Conditions for degradability of tripartite quantum states
|
|
- Whitney Patterson
- 6 years ago
- Views:
Transcription
1 Title Conditions for degradability of tripartite quantum states Author(s Fung, FCH; Li, CK; Sze, NS; Chau, HF Citation Journal of Physics A: Mathematical and Theoretical, 014, v. 47 n. 11, p. article no Issued Date 014 URL Rights Journal of Physics A: Mathematical and Theoretical. Copyright Institute of Physics Publishing Ltd.; This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
2 Conditions for degradability of tripartite quantum states Chi-Hang Fred Fung Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road, Hong Kong Chi-Kwong Li Department of Mathematics, College of William & Mary, Williamsburg, Virginia , USA Nung-Sing Sze Department of Applied Mathematics, The Hong Kong Polytechnic University, Hung Hom, Hong Kong H. F. Chau Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road, Hong Kong Abstract Alice, Bob, and ve share a pure quantum state. We introduce the notion of state degradability by asking whether the joint density of Alice and ve can be transformed to the joint density of Alice and Bob by processing ve s part through a quantum channel, in order words, degrading ve. We prove necessary and sufficient conditions for state degradability and provide an efficient method to quickly rule out degradability for a given state. The problem of determining degradability of states is different from that of quantum channels, although the notion is similar. One application of state degradability is that it can be used to test channel degradability. In particular, the degradability of the output state of a channel obtained from the maximally entangled input state gives information about the degradability of the channel. 1 Introduction In quantum information processing, information is often encoded in quantum states which are transformed under quantum computation in order to carry out tasks such as the generation of secret keys [1, ], encoding of error correcting codes [3, 4, 5, 6], and secret sharing [7, 8]. The general quantum state transformation problem concerns whether a state can be transformed via a quantum process to another state, possibly with some constraint on the quantum process. In as early as 1980 s, Alberti and Uhlmann [9] studied the conditions for transforming two qubit mixed states. Subsequently, conditions for the transformations between two sets of pure states without any restriction on the number of states were found [10, 11, 1, 13]. The transformation of entangled 1
3 states under the condition that the two parties perform local operations has also been studied for a single bipartite state [14, 15, 16, 17, 18, 19] and for multiple bipartite states [0]. xtension to transformations for more than two parties has also been considered [1]. In this paper, we introduce the notion of state degradability, which is based on a transformation problem where we ask whether a subsystem can be degraded to another subsystem. More precisely, consider a quantum state in ψ H A H B shared by Alice and Bob. Assume that this state is processed by ve and becomes an entangled state ψ H A H B H. (In the context of quantum key distribution (QKD, such processing corresponds to eavesdropping by ve or the noisy effect of the channel. We are interested in constructing a quantum process T : H A H H A H B of the form r T (X = (I A F j X(I A F j with F j : H H B satisfying j=1 r Fj F j = I (1 j=1 such that T (ρ A = ρ AB for ρ A = tr B (ρ B(H A H, ρ AB = tr (ρ B(H A H B with ρ = ψ ψ, where B(H is the set of bounded, positive-semidefinite operators acting on H, and r is the number of Kraus operators of the quantum channel T which can be arbitrary. If such a map T exists, we call the state ψ B degradable. Similarly, if there exists a quantum channel T : H A H B H A H such that T (ρ AB = ρ A, we call the state B degradable. A state may be B and B degradable. It is interesting to know whether a state is degradable. For example, in QKD if the joint state between Alice and Bob can be shown to be the same as the joint state between Alice and ve via some processing of ve s part, then no secret key can be generated with one-way postprocessing [, 3, 4]. Also, state degradability is related to asymmetric quantum cloning [5, 6, 7], in which the two output subsystems are not necessarily copies of each other, but one subsystem can be transformed to be a clone of the other. If a given state is degradable, it means it could have been produced by asymmetric cloning of some other state. Degradability has been studied in the context of quantum channels [8, 9]. Let us consider a channel in system B which is described as a unitary transformation with ancillary system prepared in a standard state: Φ B (ρ B = tr [U B (ρ B 0 U B]. Note that this system A does not appear in this definition of degradable channel. This induces the complementary channel Φ (ρ B = tr B [U B (ρ B 0 U B]. The channel Φ B is called degradable when it may be degraded to Φ, that is, there exists a quantum channel ˆT : H B H such that ˆT Φ B = Φ. Similarly, Φ B is called anti-degradable when there exists a quantum channel ˆT : H H B such that ˆT Φ = Φ B.
4 It is clear that a degradable (anti-degradable channel always output a state that is B ( B degradable for any input. On the other hand, there are channels that output a degradable state for some input and a non-degradable state for another input. For example, consider this channel: 0 B 00 B 1 B 11 B B 10 B. For the input 00 AB + 11 AB, we get the output 000 AB AB which is B and B degradable. But for the input 00 AB + 11 AB + AB, we get 000 AB AB + 10 AB. For this state, since to degrade to B, has to change to 0 B and 1 B, which is not possible without knowing A. Thus, the output state is not B degradable. With a similar argument, it is also not B degradable. This shows that a channel may output both degradable and non-degradable states. Therefore, it is a new problem to study degradable states without reference to whether the channel generating that state is degradable or not. As one application of state degradability, we prove in Sec. 5 that state degradability can be used to test channel degradability. In particular, the degradability of the output state of a channel obtained from the maximally entangled input state gives information about the degradability of the channel. We show that if the channel output state of the maximally entangled input state is degradable, then the corresponding output state of the channel is degradable for any input state. Also, if the channel output state of the maximally entangled input state is not degradable, then the corresponding output state is not degradable for any input state in a special class. In some applications, the issue of state degradability arises naturally in that Alice, Bob, and ve are initially given a tripartite state, without regard to the details of how it is given. This may occur due to, for example, an entanglement source generating a tripartite state, or an unknown quantum channel processing one part of a bipartite input. As a specific example, in entanglement distillation [30], the problem is often cast as that given a noisy state in AB, which is purified to a tripartite state in AB, the goal is to transform it (through, e.g., local operations and classical communications to a maximally entangled state. This can be viewed as a problem of a given initial state. A similar situation occurs in QKD [1, ]. After the quantum state transmission step, Alice and Bob are given bipartite states which they would like to transform to a secret key. They first learn about their states by error testing and then choose the appropriate procedures to correct bit errors and amplify privacy. This is also a problem centered on a given state. And as mentioned before, if the state is degradable, no secret key can be generated with one-way postprocessing [, 3, 4]; and thus no maximal entanglement can be distilled. We formulate the mathematical problem as follows. State-Degradability Problem Let x C n C p C q. Let X i = tr i (xx with i = 1,, 3, be the partial traces of xx in the three subsystems: C p C q, C n C q, and C n C p. Determine conditions on x (or a class of x such that there is T of the form (1 such that T (X = X 3. Here, 3
5 we adopt the mathematical notation: X 1 = ρ B, X = ρ A, and X 3 = ρ AB. It turns out that this notation allows our mathematical results in the following sections to be concisely described. We will however switch back to the physicist notation of A, B, when we discuss examples of physical relevance. Also, we use the notations M p to denote the set of p p matrices and M p,q the set of p q matrices. In this paper, we consider systems of finite dimensions. The problem of determining whether a state is degradable is similar to the problem of finding a symmetric extension of a state [3] in that both problems are characterized by the generation of Alice and Bob s state by processing ve s part of Alice and ve s state. However, in the latter problem, we are given Alice and Bob s state and we seek an extension that adds ve to the overall state, while in our state degradability problem, a tripartite state is given initially. We first give low dimension examples in Sec. which helps to understand the nature of the problem. Then, in Sec. 3, we prove necessary and sufficient conditions for our state-degradability problem as stated above. We discuss the physical interpretation of the transformability conditions in Sec. 4. Sec. 5 discusses state degradability when a quantum channel is used to generate the overall state. The transformability conditions might be difficult to verify in general, and thus we propose an easily computable method that can quickly rule out degradability of a given state in Sec. 6. We discuss some additional problems and observations in Sec. 7. Finally, we conclude in Sec. 8. Low dimension examples xample 1. Suppose x = (x 1,..., x 8 t C 8 3 (C. Let xx M 8 and tr 1, tr, tr 3 be the partial trace on the three systems. Then X 1 = tr 1 (xx = (x 1 x x 3 x 4 t ( x 1 x x 3 x 4 + (x 5 x 6 x 7 x 8 t ( x 5 x 6 x 7 x 8, X = tr (xx = (x 1 x x 5 x 6 t ( x 1 x x 5 x 6 + (x 3 x 4 x 7 x 8 t ( x 3 x 4 x 7 x 8, X 3 = tr 3 (xx = (x 1 x 3 x 5 x 7 t ( x 1 x 3 x 5 x 7 + (x x 4 x 6 x 8 t ( x x 4 x 6 x 8, where for ease of notations, we omitted the commas in the vectors such as (x 1, x, x 3, x 4. would like to know whether there is T : M 4 M 4 of the form We T (X = j (I F j X(I F j with j F j F j = I such that T (X = X 3. xample. Let x = (a, 0, b, 0, 0, a, 0, b t with (a + b = 1. This state is non-trivial since it is not symmetric in and 3. Then X = a + b 0 0 a b a b 0 0 a + b and X 3 = 4 a ab 0 0 ab b a ab 0 0 ab b.
6 Let ( a a F 1 = b b ( a a and F =. b b Then F 1 F 1 + F F = I, and T (X = X 3 if T (X = (I F 1 X (I F 1 + (I F X (I F. Proposition.1. In xamples 1 and, the desired map exists if and only if there are F 1,..., F r with r j=1 F j F j = I such that the map L : M M defined by satisfies L(R i R j = S is j ( x1 x R 1 = 3 x x 4 L(X = for 1 i, j, where, R = ( x5 x 7 x 6 x 8 r F j XFj j=1, S 1 = ( x1 x x 3 x 4, S = ( x5 x 6 x 7 x 8. Remark Alternatively, we can check whether there is a TPCP map T sending R 1 R 1, R R, (R 1 + R (R 1 + R, (R 1 + ir (R 1 + ir to S 1 S 1, S S, (S 1 + S (S 1 + S, (S 1 + is (S 1 + is. This can be checked readily. xample 3. Suppose x = (x 1,..., x 16 C C C 4. Let xx M 16 and tr 1, tr, tr 3 be the partial trace on the three systems. Then X 1 = tr 1 (xx = (x 1 x 8 t ( x 1 x 8 + (x 9 x 16 t ( x 9 x 16, X = tr (xx = u 1 u 1 + u u = [u 1 u ][u 1 u ], with and u 1 = (x 1 x x 3 x 4 x 9 x 10 x 11 x 1 t, u = (x 5 x 6 x 7 x 8 x 13 x 14 x 15 x 16 t, X 3 = tr 3 (xx = v 1 v v 4 v 4 = [v 1 v 4 ][v 1 v 4 ] v 1 = (x 1 x 5 x 9 x 13 t, v = (x x 6 x 10 x 14 t, v 3 = (x 3 x 7 x 11 x 15 t, v 4 = (x 4 x 8 x 1 x 16 t. We would like to know whether there is T : M 8 M 4 of the form T (X = j (I F j X(I F j with j F j F j = I 4 such that T (X = X 3. 5
7 Proposition.. Using the notation of xample 3, let x 1 x 5 x 9 x 13 R 1 = x x 6 x 3 x 7, R = x 10 x 14 x 11 x 15, x 4 x 8 x 1 x 16 ( ( x1 x S 1 = x 3 x 4 = R t x9 x x 5 x 6 x 7 x 1, S = 10 x 11 x 1 = R 8 x 13 x 14 x 15 x. t 16 Then, in xample 3, the desired map exists if and only if there exists a TPCP map sending R 1 R 1, R R, (R 1 + R (R 1 + R, (R 1 + ir (R 1 + ir to S 1 S 1, S S, (S 1 + S (S 1 + S, (S 1 + is (S 1 + is. We remark that Propositions.1 and. are special cases of Theorem 3.1 below. 3 General result Suppose x = (x ijk C n C p C q. We always assume that the entries of x are arranged in lexicographic (dictionary order of the indexes (ijk, i.e., x 111 is the first entry and x npq is the last entry. Theorem 3.1. Suppose x = (x ijk C n C p C q. Then tr 1 (xx = n i=1 (x ijk(x ijk M p,q, X = tr (xx = p (x ijk (x ijk M n,q, X 3 = tr 3 (xx = j=1 q (x ijk (x ijk M n,q. k=1 Let S i = (x ijk 1 j p,1 k q M p,q and R i = S t i M q,p for i = 1,..., n. Suppose R i has rank k i for i = 1,..., n. Set R i = U i D i V t i such that D i M ki is a diagonal matrix with positive diagonal entries arranged in descending order, U i and V i have orthonormal columns. Then the following conditions are equivalent. (a There is a TPCP map T : M n M q M n M p of the form X satisfying T (X = X 3. r (I n F j X(I n F j with F 1,..., F r M p,q ( j=1 (b There is a TPCP map sending {R u R v : 1 u, v n} to {S u S v : 1 u, v n}. 6
8 (c There are p q matrices F 1,..., F r with r j=1 F j F j = I q and k i p matrices W i1,..., W ir such that for all i, j = 1,..., n, [F 1 R i F r R i ] = V i D i [W i1 W ir ] and [W i1 W ir ][W j1 W jr ] = U t i U j. Proof. Direct checking shows that X = (R u R v 1 u,v n and X 3 = (S u S v 1 u,v n. The map in the form ( will send X to X 3 if and only if r j=1 (F jr u R vf j = (S u S v 1 u,v n. quivalently, the TPCP map Y r j=1 F jy F j will send R ur v to S u S v for 1 u, v n. Thus, (a and (b are equivalent. Suppose (b holds. Then for any 1 i, j n, l F l R i R j F l = V id i U t i U j D j V j. Considering i = j, we see that col(f l U i D i col(v i D i, where col(x denotes the column space of X. Thus, F l R i = V i D i W il for a suitable k i p matrix W il. Now, l F l R i R j F l = V id i [W i1 W ir ][W j1 W jr ] D j V j Multiplying Di 1 Vi to the left and multiplying V j D j to the right, see that [W i1 W ir ][W j1 W jr ] = U t i U j as asserted in (c. The converse can be checked directly. = V i D i U t i U j D j V j. Theorem 3.. Use the notation in Theorem 3.1. Suppose R i = u i d i vi t is rank one for i = 1,..., n. Then conditions (a - (c in Theorem 3.1 are equivalent to the following. (d There are unit vectors γ 1,..., γ n C r and a unitary U such that U[e 1 u 1... e 1 u n ] = [γ 1 v 1 γ n v n ]. (e There is a correlation matrix C such that (u i u j = (v i v j C. (f There exists a TPCP map sending u i u i to v iv i for i = 1,..., n. Here, we abuse the notation of e 1 u i to represent a vector in C pr with the first q elements being u i and the remaining elements being zero. Proof. Using condition (c and focusing on the column space and row space of F l u j d j vj t = v jwjl t, we see that w jl = d j γ jl v j for some γ jl C for j = 1,..., n, and (u t iu j = ((γ i v i t (γ j v j = (γiγ t j (viv t j, where γ i = (γ i1,..., γ ir t is a unit vector for i = 1,..., n. Thus, there is a unitary U M pr such that U[e 1 u 1... e 1 u n ] = [γ 1 v 1 γ n v n ]. If (d holds, one can check condition (c readily. The equivalence of (d, (e, (f follow from the results in Ref. [31]. 7
9 Corollary 3.3. Use the notation in Theorem 3.. The following are equivalent. (a There are TPCP maps T = I n T 1 and L = I n L 1 such that T (X = X 3 and L(X 3 = X. (b There is a diagonal unitary matrix M n such that (u i u j = (v i v j. (c We may enlarge [u 1 u n ] and [v 1... v n ] by adding zero rows to get m n matrices Ũ and Ṽ with m = max{p, q} such that W Ũ = Ṽ for a unitary W M m and a diagonal unitary M n. In xample, we have R 1 = a 11 + b and R = a 1 b. There is TPCP map sending X 3 to X if and only if a b = 0. In such a case, we can set L(X = (I GX(I G with ( a b G = (a + b 1/ = ( a b. By the fact that a a b a b + b = 1/ and a b = 0, we see that L(X 3 = X. 4 Physical interpretation of the transformability conditions Using the physics notation, Alice, Bob, and ve share a tripartite pure state Ψ AB which corresponds to x in Sec. 3 with x ijk = ijk Ψ AB where ijk AB is an eigenstate in the computational basis (note that the indexes start at 1 instead of the usual 0. Define Ψ i B ( i A I B Ψ AB, which is a state conditional on A being i A. Thus, we have Ψ AB = n i A Ψ i B. i=1 According to the definitions of R i and S i, In other words, ρ (i ρ (i B. R i R i = tr B ( Ψ i B Ψ i ρ (i and S i S i = tr ( Ψ i B Ψ i ρ (i B for i = 1,..., n. is the reduced density matrix of conditioned on A being i A ; similarly for Note that for the rest of this section, we use the physics notation of A, B, to label states. If ve can imitate Bob using quantum channel (i.e., (ρ A = ρ AB, then for any φ A. φ A (ρ A φ A = φ A ρ AB φ A (3 Thus, when the projections are on the computational basis for A, the quantum channel is able to transform ρ (i to ρ(i B, i.e., (R i R i = S i S i, (4 for i = 1,..., n. On the other hand, the transformability condition of Theorem 3.1 (b includes additional cross terms (i.e., R u R v S u S v for u v. ssentially, the transformability of the cross terms guarantees the transformability of to B in other bases. To see this, consider the {+, } complementary basis for A where we define ± A = ( 1 A ± A /. If ve is able to pretend to be 8
10 Bob, (3 means that the transformation ρ (± ρ(± B ρ (± B is possible, where ρ(± tr B( Ψ ± B Ψ ±, tr ( Ψ ± B Ψ ±, and Ψ ± B = ( Ψ 1 B ± Ψ B /. In other words, (3 becomes (ρ (± = ρ(± B (R 1 R 1 + R R ± R 1 R ± R R 1 = S 1 S 1 + S S ± S 1 S ± S S 1. (6 (5 Here, the reduced density matrix of conditioned on A being ± A is ρ (± = R ±R±. According to the definition of R i which is a rearragement of the elements of Ψ i B for i = +,, 1,, R ± = (R 1 ± R /. We have similar expressions for B. Given (4, (6 is true if and only if (R 1 R + R R 1 = S 1 S + S S 1. This shows that the transformability of the cross terms R u R v S u S v for u v guarantees the transformability of to B in other bases. Therefore, one cannot simplify the condition checking of Theorem 3.1 (b by ignoring the cross terms. The following example illustrates this point by showing that there exists a state for which R u R v S u S v for u = v but not u v. xample 4. The initial state is a 3 system in A, B, and : [( ( ( ( α a α a Ψ AB = 1 A + β b β b B B ( ( ( α a α A + 3 ıβ b A ıβ B B ] 1 A [ p + B φ + + p B φ + ] + ( a b (7 where α, β = 1 α, a, b = 1 a R, and ı = 1. A q + B φ A q B φ (8 Our goal is to show that there exists a quantum channel such that (i (ρ (j = ρ(j B, j = 1,, 3, i.e., and (ii there does not exist a quantum channel such that This means that (9 does not imply (10. (R j R j = S j S j, j = 1,, 3, (9 (R j Rk = S jsk, j, k = 1,, 3. (10 We show that (9 holds but (5 does not hold for the state in (7. Proof of the validity of (9 First, we show that (9 holds. Assume that φ + φ < q + q and so there exists a quantum channel that transforms φ ± q ±. This can be verified by comparing the Gram matrices of the initial set of states and the final one [10, 11, 1, 13]. 9
11 The quantum channel is equivalent to a unitary transformation U Hilbert space : using an extended Ψ AB = U Ψ AB (11 = 1 A Ψ 1 B + A Ψ B + 3 A Ψ 3 B (1 where Ψ j = U B Ψ j B, j = 1,, 3. Note that (R j Rj Ψ = tr B ( j Ψ j = (ρ (j. B In order that (ρ ( = ρ( B = q + q +, U must transform as U Ψ B = U q + B φ + = q + B q + x +, where x + is some normalized vector. Similarly, (ρ (3 = ρ(3 B implies that U Ψ 3 B = q B q x, where x is some normalized vector. Then, we have Ψ AB = 1 A [ p + B q + x + + p B q x ] + We now verify that (ρ (1 = ρ(1 B. The LHS is (ρ (1 A q + B q + x A q B q x (13 = tr B ( Ψ 1 B Ψ 1 [ ] = tr B P ( p + B q + x + + p B q x = q + q + + q q + C q + q + C q q + where P ( ϕ ϕ ϕ, and C p p + B x x +. Substituting the various vectors using (7, ( ( ( (ρ (0 α = 0 α ıαβ 0 β + C ıαβ β + C α ıαβ ıαβ β. (14 The RHS is ρ (1 B = tr ( Ψ 1 B Ψ 1 ] = tr [P ( p + B φ + + p B φ = p + B p + + p B p + φ φ + p + B p + φ + φ p B p + ( ( α 0 = 0 β + (a b α 0 0 β. This means that (ρ (1 = ρ(1 B if and only if C = a b. This is possible since we have assumed that φ + φ < q + q = p + p. We impose that x ± be chosen such that C = a b, and thus (ρ (j = ρ(j B for j = 1,, 3. 10
12 Invalidity of (5 for the state in (7 We now show that (5 does not hold given that C = (α β x x + = a b. (15 xpressing (13 in the {+, } basis, we have Ψ AB = U Ψ AB = 1 ] + A [( p + B + q + B q + x + + p B q x + 1 ] A [( p + B q + B q + x + + p B q x + We show that (ρ ( 3 A q B q x + A Ψ + + B A Ψ + 3 B A Ψ 3 B. ρ(. The LHS is B (ρ ( = tr B ( Ψ B Ψ [ = tr B P ( p ] + B q + x + + p B q x = p + p + q+ q + + q q + D q + q + D q q + where p + B = p + B q + B, and D p p + B x x +. Substituting the various vectors using (7, ( 0 p + B = (1 ıβ B and (ρ ( = β ( α ıαβ ıαβ β + where D = (1 ıβ x x +. The RHS is ( α ıαβ ıαβ β + D ( ( α ıαβ ıαβ β + D α ıαβ ıαβ β ρ ( B = tr ( Ψ B Ψ = tr [P ( p ] + B φ + + p B φ = p + B p + + p B p + φ φ + p + B p + φ + φ p B p + ( ( ( 0 0 α αβ = 0 β + αβ β + (a b 0 (1 + ıαβ (1 ıαβ β. To show that (ρ ( ρ( B, we compare their (1, 1 elements. The RHS is α, and the LHS is α (β D + D = α (β + 1 β x x +. However, due to the assumption in (15, x x + 1 in general. Therefore, (ρ ( ρ( B. 11
13 5 Degradability for a given quantum channel We discuss state degradability when the overall state is generated by a given quantum channel. We show that if the channel output state of the maximally entangled input state is degradable, then the corresponding output state is degradable for any input state. Also, if the channel output state of the maximally entangled input state is not degradable, then the corresponding output state is not degradable for any input state in a special class. Theorem 5.1. Suppose that a state ψ AB is generated by processing a state ψ AB by a channel Φ B acting on subsystem B with an ancilla in subsystem. The channel is implemented by a unitary extension U B as follows: ψ AB = (I A U B ψ AB U AB ψ AB, where Φ B (tr A (P ( ψ AB = tr A (P ( ψ AB with P ( =. We assume that the dimensions of subsystems A and B are the same, n, so that the maximally entangled state ψ M AB = n i=1 ii AB is defined. Using ψ M AB as the input state, if the output state U AB ψ M AB is B degradable with T of the form (1 [i.e., T satisfies T (ρ A = ρ AB where ρ A = tr B (ρ and ρ AB = tr (ρ with ρ = P (U AB ψ M AB ], then the output state U AB ψ AB is B degradable with the same T for any input state ψ AB. Proof. First, note that any state ψ AB can be expressed as ψ AB = (K A I B ψ M AB where K A = n i,j=1 j A i ji ψ AB. Note that K A is not necessarily invertible. Next, the condition for B degradability of the maximally entangled state means that T (ρ A = ρ AB (16 T ((K A Iρ A (K A I = (K A Iρ AB (K A I for any K A (17 where the last line is because T acts only on subsystem. Finally, the term on the LHS is (K A Iρ A (K A I = tr B [P (U AB (K A I B ψ M AB ] (18 and we have an analogous term on the RHS. Thus, we have = tr B [P (U AB ψ AB ] (19 T (tr B [P (U AB ψ AB ] = tr [P (U AB ψ AB ] (0 which means that the output state is B degradable for any input state ψ AB. Corollary 5.. For the channel Φ B, if the output state U AB ψ M AB is B degradable for the maximally entangled input state ψ M AB, then the channel Φ B is anti-degradable with respect to the complementary channel Φ [i.e., there exists a quantum channel ˆT : H H B such that ˆT Φ = Φ B ]. Here, in terms of U B, Φ B (ρ B = tr [U B (ρ B 0 U B], and (1 Φ (ρ B = tr B [U B (ρ B 0 U B]. ( 1
14 Proof. Since any state ρ B of dimension n can be purified with a subsystem A of dimension n such that ρ B = tr A (P ( ψ AB for some ψ AB, we can trace out subsystem A on both sides of q. (0 to get Φ processed by a channel acting on on the LHS and Φ B on the RHS. Remark 5.3. In the proof of Theorem 5.1, the operator K A performed on subsystem A can have an operational interpretation related to entanglement transformation. It may be viewed as a local filtering operation that can be implemented probabilistically by a quantum measurement. This operation locally transforms a maximally entangled state to any other given state (entangled or unentangled probabilistically. Theorem 5.4. Following the notations in Theorem 5.1, for the input state ψ M AB, if the output state U AB ψ M AB is not B degradable, then the output state U AB ψ AB is not B degradable for any input state ψ AB = (W A I B ψ M AB where W A is invertible. Proof. We prove by contradiction. Suppose that for some input state ψ AB, the output state U AB ψ AB is B degradable. We repeat the arguments in the proof of Theorem 5.1 with ψ AB and ψ M AB swapped and with K A = W 1. Then, qs. (16-(0 follow, concluding that A when the input state is ψ M AB, the output state is B degradable. assumption and thus proves the theorem. 6 Necessary condition for degradability This contradicts the We provide an easily computable method to rule out the degradability of a given state. It is based on the expression of degradability in condition (b of Theorem 3.1 and the contractivity of quantum channels under the trace distance. Definition 6.1. The trace norm of a matrix σ M q is tr σ = q j=1 λ j where λ j are the singular values of σ. Definition 6.. The trace distance between two matrices ρ, σ M q is d(ρ, σ = 1 tr ρ σ. Quantum channels are contractive under the trace distance for quantum states, i.e., d(ρ, σ d(f(ρ, F(σ for any density matrices ρ and σ and quantum channel F [3] (see also Theorem 9. of [33]. However, the matrices of concern in condition (b of Theorem 3.1, R i R j and S is j, are general matrices and may not be Hermitian and positive semi-definite. Nevertheless, we prove in Appendix A that quantum channels are contractive under any unitarily invariant norm for general matrices, of which the following theorem for the trace norm is a special case. Theorem 6.3. Given a TPCP map (quantum channel F : M q M p described by Kraus operators F 1,..., F r M p,q with r j=1 F j F j = I q acting on matrices σ M q (not necessarily quantum states, tr F(σ tr σ. 13
15 Corollary 6.4. If d(r i R j, R i R j < d(s is j, S i S j for some i, j, i, j, then condition (b of Theorem 3.1 does not hold. We prove by contradiction. If condition (b holds, then there exists some quantum channel F satisfying the transformations, and where the inequality is due to Theorem 6.3. d(s i S j, S i S j = 1 tr F(R ir j F(R i R j = 1 tr F(R ir j R i R j 1 tr R ir j R i R j = d(r i R j, R i R j Therefore, if we find the distance between the inputs of two transformations to be smaller than the distance between the outputs, the state is not degradable in the sense of Theorem 3.1. xample 5. Consider the output state processed by the qubit depolarizing channel: where ρ M is the input density matrix, X = (ρ = (1 ɛρ + ɛ 3 ZρZ + ɛ 3 Y ρy + ɛ XρX (3 3 ( 0 1, Y = 1 0 ( ( , and Z = Suppose the input state is ( AB and is applied to system B. The output state purified with system is Ψ AB = 1 ɛ ( AB + ɛ 3 ( AB + ɛ 3 ( AB 1 + ɛ 3 ( AB 3. (4 Note that this state is unnormalized, and normalization is not important in the following discussion.denote the coefficient for ijk AB by x ijk. Then, following Theorem 3.1, S 0 = S 1 = where α = 1 ɛ and β = ɛ 3, and ( ( x000 x 001 x 00 x 003 α β 0 0 = x 010 x 011 x 01 x β β ( ( x100 x 101 x 10 x β β = x 110 x 111 x 11 x 113 α β 0 0 (5 (6 R i = S t i. (7 14
16 We compute the trace distances as follows: R 0 R 0 R 1 R 1 = S 0 S 0 S 1 S 1 = R 0 R 1 R 1 R 0 = S 0 S 1 S 1 S 0 = 0 αβ 0 0 αβ β (8 0 0 β 0 ( α β 0 0 (α β (9 0 0 αβ β αβ (30 0 β 0 0 ( 0 α β (α β. (31 0 It can be shown that R 0 R 0 R 1R 1 and R 0R 1 R 1R 0 have singular values αβ, αβ, β, β, and S 0 S0 S 1S1 and S 0S1 S 1S0 have singular values (α + β(α β, (α + β(α β. Here, we assume α > β. Thus, d R d(r 0 R0, R 1R1 = d(r 0R1, R 1R0 = β(α + β and d S d(s 0 S0, S 1S1 = d(s 0 S1, S 1S0 = (α + β(α β. Therefore, we have the condition for the input distance being smaller than the output distance: d R < d S ɛ < 1 4. (3 Under this condition, there does not exist a quantum channel T acting on system such that T (ρ A = ρ AB. Here, ρ A = tr B ( Ψ AB Ψ and ρ AB = tr ( Ψ AB Ψ. By Theorem 5.4, the same conclusion holds for all other Bell states serving as the input state since all Bell states are unitarily transformable to each other. We can interpret the result in the context of quantum key distribution (QKD [1, ], in which two legitimate parties, conventionally named Alice and Bob (they correspond to systems A and B here, want to share a secret key against an eavesdropper ve (system here, by exchanging quantum states. These states may be modified by ve. In a typical QKD session, Alice and Bob learn about the quantum states by comparing measurement results in various measurement bases (such as X, Y, or Z. For each basis, we can compute the fraction of measurement mismatches, which is known as the quantum bit error rate (QBR. Note that the QKD protocol described here operates in a two-dimensional space, although the presentation of this paper treats arbitrary finite dimensions. Since the state in q. (3 is symmetric with respect to measurements in X, Y, and Z, the QBR for each of them is the same, ɛ/3. (This means that measurements in say the X basis produce an error rate of ɛ/3 when the channel input is an X eigenstate. Combining with q. (3, it means that when the QBR is less than 1/6, ve is not able to imitate Bob. Recall that if, on the other hand, ve is able to imitate Bob, no key can be generated using one-way postprocessing [, 3, 4]. Thus, our result here is consistent with the result that positive key rate is achievable when the QBR is less than 1/6 for the six-state protocol [34]. 15
17 7 Additional remarks and questions Direct application of Theorem 3. yields the following. Proposition 7.1. Use the notation in Theorem 3.1. The following are equivalent. (a There are TPCP maps T = I n T 1 and L = I n L 1 such that T (X = X 3 and L(X 3 = X. (b There is a TPCP map sending {R u R v : 1 u, v n} to {S u S v : 1 u, v n}, and a TPCP map sending {S u S v : 1 u, v n} to {R u R v : 1 u, v n}. (c There are p q matrices F 1,..., F r with r j=1 F j F j = I q and k i p matrices W i1,..., W ir such that for all i, j = 1,..., n, [F 1 R i F r R i ] = V i D i [W i1 W ir ] and [W i1 W ir ][W j1 W jr ] = U t i U j, and there are q p matrices F 1,..., F s with s j=1 F j F j = I p and k i q matrices W i1,..., W is such that for all i, j = 1,..., n, [ F 1 R t i F s R t i] = U i D i [ W i1 W is ] and [ W i1 W is ][ W j1 W js ] = V t i V j. Proposition 7.. The following are equivalent. (a There is a TPCP map sending R i R j to S is j. (b There is a TPCP map sending ( c i R i ( c j R j to ( c i S i ( c j S j for any scalars c 1,..., c n, c 1,..., c n. (c There is a TPCP map sending ( c i R i ( c j R j to ( c i S i ( c j S j for any scalars c 1,..., c n. By the above proposition, we can focus on a maximal linearly independent subset set {R 1,..., R m } and check whether there is a TPCP map sending R i R j to S is j for matrices R i, R j in this set. Note, however, that the above propositions are not very practical and it is desirable to have some more practical conditions. Problem Can we extend Corollary 3.3 and determine the condition for the existence of TPCP maps T = I n T 1 and L = I n L 1 such that T (X = X 3 and L(X 3 = X? 8 Concluding remarks In this paper, we introduced the notion of state degradability. The joint state of Alice and ve is degradable if ve s system can be processed by a quantum channel to produce a joint state that is the same as the joint state of Alice and Bob. We proved necessary and sufficient conditions for state degradability. The conditions are in general difficult to check, but we also provide an easily computable method to rule out degradability. This method is based on the fact that the trace distance between two states can only become smaller under the action of a quantum channel. One application of state degradability is that it can be used to test channel degradability. Analysis of the channel output state of the maximally entangled input state gives information about the 16
18 degradability of the channel. Another application of state degradability is in the analysis of QKD, in which no secret key can be generated by one-way postprocessing when the joint state between Alice and ve can be degraded to a joint state between Alice and Bob. For future work, we hope to investigate more connections between degradability and other quantum information processing tasks, and extend our result to the case where Alice, Bob, and ve share a mixed quantum state. A Proof of Theorem 6.3 A norm is unitarily invariant if X = UXV for any unitary U, V. Note that the trace norm is one such norm. Proposition A.1. Suppose B M p and A M q such that B = r j=1 F jaf j with F j F j = I q. Then, I r B r A O for any unitarily invariant norm on M pr. Proof. Let U = (U ij 1 i,j r be unitary such that U j1 = F j for j = 1,..., r. Then U(A OU = (A ij 1 i,j r such that A A rr = B. Take P = diag (1, w,.., w r 1 I p with w = e iπ/r. Then r 1 1 l r P l (A ij (P l = A 11 A rr. Now take Q = ( 1 + r 1,r + r,1 I p. Then 1 j r Qj (A 11 A rr (Q j = I r B. Thus, using the triangle inequality, I r B = 1 r r l,k=1 Q k P l U(A O(Q k P l U 1 r r l,k=1 A O = r A O. To prove Theorem 6.3, we just take to be the trace norm to get B = 1 r I r B A O = A. Acknowledgments We thank Zejun Huang and dward Poon for enlightening discussion. This research evolved in a faculty seminar on quantum information science at the University of Hong Kong in the spring of 01 coordinated by Chau and Li. The support of the Departments of Physics and Mathematics of the University of Hong Kong is greatly appreciated. Chau and Fung were partially supported by the Hong Kong RGC grant No P. Sze was partially supported by the Hong Kong RGC grant PolyU Li was supported by a USA NSF grant and a Hong Kong RGC grant; he was a visiting professor of the University of Hong Kong in the spring of 01, an honorary professor of Taiyuan University of Technology (100 Talent Program scholar, and an honorary professor of Shanghai University. 17
19 References [1] C. H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proc. of I Int. Conference on Computers, Systems, and Signal Processing, pages , I Press, New York, December [] A. K. kert. Quantum cryptography based on Bell s theorem. Phys. Rev. Lett., 67: , [3] P. W. Shor. Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A, 5:R493 R496, Oct [4] D. Gottesman. Class of quantum error-correcting codes saturating the quantum hamming bound. Phys. Rev. A, 54: , Sep [5] A. R. Calderbank,. M. Rains, P. W. Shor, and N. J. A. Sloane. Quantum error correction and orthogonal geometry. Phys. Rev. Lett., 78: , Jan [6] A. R. Calderbank,. M. Rains, P. W. Shor, and N. J. A. Sloane. Quantum error correction via codes over GF(4. I Trans. Inform. Theory, 44(4: , [7] M. Hillery, V. Bužek, and A. Berthiaume. Quantum secret sharing. Phys. Rev. A, 59: , Mar [8] A. Karlsson, M. Koashi, and N. Imoto. Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A, 59:16 168, Jan [9] P. Alberti and A. Uhlmann. A problem relating to positive linear maps on matrix algebras. Rep. Math. Phys., 18(: , [10] A. Uhlmann. ine bemerkung er vollstdig positive abbildungen von dichteoperatoren. Wiss. Z. Karl-Marx-Univ. Leipzig, Math.-Naturwiss. Reihe, 34(6:580 58, [11] A. Chefles. Deterministic quantum state transformations. Phys. Lett. A, 70(1:14 19, 000. [1] A. Chefles. Quantum operations, state transformations and probabilities. Phys. Rev. A, 65:05314, May 00. [13] A. Chefles, R. Jozsa, and A. Winter. On the existence of physical transformations between sets of quantum states. Int. J. Quant. Inf., (1:11 1, 004. [14] C. H. Bennett, H. J. Bernstein, S. Popescu, and B. Schumacher. Concentrating partial entanglement by local operations. Phys. Rev. A, 53:046 05, Apr [15] H.-K. Lo and S. Popescu. Concentrating entanglement by local actions: beyond mean values. Phys. Rev. A, 63:0301, Jan
20 [16] M. A. Nielsen. Conditions for a class of entanglement transformations. Phys. Rev. Lett., 83: , Jul [17] D. Jonathan and M. B. Plenio. Minimal conditions for local pure-state entanglement manipulation. Phys. Rev. Lett., 83: , Aug [18] B. He and J. A. Bergou. ntanglement transformation with no classical communication. Phys. Rev. A, 78:0638, Dec 008. [19] V. Gheorghiu and R. B. Griffiths. Separable operations on pure states. Phys. Rev. A, 78:00304, Aug 008. [0] H. F. Chau, C.-H. F. Fung, C.-K. Li,. Poon, and N.-S. Sze. ntanglement transformation between sets of bipartite pure quantum states using local operations. J. Math. Phys., 53(1:101, 01. [1] G. Gour and N. R. Wallach. Necessary and sufficient conditions for local manipulation of multipartite pure quantum states. New Journal of Physics, 13(7:073013, 011. [] D. Bruß, D. P. DiVincenzo, A. kert, C. A. Fuchs, C. Macchiavello, and J. A. Smolin. Optimal universal and state-dependent quantum cloning. Phys. Rev. A, 57: , Apr [3] M. L. Nowakowski and P. Horodecki. A simple test for quantum channel capacity. Journal of Physics A: Mathematical and Theoretical, 4(13:135306, 009. [4] T. Moroder, M. Curty, and N. Lütkenhaus. One-way quantum key distribution: Simple upper bound on the secret key rate. Phys. Rev. A, 74:05301, Nov 006. [5] N. J. Cerf. Asymmetric quantum cloning in any dimension. J. Mod. Opt., 47:187 09, 000. [6] J. Fiurášek, R. Filip, and N. J. Cerf. Highly asymmetric quantum cloning in arbitrary dimension. Quant. Inform. Comp., 5:583 59, 005. [7] S. Iblisdir, A. Acín, N. J. Cerf, R. Filip, J. Fiurášek, and N. Gisin. Multipartite asymmetric quantum cloning. Phys. Rev. A, 7:0438, Oct 005. [8] I. Devetak and P. W. Shor. The capacity of a quantum channel for simultaneous transmission of classical and quantum information. Comm. Math. Phys., 56(:87 303, 005. [9] T. S. Cubitt, M. B. Ruskai, and G. Smith. The structure of degradable quantum channels. J. Math. Phys., 49(10:10104, 008. [30] C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, and W. K. Wootters. Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett., 76:7 75, Jan
21 [31] Z. Huang, C.-K. Li,. Poon, and N.-S. Sze. Physical transformations between quantum states. J. Math. Phys., 53(10:1009, 01. [3] M. B. Ruskai. Beyond Strong Subadditivity? Improved Bounds on the Contraction of Generalized Relative ntropy. Rev. Math. Phys., 6: , [33] M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum Information. CUP, 000. [34] R. Renner, N. Gisin, and B. Kraus. Information-theoretic security proof for quantum-keydistribution protocols. Phys. Rev. A, 7:0133, Jul
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key
More informationLINEAR MAPS PRESERVING NUMERICAL RADIUS OF TENSOR PRODUCTS OF MATRICES
LINEAR MAPS PRESERVING NUMERICAL RADIUS OF TENSOR PRODUCTS OF MATRICES AJDA FOŠNER, ZEJUN HUANG, CHI-KWONG LI, AND NUNG-SING SZE Abstract. Let m, n 2 be positive integers. Denote by M m the set of m m
More informationDegradable Quantum Channels
Degradable Quantum Channels Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA May 27, 2010 References The capacity of a quantum channel for simultaneous transmission of classical
More informationTheory of Quantum Entanglement
Theory of Quantum Entanglement Shao-Ming Fei Capital Normal University, Beijing Universität Bonn, Bonn Richard Feynman 1980 Certain quantum mechanical effects cannot be simulated efficiently on a classical
More informationfor all A M m and B M n Key words. Complex matrix, linear preserver, spectral norm, Ky Fan k-norm, Schatten p-norm, tensor product.
LINEAR MAPS PRESERVING KY FAN NORMS AND SCHATTEN NORMS OF TENSOR PRODUCTS OF MATRICES AJDA FOŠNER, ZEJUN HUANG, CHI-KWONG LI, AND NUNG-SING SZE Abstract. For a positive integer n, let M n be the set of
More informationSome Bipartite States Do Not Arise from Channels
Some Bipartite States Do Not Arise from Channels arxiv:quant-ph/0303141v3 16 Apr 003 Mary Beth Ruskai Department of Mathematics, Tufts University Medford, Massachusetts 0155 USA marybeth.ruskai@tufts.edu
More informationA new criterion and a special class of k-positive maps
A new criterion and a special class of k-positive maps Dedicated to Professor Leiba Rodman. Jinchuan Hou Department of Mathematics, Taiyuan University of Technology, Taiyuan, 030024, China. jinchuanhou@aliyun.com
More informationOn PPT States in C K C M C N Composite Quantum Systems
Commun. Theor. Phys. (Beijing, China) 42 (2004) pp. 25 222 c International Academic Publishers Vol. 42, No. 2, August 5, 2004 On PPT States in C K C M C N Composite Quantum Systems WANG Xiao-Hong, FEI
More informationA Holevo-type bound for a Hilbert Schmidt distance measure
Journal of Quantum Information Science, 205, *,** Published Online **** 204 in SciRes. http://www.scirp.org/journal/**** http://dx.doi.org/0.4236/****.204.***** A Holevo-type bound for a Hilbert Schmidt
More informationQUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36
QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING
More informationarxiv: v2 [quant-ph] 7 Apr 2014
Quantum Chernoff bound as a measure of efficiency of quantum cloning for mixed states arxiv:1404.0915v [quant-ph] 7 Apr 014 Iulia Ghiu Centre for Advanced Quantum Physics, Department of Physics, University
More informationTransmitting and Hiding Quantum Information
2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents
More informationOn balance of information in bipartite quantum communication systems: entanglement-energy analogy
On balance of information in bipartite quantum communication systems: entanglement-energy analogy Ryszard Horodecki 1,, Micha l Horodecki 1, and Pawe l Horodecki 2, 1 Institute of Theoretical Physics and
More informationCHI-KWONG LI AND YIU-TUNG POON. Dedicated to Professor John Conway on the occasion of his retirement.
INTERPOLATION BY COMPLETELY POSITIVE MAPS CHI-KWONG LI AND YIU-TUNG POON Dedicated to Professor John Conway on the occasion of his retirement. Abstract. Given commuting families of Hermitian matrices {A
More informationarxiv: v4 [quant-ph] 8 Mar 2013
Decomposition of unitary matrices and quantum gates Chi-Kwong Li, Rebecca Roberts Department of Mathematics, College of William and Mary, Williamsburg, VA 2387, USA. (E-mail: ckli@math.wm.edu, rlroberts@email.wm.edu)
More informationarxiv: v1 [quant-ph] 3 Jan 2008
A paradigm for entanglement theory based on quantum communication Jonathan Oppenheim 1 1 Department of Applied Mathematics and Theoretical Physics, University of Cambridge U.K. arxiv:0801.0458v1 [quant-ph]
More informationarxiv: v2 [quant-ph] 5 Dec 2013
Decomposition of quantum gates Chi Kwong Li and Diane Christine Pelejo Department of Mathematics, College of William and Mary, Williamsburg, VA 23187, USA E-mail: ckli@math.wm.edu, dcpelejo@gmail.com Abstract
More informationQuantum Correlations as Necessary Precondition for Secure Communication
Quantum Correlations as Necessary Precondition for Secure Communication Phys. Rev. Lett. 92, 217903 (2004) quant-ph/0307151 Marcos Curty 1, Maciej Lewenstein 2, Norbert Lütkenhaus 1 1 Institut für Theoretische
More informationApplication of Structural Physical Approximation to Partial Transpose in Teleportation. Satyabrata Adhikari Delhi Technological University (DTU)
Application of Structural Physical Approximation to Partial Transpose in Teleportation Satyabrata Adhikari Delhi Technological University (DTU) Singlet fraction and its usefulness in Teleportation Singlet
More informationRecovery in quantum error correction for general noise without measurement
Quantum Information and Computation, Vol. 0, No. 0 (2011) 000 000 c Rinton Press Recovery in quantum error correction for general noise without measurement CHI-KWONG LI Department of Mathematics, College
More informationPh 219/CS 219. Exercises Due: Friday 20 October 2006
1 Ph 219/CS 219 Exercises Due: Friday 20 October 2006 1.1 How far apart are two quantum states? Consider two quantum states described by density operators ρ and ρ in an N-dimensional Hilbert space, and
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationSupplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol
Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances Hoi-Kwong Lo 1 and H. F. Chau, 2y 1 Hewlett-Packard Labs, Filton Road, Stoke Giord, Bristol BS34 8QZ, U. K. 2 Department
More informationProbabilistic exact cloning and probabilistic no-signalling. Abstract
Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract
More informationThe automorphism group of separable states in quantum information theory. University of Illinois at Chicago, Chicago, Illinois ,
The automorphism group of separable states in quantum information theory Shmuel Friedland, 1, a) Chi-Kwong Li, 2, b) Yiu-Tung Poon, 3, c) 4, d) and Nung-Sing Sze 1) Department of Mathematics, Statistics
More informationTELEBROADCASTING OF ENTANGLED TWO-SPIN-1/2 STATES
TELEBRODCSTING OF ENTNGLED TWO-SPIN-/ STTES IULI GHIU Department of Physics, University of Bucharest, P.O. Box MG-, R-775, Bucharest-Mãgurele, Romania Receive December, 4 quantum telebroacasting process
More informationThe query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector
1 Query model In the quantum query model we wish to compute some function f and we access the input through queries. The complexity of f is the number of queries needed to compute f on a worst-case input
More informationQuantum Hadamard channels (I)
.... Quantum Hadamard channels (I) Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. July 8, 2010 Vlad Gheorghiu (CMU) Quantum Hadamard channels (I) July 8, 2010
More informationRealizing probabilistic identification and cloning of quantum states via universal quantum logic gates
Realizing probabilistic identification and cloning of quantum states via universal quantum logic gates Chuan-Wei Zhang, Zi-Yang Wang, Chuan-Feng Li,* and Guang-Can Guo Laboratory of Quantum Communication
More informationLecture 6: Quantum error correction and quantum capacity
Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationLocal cloning of entangled states
Local cloning of entangled states Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. March 16, 2010 Vlad Gheorghiu (CMU) Local cloning of entangled states March
More informationRANKS OF QUANTUM STATES WITH PRESCRIBED REDUCED STATES
RANKS OF QUANTUM STATES WITH PRESCRIBED REDUCED STATES CHI-KWONG LI, YIU-TUNG POON, AND XUEFENG WANG Abstract. Let M n be the set of n n complex matrices. in this note, all the possible ranks of a bipartite
More informationSquashed entanglement
Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication
More informationA Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016
More informationarxiv: v3 [quant-ph] 5 Jun 2015
Entanglement and swap of quantum states in two qubits Takaya Ikuto and Satoshi Ishizaka Graduate School of Integrated Arts and Sciences, Hiroshima University, Higashihiroshima, 739-8521, Japan (Dated:
More informationQuantum secret sharing based on quantum error-correcting codes
Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,
More informationMaximizing the numerical radii of matrices by permuting their entries
Maximizing the numerical radii of matrices by permuting their entries Wai-Shun Cheung and Chi-Kwong Li Dedicated to Professor Pei Yuan Wu. Abstract Let A be an n n complex matrix such that every row and
More informationMP 472 Quantum Information and Computation
MP 472 Quantum Information and Computation http://www.thphys.may.ie/staff/jvala/mp472.htm Outline Open quantum systems The density operator ensemble of quantum states general properties the reduced density
More informationMax-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig
Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Coherence of Assistance and Regularized Coherence of Assistance by Ming-Jing Zhao, Teng Ma, and Shao-Ming Fei Preprint no.: 14 2018
More informationarxiv: v3 [math.ra] 22 Aug 2014
arxiv:1407.0331v3 [math.ra] 22 Aug 2014 Positivity of Partitioned Hermitian Matrices with Unitarily Invariant Norms Abstract Chi-Kwong Li a, Fuzhen Zhang b a Department of Mathematics, College of William
More informationEstimation of Optimal Singlet Fraction (OSF) and Entanglement Negativity (EN)
Estimation of Optimal Singlet Fraction (OSF) and Entanglement Negativity (EN) Satyabrata Adhikari Delhi Technological University satyabrata@dtu.ac.in December 4, 2018 Satyabrata Adhikari (DTU) Estimation
More informationLecture 11 September 30, 2015
PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike
More informationQuantum Information Processing and Diagrams of States
Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University
More informationA scheme for protecting one-qubit information against erasure. error. Abstract
A scheme for protecting one-qubit information against erasure error Chui-Ping Yang 1, Shih-I Chu 1, and Siyuan Han 1 Department of Chemistry, University of Kansas, and Kansas Center for Advanced Scientific
More informationLecture 4: Purifications and fidelity
CS 766/QIC 820 Theory of Quantum Information (Fall 2011) Lecture 4: Purifications and fidelity Throughout this lecture we will be discussing pairs of registers of the form (X, Y), and the relationships
More informationarxiv:quant-ph/ v1 27 Dec 2004
Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,
More informationGENERALIZED NUMERICAL RANGES AND QUANTUM ERROR CORRECTION
J. OPERATOR THEORY 00:0(0000, 101 110 Copyright by THETA, 0000 GENERALIZED NUMERICAL RANGES AND QUANTUM ERROR CORRECTION CHI-KWONG LI and YIU-TUNG POON Communicated by Editor ABSTRACT. For a noisy quantum
More information1. Basic rules of quantum mechanics
1. Basic rules of quantum mechanics How to describe the states of an ideally controlled system? How to describe changes in an ideally controlled system? How to describe measurements on an ideally controlled
More informationHigh Fidelity to Low Weight. Daniel Gottesman Perimeter Institute
High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,
More informationGeneralized Interlacing Inequalities
Generalized Interlacing Inequalities Chi-Kwong Li, Yiu-Tung Poon, and Nung-Sing Sze In memory of Professor Ky Fan Abstract We discuss some applications of generalized interlacing inequalities of Ky Fan
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationEntanglement: Definition, Purification and measures
Entanglement: Definition, Purification and measures Seminar in Quantum Information processing 3683 Gili Bisker Physics Department Technion Spring 006 Gili Bisker Physics Department, Technion Introduction
More informationMultiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State
Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure
More informationProbabilistic quantum cloning via Greenberger-Horne-Zeilinger states
Probabilistic quantum cloning via Greenberger-Horne-Zeilinger states Chuan-Wei Zhang, Chuan-Feng Li,* Zi-Yang Wang, and Guang-Can Guo Laboratory of Quantum Communication and Quantum Computation and Department
More informationBell inequality for qunits with binary measurements
Bell inequality for qunits with binary measurements arxiv:quant-ph/0204122v1 21 Apr 2002 H. Bechmann-Pasquinucci and N. Gisin Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland
More informationCompression and entanglement, entanglement transformations
PHYSICS 491: Symmetry and Quantum Information April 27, 2017 Compression and entanglement, entanglement transformations Lecture 8 Michael Walter, Stanford University These lecture notes are not proof-read
More informationFlocks of Quantum Clones: Multiple Copying of Qubits
Fortschr. Phys. 46 (998) 4 ±5, 5 ±5 Flocks of Quantum Clones: Multiple Copying of Qubits V. BuzÏek ;, M. Hillery and P. L. Knight 4 Institute of Physics, Slovak Academy of Sciences, DuÂbravska cesta 9,
More informationUnconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi
More informationGeometry of Entanglement
Geometry of Entanglement Bachelor Thesis Group of Quantum Optics, Quantum Nanophysics and Quantum Information University of Vienna WS 21 2659 SE Seminar Quantenphysik I Supervising Professor: Ao. Univ.-Prof.
More informationTeleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis
More informationFINDING DECOMPOSITIONS OF A CLASS OF SEPARABLE STATES
FINDING DECOMPOSITIONS OF A CLASS OF SEPARABLE STATES ERIK ALFSEN AND FRED SHULTZ Abstract. We consider the class of separable states which admit a decomposition i A i B i with the B i s having independent
More informationKey distillation from quantum channels using two-way communication protocols
Key distillation from quantum channels using two-way communication protocols Joonwoo Bae and Antonio Acín ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels, Barcelona,
More informationPermutations and quantum entanglement
Journal of Physics: Conference Series Permutations and quantum entanglement To cite this article: D Chruciski and A Kossakowski 2008 J. Phys.: Conf. Ser. 104 012002 View the article online for updates
More informationarxiv:quant-ph/ v2 17 Jun 1996
Separability Criterion for Density Matrices arxiv:quant-ph/9604005v2 17 Jun 1996 Asher Peres Department of Physics, Technion Israel Institute of Technology, 32000 Haifa, Israel Abstract A quantum system
More informationA. Quantum Key Distribution
A. Quantum Key Distribution The purpose of QKD is to establish a string of random bits (the key ) shared by Alice and Bob, where Alice and Bob can be highly confident that eavesdropper Eve knows almost
More informationLecture: Quantum Information
Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers
More informationDECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS
DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS SCOTT HOTTOVY Abstract. Quantum networks are used to transmit and process information by using the phenomena of quantum mechanics.
More informationRemarks on the Additivity Conjectures for Quantum Channels
Contemporary Mathematics Remarks on the Additivity Conjectures for Quantum Channels Christopher King Abstract. In this article we present the statements of the additivity conjectures for quantum channels,
More informationHIGHER RANK NUMERICAL RANGES OF NORMAL MATRICES
HIGHER RANK NUMERICAL RANGES OF NORMAL MATRICES HWA-LONG GAU, CHI-KWONG LI, YIU-TUNG POON, AND NUNG-SING SZE Abstract. The higher rank numerical range is closely connected to the construction of quantum
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationQuantum entanglement and symmetry
Journal of Physics: Conference Series Quantum entanglement and symmetry To cite this article: D Chrucisi and A Kossaowsi 2007 J. Phys.: Conf. Ser. 87 012008 View the article online for updates and enhancements.
More informationLecture Notes. Quantum Cryptography Week 2: The Power of Entanglement
Lecture Notes Quantum Cryptography Week : The Power of Entanglement This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Licence. Contents.1 Entanglement
More informationUniversally composable and customizable post-processing for practical quantum key distribution
Title Universally composable and customizable post-processing for practical quantum key distribution Author(s) Ma, X; Fung, CHF; Boileau, JC; Chau, HF Citation Computers And Security, 2011, v. 30 n. 4,
More informationLinear and Multilinear Algebra. Linear maps preserving rank of tensor products of matrices
Linear maps preserving rank of tensor products of matrices Journal: Manuscript ID: GLMA-0-0 Manuscript Type: Original Article Date Submitted by the Author: -Aug-0 Complete List of Authors: Zheng, Baodong;
More informationarxiv: v2 [quant-ph] 17 Nov 2016
Improved Uncertainty Relation in the Presence of Quantum Memory Yunlong Xiao, 1, Naihuan Jing, 3,4 Shao-Ming Fei, 5, and Xianqing Li-Jost 1 School of Mathematics, South China University of Technology,
More informationarxiv: v2 [quant-ph] 21 Oct 2013
Genuine hidden quantum nonlocality Flavien Hirsch, 1 Marco Túlio Quintino, 1 Joseph Bowles, 1 and Nicolas Brunner 1, 1 Département de Physique Théorique, Université de Genève, 111 Genève, Switzerland H.H.
More informationUniqueness of the Solutions of Some Completion Problems
Uniqueness of the Solutions of Some Completion Problems Chi-Kwong Li and Tom Milligan Abstract We determine the conditions for uniqueness of the solutions of several completion problems including the positive
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,
More informationDistinguishing different classes of entanglement for three qubit pure states
Distinguishing different classes of entanglement for three qubit pure states Chandan Datta Institute of Physics, Bhubaneswar chandan@iopb.res.in YouQu-2017, HRI Chandan Datta (IOP) Tripartite Entanglement
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationIntroduction to Quantum Mechanics
Introduction to Quantum Mechanics R. J. Renka Department of Computer Science & Engineering University of North Texas 03/19/2018 Postulates of Quantum Mechanics The postulates (axioms) of quantum mechanics
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantumness versus Classicality of Quantum States Berry Groisman 1, Dan Kenigsberg 2 and Tal Mor 2 1. Centre for Quantum Computation, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce
More informationLecture 19 October 28, 2015
PHYS 7895: Quantum Information Theory Fall 2015 Prof. Mark M. Wilde Lecture 19 October 28, 2015 Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike
More informationEntanglement, mixedness, and spin-flip symmetry in multiple-qubit systems
Boston University OpenBU College of General Studies http://open.bu.edu BU Open Access Articles 2003-08-01 Entanglement, mixedness, and spin-flip symmetry in multiple-qubit systems Jaeger, Gregg AMER PHYSICAL
More informationStructure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev
Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev The Superposition Principle (Physicists): If a quantum
More informationSecurity of Quantum Key Distribution with Imperfect Devices
Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo
More informationarxiv: v3 [quant-ph] 30 Oct 2017
Noname manuscript No (will be inserted by the editor) Lower bound on concurrence for arbitrary-dimensional tripartite quantum states Wei Chen Shao-Ming Fei Zhu-Jun Zheng arxiv:160304716v3 [quant-ph] 30
More informationarxiv:quant-ph/ Oct 2002
Measurement of the overlap between quantum states with the use of coherently addressed teleportation Andrzej Grudka* and Antoni Wójcik** arxiv:quant-ph/00085 Oct 00 Faculty of Physics, Adam Mickiewicz
More informationEnsembles and incomplete information
p. 1/32 Ensembles and incomplete information So far in this course, we have described quantum systems by states that are normalized vectors in a complex Hilbert space. This works so long as (a) the system
More informationPractical quantum-key. key- distribution post-processing
Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert
More informationEntanglement and non-locality of pure quantum states
MSc in Photonics Universitat Politècnica de Catalunya (UPC) Universitat Autònoma de Barcelona (UAB) Universitat de Barcelona (UB) Institut de Ciències Fotòniques (ICFO) PHOTONICSBCN http://www.photonicsbcn.eu
More informationarxiv:quant-ph/ v1 10 Apr 2006
Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification
More informationCS286.2 Lecture 15: Tsirelson s characterization of XOR games
CS86. Lecture 5: Tsirelson s characterization of XOR games Scribe: Zeyu Guo We first recall the notion of quantum multi-player games: a quantum k-player game involves a verifier V and k players P,...,
More informationCLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/2 PARTICLES
CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/ PARTICLES S. Ghosh, G. Kar, and A. Roy Physics and Applied Mathematics Unit Indian Statistical Institute 03, B. T. Road Calcutta 700 035 India. E
More informationGilles Brassard. Université de Montréal
Gilles Brassard Université de Montréal Gilles Brassard Université de Montréal VOLUME 76, NUMBER 5 P H Y S I C A L R E V I E W L E T T E R S 29 JANUARY 1996 Purification of Noisy Entanglement and Faithful
More informationPrinciples of Quantum Mechanics Pt. 2
Principles of Quantum Mechanics Pt. 2 PHYS 500 - Southern Illinois University February 9, 2017 PHYS 500 - Southern Illinois University Principles of Quantum Mechanics Pt. 2 February 9, 2017 1 / 13 The
More informationCANONICAL FORMS, HIGHER RANK NUMERICAL RANGES, TOTALLY ISOTROPIC SUBSPACES, AND MATRIX EQUATIONS
CANONICAL FORMS, HIGHER RANK NUMERICAL RANGES, TOTALLY ISOTROPIC SUBSPACES, AND MATRIX EQUATIONS CHI-KWONG LI AND NUNG-SING SZE Abstract. Results on matrix canonical forms are used to give a complete description
More information