxiv:1405.50v1 [quant-ph] 11 May 014 Abstract

More information

Lecture 4: Purifications and fidelity

Lecture 4: Purifications and fidelity CS 766/QIC 820 Theory of Quantum Information (Fall 2011) Lecture 4: Purifications and fidelity Throughout this lecture we will be discussing pairs of registers of the form (X, Y), and the relationships

More information

Information and Physics Landauer Principle and Beyond

Information and Physics Landauer Principle and Beyond Information and Physics Landauer Principle and Beyond Ryoichi Kawai Department of Physics University of Alabama at Birmingham Maxwell Demon Lerner, 975 Landauer principle Ralf Landauer (929-999) Computational

More information

An Introduction To Resource Theories (Example: Nonuniformity Theory)

An Introduction To Resource Theories (Example: Nonuniformity Theory) An Introduction To Resource Theories (Example: Nonuniformity Theory) Marius Krumm University of Heidelberg Seminar: Selected topics in Mathematical Physics: Quantum Information Theory Abstract This document

More information

Quantum Hadamard channels (I)

Quantum Hadamard channels (I) .... Quantum Hadamard channels (I) Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. July 8, 2010 Vlad Gheorghiu (CMU) Quantum Hadamard channels (I) July 8, 2010

More information

On balance of information in bipartite quantum communication systems: entanglement-energy analogy

On balance of information in bipartite quantum communication systems: entanglement-energy analogy On balance of information in bipartite quantum communication systems: entanglement-energy analogy Ryszard Horodecki 1,, Micha l Horodecki 1, and Pawe l Horodecki 2, 1 Institute of Theoretical Physics and

More information

arxiv:quant-ph/ v1 4 Jul 2003

arxiv:quant-ph/ v1 4 Jul 2003 Measureament, Trace, Information Erasure and Entropy Qing-Yu Cai State Key of Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Physics and Mathematics, The Chinese Academy

More information

Asymptotic Pure State Transformations

Asymptotic Pure State Transformations Asymptotic Pure State Transformations PHYS 500 - Southern Illinois University April 18, 2017 PHYS 500 - Southern Illinois University Asymptotic Pure State Transformations April 18, 2017 1 / 15 Entanglement

More information

Capacity Estimates of TRO Channels

Capacity Estimates of TRO Channels Capacity Estimates of TRO Channels arxiv: 1509.07294 and arxiv: 1609.08594 Li Gao University of Illinois at Urbana-Champaign QIP 2017, Microsoft Research, Seattle Joint work with Marius Junge and Nicholas

More information

Strong converse theorems using Rényi entropies

Strong converse theorems using Rényi entropies Strong converse theorems using Rényi entropies Felix Leditzky a, Mark M. Wilde b, and Nilanjana Datta a a Statistical Laboratory, Centre for Mathematical Sciences, University of Cambridge, Cambridge C3

More information

Research Statement. Dr. Anna Vershynina. August 2017

Research Statement. Dr. Anna Vershynina. August 2017 annavershynina@gmail.com August 2017 My research interests lie in functional analysis and mathematical quantum physics. In particular, quantum spin systems, open quantum systems and quantum information

More information

Free probability and quantum information

Free probability and quantum information Free probability and quantum information Benoît Collins WPI-AIMR, Tohoku University & University of Ottawa Tokyo, Nov 8, 2013 Overview Overview Plan: 1. Quantum Information theory: the additivity problem

More information

Lecture 21: Quantum communication complexity

Lecture 21: Quantum communication complexity CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 21: Quantum communication complexity April 6, 2006 In this lecture we will discuss how quantum information can allow for a

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Entanglement-Assisted Capacity of a Quantum Channel and the Reverse Shannon Theorem

Entanglement-Assisted Capacity of a Quantum Channel and the Reverse Shannon Theorem IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 10, OCTOBER 2002 2637 Entanglement-Assisted Capacity of a Quantum Channel the Reverse Shannon Theorem Charles H. Bennett, Peter W. Shor, Member, IEEE,

More information

Group representations and quantum information theory. Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007

Group representations and quantum information theory. Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007 Group representations and quantum information theory Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007 outline Types in classical information theory A quantum analogue: Schur duality Joint types Applications

More information

arxiv: v2 [quant-ph] 22 Jan 2018

arxiv: v2 [quant-ph] 22 Jan 2018 1 Information is not a thermodynamic resource 1 Robert Alicki, Institute of Theoretical Physics and Astrophysics, University of Gdańsk, Poland arxiv:1801.05237v2 [quant-ph] 22 Jan 2018 The so-called information-thermodynamics

More information

Quantum heat engine using energy quantization in potential barrier

Quantum heat engine using energy quantization in potential barrier Quantum heat engine using energy quantization in potential barrier Sibasish Ghosh Optics and Quantum Information Group The Institute of Mathematical Sciences C.I.T. Campus, Taramani Chennai 600113. [In

More information

ON BROWNIAN COMPUTATION

ON BROWNIAN COMPUTATION ON BROWNIAN COMPUTATION JOHN D. NORTON Department of History and Philosophy of Science Center for Philosophy of Science University of Pittsburgh Pittsburgh PA USA 15260 jdnorton@pitt.edu Draft: October10,

More information

arxiv:quant-ph/ v2 11 Jan 2006

arxiv:quant-ph/ v2 11 Jan 2006 Diss. ETH No. 16242 Security of Quantum Key Distribution arxiv:quant-ph/0512258v2 11 Jan 2006 A dissertation submitted to SWISS FEDERAL INSTITUTE OF TECHNOLOGY ZURICH for the degree of Doctor of Natural

More information

An exponential separation between quantum and classical one-way communication complexity

An exponential separation between quantum and classical one-way communication complexity An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical

More information

Some Bipartite States Do Not Arise from Channels

Some Bipartite States Do Not Arise from Channels Some Bipartite States Do Not Arise from Channels arxiv:quant-ph/0303141v3 16 Apr 003 Mary Beth Ruskai Department of Mathematics, Tufts University Medford, Massachusetts 0155 USA marybeth.ruskai@tufts.edu

More information

Chapter 5. Density matrix formalism

Chapter 5. Density matrix formalism Chapter 5 Density matrix formalism In chap we formulated quantum mechanics for isolated systems. In practice systems interect with their environnement and we need a description that takes this feature

More information

Chapter 2 Ensemble Theory in Statistical Physics: Free Energy Potential

Chapter 2 Ensemble Theory in Statistical Physics: Free Energy Potential Chapter Ensemble Theory in Statistical Physics: Free Energy Potential Abstract In this chapter, we discuss the basic formalism of statistical physics Also, we consider in detail the concept of the free

More information

(Classical) Information Theory III: Noisy channel coding

(Classical) Information Theory III: Noisy channel coding (Classical) Information Theory III: Noisy channel coding Sibasish Ghosh The Institute of Mathematical Sciences CIT Campus, Taramani, Chennai 600 113, India. p. 1 Abstract What is the best possible way

More information