Conditions for degradability of tripartite quantum states

Size: px
Start display at page:

Download "Conditions for degradability of tripartite quantum states"

Transcription

1 Title Conditions for degradability of tripartite quantum states Author(s Fung, FCH; Li, CK; Sze, NS; Chau, HF Citation Journal of Physics A: Mathematical and Theoretical, 014, v. 47 n. 11, p. article no Issued Date 014 URL Rights Journal of Physics A: Mathematical and Theoretical. Copyright Institute of Physics Publishing Ltd.; This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

2 Conditions for degradability of tripartite quantum states Chi-Hang Fred Fung Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road, Hong Kong Chi-Kwong Li Department of Mathematics, College of William & Mary, Williamsburg, Virginia , USA Nung-Sing Sze Department of Applied Mathematics, The Hong Kong Polytechnic University, Hung Hom, Hong Kong H. F. Chau Department of Physics and Center of Theoretical and Computational Physics, University of Hong Kong, Pokfulam Road, Hong Kong Abstract Alice, Bob, and ve share a pure quantum state. We introduce the notion of state degradability by asking whether the joint density of Alice and ve can be transformed to the joint density of Alice and Bob by processing ve s part through a quantum channel, in order words, degrading ve. We prove necessary and sufficient conditions for state degradability and provide an efficient method to quickly rule out degradability for a given state. The problem of determining degradability of states is different from that of quantum channels, although the notion is similar. One application of state degradability is that it can be used to test channel degradability. In particular, the degradability of the output state of a channel obtained from the maximally entangled input state gives information about the degradability of the channel. 1 Introduction In quantum information processing, information is often encoded in quantum states which are transformed under quantum computation in order to carry out tasks such as the generation of secret keys [1, ], encoding of error correcting codes [3, 4, 5, 6], and secret sharing [7, 8]. The general quantum state transformation problem concerns whether a state can be transformed via a quantum process to another state, possibly with some constraint on the quantum process. In as early as 1980 s, Alberti and Uhlmann [9] studied the conditions for transforming two qubit mixed states. Subsequently, conditions for the transformations between two sets of pure states without any restriction on the number of states were found [10, 11, 1, 13]. The transformation of entangled 1

3 states under the condition that the two parties perform local operations has also been studied for a single bipartite state [14, 15, 16, 17, 18, 19] and for multiple bipartite states [0]. xtension to transformations for more than two parties has also been considered [1]. In this paper, we introduce the notion of state degradability, which is based on a transformation problem where we ask whether a subsystem can be degraded to another subsystem. More precisely, consider a quantum state in ψ H A H B shared by Alice and Bob. Assume that this state is processed by ve and becomes an entangled state ψ H A H B H. (In the context of quantum key distribution (QKD, such processing corresponds to eavesdropping by ve or the noisy effect of the channel. We are interested in constructing a quantum process T : H A H H A H B of the form r T (X = (I A F j X(I A F j with F j : H H B satisfying j=1 r Fj F j = I (1 j=1 such that T (ρ A = ρ AB for ρ A = tr B (ρ B(H A H, ρ AB = tr (ρ B(H A H B with ρ = ψ ψ, where B(H is the set of bounded, positive-semidefinite operators acting on H, and r is the number of Kraus operators of the quantum channel T which can be arbitrary. If such a map T exists, we call the state ψ B degradable. Similarly, if there exists a quantum channel T : H A H B H A H such that T (ρ AB = ρ A, we call the state B degradable. A state may be B and B degradable. It is interesting to know whether a state is degradable. For example, in QKD if the joint state between Alice and Bob can be shown to be the same as the joint state between Alice and ve via some processing of ve s part, then no secret key can be generated with one-way postprocessing [, 3, 4]. Also, state degradability is related to asymmetric quantum cloning [5, 6, 7], in which the two output subsystems are not necessarily copies of each other, but one subsystem can be transformed to be a clone of the other. If a given state is degradable, it means it could have been produced by asymmetric cloning of some other state. Degradability has been studied in the context of quantum channels [8, 9]. Let us consider a channel in system B which is described as a unitary transformation with ancillary system prepared in a standard state: Φ B (ρ B = tr [U B (ρ B 0 U B]. Note that this system A does not appear in this definition of degradable channel. This induces the complementary channel Φ (ρ B = tr B [U B (ρ B 0 U B]. The channel Φ B is called degradable when it may be degraded to Φ, that is, there exists a quantum channel ˆT : H B H such that ˆT Φ B = Φ. Similarly, Φ B is called anti-degradable when there exists a quantum channel ˆT : H H B such that ˆT Φ = Φ B.

4 It is clear that a degradable (anti-degradable channel always output a state that is B ( B degradable for any input. On the other hand, there are channels that output a degradable state for some input and a non-degradable state for another input. For example, consider this channel: 0 B 00 B 1 B 11 B B 10 B. For the input 00 AB + 11 AB, we get the output 000 AB AB which is B and B degradable. But for the input 00 AB + 11 AB + AB, we get 000 AB AB + 10 AB. For this state, since to degrade to B, has to change to 0 B and 1 B, which is not possible without knowing A. Thus, the output state is not B degradable. With a similar argument, it is also not B degradable. This shows that a channel may output both degradable and non-degradable states. Therefore, it is a new problem to study degradable states without reference to whether the channel generating that state is degradable or not. As one application of state degradability, we prove in Sec. 5 that state degradability can be used to test channel degradability. In particular, the degradability of the output state of a channel obtained from the maximally entangled input state gives information about the degradability of the channel. We show that if the channel output state of the maximally entangled input state is degradable, then the corresponding output state of the channel is degradable for any input state. Also, if the channel output state of the maximally entangled input state is not degradable, then the corresponding output state is not degradable for any input state in a special class. In some applications, the issue of state degradability arises naturally in that Alice, Bob, and ve are initially given a tripartite state, without regard to the details of how it is given. This may occur due to, for example, an entanglement source generating a tripartite state, or an unknown quantum channel processing one part of a bipartite input. As a specific example, in entanglement distillation [30], the problem is often cast as that given a noisy state in AB, which is purified to a tripartite state in AB, the goal is to transform it (through, e.g., local operations and classical communications to a maximally entangled state. This can be viewed as a problem of a given initial state. A similar situation occurs in QKD [1, ]. After the quantum state transmission step, Alice and Bob are given bipartite states which they would like to transform to a secret key. They first learn about their states by error testing and then choose the appropriate procedures to correct bit errors and amplify privacy. This is also a problem centered on a given state. And as mentioned before, if the state is degradable, no secret key can be generated with one-way postprocessing [, 3, 4]; and thus no maximal entanglement can be distilled. We formulate the mathematical problem as follows. State-Degradability Problem Let x C n C p C q. Let X i = tr i (xx with i = 1,, 3, be the partial traces of xx in the three subsystems: C p C q, C n C q, and C n C p. Determine conditions on x (or a class of x such that there is T of the form (1 such that T (X = X 3. Here, 3

5 we adopt the mathematical notation: X 1 = ρ B, X = ρ A, and X 3 = ρ AB. It turns out that this notation allows our mathematical results in the following sections to be concisely described. We will however switch back to the physicist notation of A, B, when we discuss examples of physical relevance. Also, we use the notations M p to denote the set of p p matrices and M p,q the set of p q matrices. In this paper, we consider systems of finite dimensions. The problem of determining whether a state is degradable is similar to the problem of finding a symmetric extension of a state [3] in that both problems are characterized by the generation of Alice and Bob s state by processing ve s part of Alice and ve s state. However, in the latter problem, we are given Alice and Bob s state and we seek an extension that adds ve to the overall state, while in our state degradability problem, a tripartite state is given initially. We first give low dimension examples in Sec. which helps to understand the nature of the problem. Then, in Sec. 3, we prove necessary and sufficient conditions for our state-degradability problem as stated above. We discuss the physical interpretation of the transformability conditions in Sec. 4. Sec. 5 discusses state degradability when a quantum channel is used to generate the overall state. The transformability conditions might be difficult to verify in general, and thus we propose an easily computable method that can quickly rule out degradability of a given state in Sec. 6. We discuss some additional problems and observations in Sec. 7. Finally, we conclude in Sec. 8. Low dimension examples xample 1. Suppose x = (x 1,..., x 8 t C 8 3 (C. Let xx M 8 and tr 1, tr, tr 3 be the partial trace on the three systems. Then X 1 = tr 1 (xx = (x 1 x x 3 x 4 t ( x 1 x x 3 x 4 + (x 5 x 6 x 7 x 8 t ( x 5 x 6 x 7 x 8, X = tr (xx = (x 1 x x 5 x 6 t ( x 1 x x 5 x 6 + (x 3 x 4 x 7 x 8 t ( x 3 x 4 x 7 x 8, X 3 = tr 3 (xx = (x 1 x 3 x 5 x 7 t ( x 1 x 3 x 5 x 7 + (x x 4 x 6 x 8 t ( x x 4 x 6 x 8, where for ease of notations, we omitted the commas in the vectors such as (x 1, x, x 3, x 4. would like to know whether there is T : M 4 M 4 of the form We T (X = j (I F j X(I F j with j F j F j = I such that T (X = X 3. xample. Let x = (a, 0, b, 0, 0, a, 0, b t with (a + b = 1. This state is non-trivial since it is not symmetric in and 3. Then X = a + b 0 0 a b a b 0 0 a + b and X 3 = 4 a ab 0 0 ab b a ab 0 0 ab b.

6 Let ( a a F 1 = b b ( a a and F =. b b Then F 1 F 1 + F F = I, and T (X = X 3 if T (X = (I F 1 X (I F 1 + (I F X (I F. Proposition.1. In xamples 1 and, the desired map exists if and only if there are F 1,..., F r with r j=1 F j F j = I such that the map L : M M defined by satisfies L(R i R j = S is j ( x1 x R 1 = 3 x x 4 L(X = for 1 i, j, where, R = ( x5 x 7 x 6 x 8 r F j XFj j=1, S 1 = ( x1 x x 3 x 4, S = ( x5 x 6 x 7 x 8. Remark Alternatively, we can check whether there is a TPCP map T sending R 1 R 1, R R, (R 1 + R (R 1 + R, (R 1 + ir (R 1 + ir to S 1 S 1, S S, (S 1 + S (S 1 + S, (S 1 + is (S 1 + is. This can be checked readily. xample 3. Suppose x = (x 1,..., x 16 C C C 4. Let xx M 16 and tr 1, tr, tr 3 be the partial trace on the three systems. Then X 1 = tr 1 (xx = (x 1 x 8 t ( x 1 x 8 + (x 9 x 16 t ( x 9 x 16, X = tr (xx = u 1 u 1 + u u = [u 1 u ][u 1 u ], with and u 1 = (x 1 x x 3 x 4 x 9 x 10 x 11 x 1 t, u = (x 5 x 6 x 7 x 8 x 13 x 14 x 15 x 16 t, X 3 = tr 3 (xx = v 1 v v 4 v 4 = [v 1 v 4 ][v 1 v 4 ] v 1 = (x 1 x 5 x 9 x 13 t, v = (x x 6 x 10 x 14 t, v 3 = (x 3 x 7 x 11 x 15 t, v 4 = (x 4 x 8 x 1 x 16 t. We would like to know whether there is T : M 8 M 4 of the form T (X = j (I F j X(I F j with j F j F j = I 4 such that T (X = X 3. 5

7 Proposition.. Using the notation of xample 3, let x 1 x 5 x 9 x 13 R 1 = x x 6 x 3 x 7, R = x 10 x 14 x 11 x 15, x 4 x 8 x 1 x 16 ( ( x1 x S 1 = x 3 x 4 = R t x9 x x 5 x 6 x 7 x 1, S = 10 x 11 x 1 = R 8 x 13 x 14 x 15 x. t 16 Then, in xample 3, the desired map exists if and only if there exists a TPCP map sending R 1 R 1, R R, (R 1 + R (R 1 + R, (R 1 + ir (R 1 + ir to S 1 S 1, S S, (S 1 + S (S 1 + S, (S 1 + is (S 1 + is. We remark that Propositions.1 and. are special cases of Theorem 3.1 below. 3 General result Suppose x = (x ijk C n C p C q. We always assume that the entries of x are arranged in lexicographic (dictionary order of the indexes (ijk, i.e., x 111 is the first entry and x npq is the last entry. Theorem 3.1. Suppose x = (x ijk C n C p C q. Then tr 1 (xx = n i=1 (x ijk(x ijk M p,q, X = tr (xx = p (x ijk (x ijk M n,q, X 3 = tr 3 (xx = j=1 q (x ijk (x ijk M n,q. k=1 Let S i = (x ijk 1 j p,1 k q M p,q and R i = S t i M q,p for i = 1,..., n. Suppose R i has rank k i for i = 1,..., n. Set R i = U i D i V t i such that D i M ki is a diagonal matrix with positive diagonal entries arranged in descending order, U i and V i have orthonormal columns. Then the following conditions are equivalent. (a There is a TPCP map T : M n M q M n M p of the form X satisfying T (X = X 3. r (I n F j X(I n F j with F 1,..., F r M p,q ( j=1 (b There is a TPCP map sending {R u R v : 1 u, v n} to {S u S v : 1 u, v n}. 6

8 (c There are p q matrices F 1,..., F r with r j=1 F j F j = I q and k i p matrices W i1,..., W ir such that for all i, j = 1,..., n, [F 1 R i F r R i ] = V i D i [W i1 W ir ] and [W i1 W ir ][W j1 W jr ] = U t i U j. Proof. Direct checking shows that X = (R u R v 1 u,v n and X 3 = (S u S v 1 u,v n. The map in the form ( will send X to X 3 if and only if r j=1 (F jr u R vf j = (S u S v 1 u,v n. quivalently, the TPCP map Y r j=1 F jy F j will send R ur v to S u S v for 1 u, v n. Thus, (a and (b are equivalent. Suppose (b holds. Then for any 1 i, j n, l F l R i R j F l = V id i U t i U j D j V j. Considering i = j, we see that col(f l U i D i col(v i D i, where col(x denotes the column space of X. Thus, F l R i = V i D i W il for a suitable k i p matrix W il. Now, l F l R i R j F l = V id i [W i1 W ir ][W j1 W jr ] D j V j Multiplying Di 1 Vi to the left and multiplying V j D j to the right, see that [W i1 W ir ][W j1 W jr ] = U t i U j as asserted in (c. The converse can be checked directly. = V i D i U t i U j D j V j. Theorem 3.. Use the notation in Theorem 3.1. Suppose R i = u i d i vi t is rank one for i = 1,..., n. Then conditions (a - (c in Theorem 3.1 are equivalent to the following. (d There are unit vectors γ 1,..., γ n C r and a unitary U such that U[e 1 u 1... e 1 u n ] = [γ 1 v 1 γ n v n ]. (e There is a correlation matrix C such that (u i u j = (v i v j C. (f There exists a TPCP map sending u i u i to v iv i for i = 1,..., n. Here, we abuse the notation of e 1 u i to represent a vector in C pr with the first q elements being u i and the remaining elements being zero. Proof. Using condition (c and focusing on the column space and row space of F l u j d j vj t = v jwjl t, we see that w jl = d j γ jl v j for some γ jl C for j = 1,..., n, and (u t iu j = ((γ i v i t (γ j v j = (γiγ t j (viv t j, where γ i = (γ i1,..., γ ir t is a unit vector for i = 1,..., n. Thus, there is a unitary U M pr such that U[e 1 u 1... e 1 u n ] = [γ 1 v 1 γ n v n ]. If (d holds, one can check condition (c readily. The equivalence of (d, (e, (f follow from the results in Ref. [31]. 7

9 Corollary 3.3. Use the notation in Theorem 3.. The following are equivalent. (a There are TPCP maps T = I n T 1 and L = I n L 1 such that T (X = X 3 and L(X 3 = X. (b There is a diagonal unitary matrix M n such that (u i u j = (v i v j. (c We may enlarge [u 1 u n ] and [v 1... v n ] by adding zero rows to get m n matrices Ũ and Ṽ with m = max{p, q} such that W Ũ = Ṽ for a unitary W M m and a diagonal unitary M n. In xample, we have R 1 = a 11 + b and R = a 1 b. There is TPCP map sending X 3 to X if and only if a b = 0. In such a case, we can set L(X = (I GX(I G with ( a b G = (a + b 1/ = ( a b. By the fact that a a b a b + b = 1/ and a b = 0, we see that L(X 3 = X. 4 Physical interpretation of the transformability conditions Using the physics notation, Alice, Bob, and ve share a tripartite pure state Ψ AB which corresponds to x in Sec. 3 with x ijk = ijk Ψ AB where ijk AB is an eigenstate in the computational basis (note that the indexes start at 1 instead of the usual 0. Define Ψ i B ( i A I B Ψ AB, which is a state conditional on A being i A. Thus, we have Ψ AB = n i A Ψ i B. i=1 According to the definitions of R i and S i, In other words, ρ (i ρ (i B. R i R i = tr B ( Ψ i B Ψ i ρ (i and S i S i = tr ( Ψ i B Ψ i ρ (i B for i = 1,..., n. is the reduced density matrix of conditioned on A being i A ; similarly for Note that for the rest of this section, we use the physics notation of A, B, to label states. If ve can imitate Bob using quantum channel (i.e., (ρ A = ρ AB, then for any φ A. φ A (ρ A φ A = φ A ρ AB φ A (3 Thus, when the projections are on the computational basis for A, the quantum channel is able to transform ρ (i to ρ(i B, i.e., (R i R i = S i S i, (4 for i = 1,..., n. On the other hand, the transformability condition of Theorem 3.1 (b includes additional cross terms (i.e., R u R v S u S v for u v. ssentially, the transformability of the cross terms guarantees the transformability of to B in other bases. To see this, consider the {+, } complementary basis for A where we define ± A = ( 1 A ± A /. If ve is able to pretend to be 8

10 Bob, (3 means that the transformation ρ (± ρ(± B ρ (± B is possible, where ρ(± tr B( Ψ ± B Ψ ±, tr ( Ψ ± B Ψ ±, and Ψ ± B = ( Ψ 1 B ± Ψ B /. In other words, (3 becomes (ρ (± = ρ(± B (R 1 R 1 + R R ± R 1 R ± R R 1 = S 1 S 1 + S S ± S 1 S ± S S 1. (6 (5 Here, the reduced density matrix of conditioned on A being ± A is ρ (± = R ±R±. According to the definition of R i which is a rearragement of the elements of Ψ i B for i = +,, 1,, R ± = (R 1 ± R /. We have similar expressions for B. Given (4, (6 is true if and only if (R 1 R + R R 1 = S 1 S + S S 1. This shows that the transformability of the cross terms R u R v S u S v for u v guarantees the transformability of to B in other bases. Therefore, one cannot simplify the condition checking of Theorem 3.1 (b by ignoring the cross terms. The following example illustrates this point by showing that there exists a state for which R u R v S u S v for u = v but not u v. xample 4. The initial state is a 3 system in A, B, and : [( ( ( ( α a α a Ψ AB = 1 A + β b β b B B ( ( ( α a α A + 3 ıβ b A ıβ B B ] 1 A [ p + B φ + + p B φ + ] + ( a b (7 where α, β = 1 α, a, b = 1 a R, and ı = 1. A q + B φ A q B φ (8 Our goal is to show that there exists a quantum channel such that (i (ρ (j = ρ(j B, j = 1,, 3, i.e., and (ii there does not exist a quantum channel such that This means that (9 does not imply (10. (R j R j = S j S j, j = 1,, 3, (9 (R j Rk = S jsk, j, k = 1,, 3. (10 We show that (9 holds but (5 does not hold for the state in (7. Proof of the validity of (9 First, we show that (9 holds. Assume that φ + φ < q + q and so there exists a quantum channel that transforms φ ± q ±. This can be verified by comparing the Gram matrices of the initial set of states and the final one [10, 11, 1, 13]. 9

11 The quantum channel is equivalent to a unitary transformation U Hilbert space : using an extended Ψ AB = U Ψ AB (11 = 1 A Ψ 1 B + A Ψ B + 3 A Ψ 3 B (1 where Ψ j = U B Ψ j B, j = 1,, 3. Note that (R j Rj Ψ = tr B ( j Ψ j = (ρ (j. B In order that (ρ ( = ρ( B = q + q +, U must transform as U Ψ B = U q + B φ + = q + B q + x +, where x + is some normalized vector. Similarly, (ρ (3 = ρ(3 B implies that U Ψ 3 B = q B q x, where x is some normalized vector. Then, we have Ψ AB = 1 A [ p + B q + x + + p B q x ] + We now verify that (ρ (1 = ρ(1 B. The LHS is (ρ (1 A q + B q + x A q B q x (13 = tr B ( Ψ 1 B Ψ 1 [ ] = tr B P ( p + B q + x + + p B q x = q + q + + q q + C q + q + C q q + where P ( ϕ ϕ ϕ, and C p p + B x x +. Substituting the various vectors using (7, ( ( ( (ρ (0 α = 0 α ıαβ 0 β + C ıαβ β + C α ıαβ ıαβ β. (14 The RHS is ρ (1 B = tr ( Ψ 1 B Ψ 1 ] = tr [P ( p + B φ + + p B φ = p + B p + + p B p + φ φ + p + B p + φ + φ p B p + ( ( α 0 = 0 β + (a b α 0 0 β. This means that (ρ (1 = ρ(1 B if and only if C = a b. This is possible since we have assumed that φ + φ < q + q = p + p. We impose that x ± be chosen such that C = a b, and thus (ρ (j = ρ(j B for j = 1,, 3. 10

12 Invalidity of (5 for the state in (7 We now show that (5 does not hold given that C = (α β x x + = a b. (15 xpressing (13 in the {+, } basis, we have Ψ AB = U Ψ AB = 1 ] + A [( p + B + q + B q + x + + p B q x + 1 ] A [( p + B q + B q + x + + p B q x + We show that (ρ ( 3 A q B q x + A Ψ + + B A Ψ + 3 B A Ψ 3 B. ρ(. The LHS is B (ρ ( = tr B ( Ψ B Ψ [ = tr B P ( p ] + B q + x + + p B q x = p + p + q+ q + + q q + D q + q + D q q + where p + B = p + B q + B, and D p p + B x x +. Substituting the various vectors using (7, ( 0 p + B = (1 ıβ B and (ρ ( = β ( α ıαβ ıαβ β + where D = (1 ıβ x x +. The RHS is ( α ıαβ ıαβ β + D ( ( α ıαβ ıαβ β + D α ıαβ ıαβ β ρ ( B = tr ( Ψ B Ψ = tr [P ( p ] + B φ + + p B φ = p + B p + + p B p + φ φ + p + B p + φ + φ p B p + ( ( ( 0 0 α αβ = 0 β + αβ β + (a b 0 (1 + ıαβ (1 ıαβ β. To show that (ρ ( ρ( B, we compare their (1, 1 elements. The RHS is α, and the LHS is α (β D + D = α (β + 1 β x x +. However, due to the assumption in (15, x x + 1 in general. Therefore, (ρ ( ρ( B. 11

13 5 Degradability for a given quantum channel We discuss state degradability when the overall state is generated by a given quantum channel. We show that if the channel output state of the maximally entangled input state is degradable, then the corresponding output state is degradable for any input state. Also, if the channel output state of the maximally entangled input state is not degradable, then the corresponding output state is not degradable for any input state in a special class. Theorem 5.1. Suppose that a state ψ AB is generated by processing a state ψ AB by a channel Φ B acting on subsystem B with an ancilla in subsystem. The channel is implemented by a unitary extension U B as follows: ψ AB = (I A U B ψ AB U AB ψ AB, where Φ B (tr A (P ( ψ AB = tr A (P ( ψ AB with P ( =. We assume that the dimensions of subsystems A and B are the same, n, so that the maximally entangled state ψ M AB = n i=1 ii AB is defined. Using ψ M AB as the input state, if the output state U AB ψ M AB is B degradable with T of the form (1 [i.e., T satisfies T (ρ A = ρ AB where ρ A = tr B (ρ and ρ AB = tr (ρ with ρ = P (U AB ψ M AB ], then the output state U AB ψ AB is B degradable with the same T for any input state ψ AB. Proof. First, note that any state ψ AB can be expressed as ψ AB = (K A I B ψ M AB where K A = n i,j=1 j A i ji ψ AB. Note that K A is not necessarily invertible. Next, the condition for B degradability of the maximally entangled state means that T (ρ A = ρ AB (16 T ((K A Iρ A (K A I = (K A Iρ AB (K A I for any K A (17 where the last line is because T acts only on subsystem. Finally, the term on the LHS is (K A Iρ A (K A I = tr B [P (U AB (K A I B ψ M AB ] (18 and we have an analogous term on the RHS. Thus, we have = tr B [P (U AB ψ AB ] (19 T (tr B [P (U AB ψ AB ] = tr [P (U AB ψ AB ] (0 which means that the output state is B degradable for any input state ψ AB. Corollary 5.. For the channel Φ B, if the output state U AB ψ M AB is B degradable for the maximally entangled input state ψ M AB, then the channel Φ B is anti-degradable with respect to the complementary channel Φ [i.e., there exists a quantum channel ˆT : H H B such that ˆT Φ = Φ B ]. Here, in terms of U B, Φ B (ρ B = tr [U B (ρ B 0 U B], and (1 Φ (ρ B = tr B [U B (ρ B 0 U B]. ( 1

14 Proof. Since any state ρ B of dimension n can be purified with a subsystem A of dimension n such that ρ B = tr A (P ( ψ AB for some ψ AB, we can trace out subsystem A on both sides of q. (0 to get Φ processed by a channel acting on on the LHS and Φ B on the RHS. Remark 5.3. In the proof of Theorem 5.1, the operator K A performed on subsystem A can have an operational interpretation related to entanglement transformation. It may be viewed as a local filtering operation that can be implemented probabilistically by a quantum measurement. This operation locally transforms a maximally entangled state to any other given state (entangled or unentangled probabilistically. Theorem 5.4. Following the notations in Theorem 5.1, for the input state ψ M AB, if the output state U AB ψ M AB is not B degradable, then the output state U AB ψ AB is not B degradable for any input state ψ AB = (W A I B ψ M AB where W A is invertible. Proof. We prove by contradiction. Suppose that for some input state ψ AB, the output state U AB ψ AB is B degradable. We repeat the arguments in the proof of Theorem 5.1 with ψ AB and ψ M AB swapped and with K A = W 1. Then, qs. (16-(0 follow, concluding that A when the input state is ψ M AB, the output state is B degradable. assumption and thus proves the theorem. 6 Necessary condition for degradability This contradicts the We provide an easily computable method to rule out the degradability of a given state. It is based on the expression of degradability in condition (b of Theorem 3.1 and the contractivity of quantum channels under the trace distance. Definition 6.1. The trace norm of a matrix σ M q is tr σ = q j=1 λ j where λ j are the singular values of σ. Definition 6.. The trace distance between two matrices ρ, σ M q is d(ρ, σ = 1 tr ρ σ. Quantum channels are contractive under the trace distance for quantum states, i.e., d(ρ, σ d(f(ρ, F(σ for any density matrices ρ and σ and quantum channel F [3] (see also Theorem 9. of [33]. However, the matrices of concern in condition (b of Theorem 3.1, R i R j and S is j, are general matrices and may not be Hermitian and positive semi-definite. Nevertheless, we prove in Appendix A that quantum channels are contractive under any unitarily invariant norm for general matrices, of which the following theorem for the trace norm is a special case. Theorem 6.3. Given a TPCP map (quantum channel F : M q M p described by Kraus operators F 1,..., F r M p,q with r j=1 F j F j = I q acting on matrices σ M q (not necessarily quantum states, tr F(σ tr σ. 13

15 Corollary 6.4. If d(r i R j, R i R j < d(s is j, S i S j for some i, j, i, j, then condition (b of Theorem 3.1 does not hold. We prove by contradiction. If condition (b holds, then there exists some quantum channel F satisfying the transformations, and where the inequality is due to Theorem 6.3. d(s i S j, S i S j = 1 tr F(R ir j F(R i R j = 1 tr F(R ir j R i R j 1 tr R ir j R i R j = d(r i R j, R i R j Therefore, if we find the distance between the inputs of two transformations to be smaller than the distance between the outputs, the state is not degradable in the sense of Theorem 3.1. xample 5. Consider the output state processed by the qubit depolarizing channel: where ρ M is the input density matrix, X = (ρ = (1 ɛρ + ɛ 3 ZρZ + ɛ 3 Y ρy + ɛ XρX (3 3 ( 0 1, Y = 1 0 ( ( , and Z = Suppose the input state is ( AB and is applied to system B. The output state purified with system is Ψ AB = 1 ɛ ( AB + ɛ 3 ( AB + ɛ 3 ( AB 1 + ɛ 3 ( AB 3. (4 Note that this state is unnormalized, and normalization is not important in the following discussion.denote the coefficient for ijk AB by x ijk. Then, following Theorem 3.1, S 0 = S 1 = where α = 1 ɛ and β = ɛ 3, and ( ( x000 x 001 x 00 x 003 α β 0 0 = x 010 x 011 x 01 x β β ( ( x100 x 101 x 10 x β β = x 110 x 111 x 11 x 113 α β 0 0 (5 (6 R i = S t i. (7 14

16 We compute the trace distances as follows: R 0 R 0 R 1 R 1 = S 0 S 0 S 1 S 1 = R 0 R 1 R 1 R 0 = S 0 S 1 S 1 S 0 = 0 αβ 0 0 αβ β (8 0 0 β 0 ( α β 0 0 (α β (9 0 0 αβ β αβ (30 0 β 0 0 ( 0 α β (α β. (31 0 It can be shown that R 0 R 0 R 1R 1 and R 0R 1 R 1R 0 have singular values αβ, αβ, β, β, and S 0 S0 S 1S1 and S 0S1 S 1S0 have singular values (α + β(α β, (α + β(α β. Here, we assume α > β. Thus, d R d(r 0 R0, R 1R1 = d(r 0R1, R 1R0 = β(α + β and d S d(s 0 S0, S 1S1 = d(s 0 S1, S 1S0 = (α + β(α β. Therefore, we have the condition for the input distance being smaller than the output distance: d R < d S ɛ < 1 4. (3 Under this condition, there does not exist a quantum channel T acting on system such that T (ρ A = ρ AB. Here, ρ A = tr B ( Ψ AB Ψ and ρ AB = tr ( Ψ AB Ψ. By Theorem 5.4, the same conclusion holds for all other Bell states serving as the input state since all Bell states are unitarily transformable to each other. We can interpret the result in the context of quantum key distribution (QKD [1, ], in which two legitimate parties, conventionally named Alice and Bob (they correspond to systems A and B here, want to share a secret key against an eavesdropper ve (system here, by exchanging quantum states. These states may be modified by ve. In a typical QKD session, Alice and Bob learn about the quantum states by comparing measurement results in various measurement bases (such as X, Y, or Z. For each basis, we can compute the fraction of measurement mismatches, which is known as the quantum bit error rate (QBR. Note that the QKD protocol described here operates in a two-dimensional space, although the presentation of this paper treats arbitrary finite dimensions. Since the state in q. (3 is symmetric with respect to measurements in X, Y, and Z, the QBR for each of them is the same, ɛ/3. (This means that measurements in say the X basis produce an error rate of ɛ/3 when the channel input is an X eigenstate. Combining with q. (3, it means that when the QBR is less than 1/6, ve is not able to imitate Bob. Recall that if, on the other hand, ve is able to imitate Bob, no key can be generated using one-way postprocessing [, 3, 4]. Thus, our result here is consistent with the result that positive key rate is achievable when the QBR is less than 1/6 for the six-state protocol [34]. 15

17 7 Additional remarks and questions Direct application of Theorem 3. yields the following. Proposition 7.1. Use the notation in Theorem 3.1. The following are equivalent. (a There are TPCP maps T = I n T 1 and L = I n L 1 such that T (X = X 3 and L(X 3 = X. (b There is a TPCP map sending {R u R v : 1 u, v n} to {S u S v : 1 u, v n}, and a TPCP map sending {S u S v : 1 u, v n} to {R u R v : 1 u, v n}. (c There are p q matrices F 1,..., F r with r j=1 F j F j = I q and k i p matrices W i1,..., W ir such that for all i, j = 1,..., n, [F 1 R i F r R i ] = V i D i [W i1 W ir ] and [W i1 W ir ][W j1 W jr ] = U t i U j, and there are q p matrices F 1,..., F s with s j=1 F j F j = I p and k i q matrices W i1,..., W is such that for all i, j = 1,..., n, [ F 1 R t i F s R t i] = U i D i [ W i1 W is ] and [ W i1 W is ][ W j1 W js ] = V t i V j. Proposition 7.. The following are equivalent. (a There is a TPCP map sending R i R j to S is j. (b There is a TPCP map sending ( c i R i ( c j R j to ( c i S i ( c j S j for any scalars c 1,..., c n, c 1,..., c n. (c There is a TPCP map sending ( c i R i ( c j R j to ( c i S i ( c j S j for any scalars c 1,..., c n. By the above proposition, we can focus on a maximal linearly independent subset set {R 1,..., R m } and check whether there is a TPCP map sending R i R j to S is j for matrices R i, R j in this set. Note, however, that the above propositions are not very practical and it is desirable to have some more practical conditions. Problem Can we extend Corollary 3.3 and determine the condition for the existence of TPCP maps T = I n T 1 and L = I n L 1 such that T (X = X 3 and L(X 3 = X? 8 Concluding remarks In this paper, we introduced the notion of state degradability. The joint state of Alice and ve is degradable if ve s system can be processed by a quantum channel to produce a joint state that is the same as the joint state of Alice and Bob. We proved necessary and sufficient conditions for state degradability. The conditions are in general difficult to check, but we also provide an easily computable method to rule out degradability. This method is based on the fact that the trace distance between two states can only become smaller under the action of a quantum channel. One application of state degradability is that it can be used to test channel degradability. Analysis of the channel output state of the maximally entangled input state gives information about the 16

18 degradability of the channel. Another application of state degradability is in the analysis of QKD, in which no secret key can be generated by one-way postprocessing when the joint state between Alice and ve can be degraded to a joint state between Alice and Bob. For future work, we hope to investigate more connections between degradability and other quantum information processing tasks, and extend our result to the case where Alice, Bob, and ve share a mixed quantum state. A Proof of Theorem 6.3 A norm is unitarily invariant if X = UXV for any unitary U, V. Note that the trace norm is one such norm. Proposition A.1. Suppose B M p and A M q such that B = r j=1 F jaf j with F j F j = I q. Then, I r B r A O for any unitarily invariant norm on M pr. Proof. Let U = (U ij 1 i,j r be unitary such that U j1 = F j for j = 1,..., r. Then U(A OU = (A ij 1 i,j r such that A A rr = B. Take P = diag (1, w,.., w r 1 I p with w = e iπ/r. Then r 1 1 l r P l (A ij (P l = A 11 A rr. Now take Q = ( 1 + r 1,r + r,1 I p. Then 1 j r Qj (A 11 A rr (Q j = I r B. Thus, using the triangle inequality, I r B = 1 r r l,k=1 Q k P l U(A O(Q k P l U 1 r r l,k=1 A O = r A O. To prove Theorem 6.3, we just take to be the trace norm to get B = 1 r I r B A O = A. Acknowledgments We thank Zejun Huang and dward Poon for enlightening discussion. This research evolved in a faculty seminar on quantum information science at the University of Hong Kong in the spring of 01 coordinated by Chau and Li. The support of the Departments of Physics and Mathematics of the University of Hong Kong is greatly appreciated. Chau and Fung were partially supported by the Hong Kong RGC grant No P. Sze was partially supported by the Hong Kong RGC grant PolyU Li was supported by a USA NSF grant and a Hong Kong RGC grant; he was a visiting professor of the University of Hong Kong in the spring of 01, an honorary professor of Taiyuan University of Technology (100 Talent Program scholar, and an honorary professor of Shanghai University. 17

19 References [1] C. H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proc. of I Int. Conference on Computers, Systems, and Signal Processing, pages , I Press, New York, December [] A. K. kert. Quantum cryptography based on Bell s theorem. Phys. Rev. Lett., 67: , [3] P. W. Shor. Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A, 5:R493 R496, Oct [4] D. Gottesman. Class of quantum error-correcting codes saturating the quantum hamming bound. Phys. Rev. A, 54: , Sep [5] A. R. Calderbank,. M. Rains, P. W. Shor, and N. J. A. Sloane. Quantum error correction and orthogonal geometry. Phys. Rev. Lett., 78: , Jan [6] A. R. Calderbank,. M. Rains, P. W. Shor, and N. J. A. Sloane. Quantum error correction via codes over GF(4. I Trans. Inform. Theory, 44(4: , [7] M. Hillery, V. Bužek, and A. Berthiaume. Quantum secret sharing. Phys. Rev. A, 59: , Mar [8] A. Karlsson, M. Koashi, and N. Imoto. Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A, 59:16 168, Jan [9] P. Alberti and A. Uhlmann. A problem relating to positive linear maps on matrix algebras. Rep. Math. Phys., 18(: , [10] A. Uhlmann. ine bemerkung er vollstdig positive abbildungen von dichteoperatoren. Wiss. Z. Karl-Marx-Univ. Leipzig, Math.-Naturwiss. Reihe, 34(6:580 58, [11] A. Chefles. Deterministic quantum state transformations. Phys. Lett. A, 70(1:14 19, 000. [1] A. Chefles. Quantum operations, state transformations and probabilities. Phys. Rev. A, 65:05314, May 00. [13] A. Chefles, R. Jozsa, and A. Winter. On the existence of physical transformations between sets of quantum states. Int. J. Quant. Inf., (1:11 1, 004. [14] C. H. Bennett, H. J. Bernstein, S. Popescu, and B. Schumacher. Concentrating partial entanglement by local operations. Phys. Rev. A, 53:046 05, Apr [15] H.-K. Lo and S. Popescu. Concentrating entanglement by local actions: beyond mean values. Phys. Rev. A, 63:0301, Jan

20 [16] M. A. Nielsen. Conditions for a class of entanglement transformations. Phys. Rev. Lett., 83: , Jul [17] D. Jonathan and M. B. Plenio. Minimal conditions for local pure-state entanglement manipulation. Phys. Rev. Lett., 83: , Aug [18] B. He and J. A. Bergou. ntanglement transformation with no classical communication. Phys. Rev. A, 78:0638, Dec 008. [19] V. Gheorghiu and R. B. Griffiths. Separable operations on pure states. Phys. Rev. A, 78:00304, Aug 008. [0] H. F. Chau, C.-H. F. Fung, C.-K. Li,. Poon, and N.-S. Sze. ntanglement transformation between sets of bipartite pure quantum states using local operations. J. Math. Phys., 53(1:101, 01. [1] G. Gour and N. R. Wallach. Necessary and sufficient conditions for local manipulation of multipartite pure quantum states. New Journal of Physics, 13(7:073013, 011. [] D. Bruß, D. P. DiVincenzo, A. kert, C. A. Fuchs, C. Macchiavello, and J. A. Smolin. Optimal universal and state-dependent quantum cloning. Phys. Rev. A, 57: , Apr [3] M. L. Nowakowski and P. Horodecki. A simple test for quantum channel capacity. Journal of Physics A: Mathematical and Theoretical, 4(13:135306, 009. [4] T. Moroder, M. Curty, and N. Lütkenhaus. One-way quantum key distribution: Simple upper bound on the secret key rate. Phys. Rev. A, 74:05301, Nov 006. [5] N. J. Cerf. Asymmetric quantum cloning in any dimension. J. Mod. Opt., 47:187 09, 000. [6] J. Fiurášek, R. Filip, and N. J. Cerf. Highly asymmetric quantum cloning in arbitrary dimension. Quant. Inform. Comp., 5:583 59, 005. [7] S. Iblisdir, A. Acín, N. J. Cerf, R. Filip, J. Fiurášek, and N. Gisin. Multipartite asymmetric quantum cloning. Phys. Rev. A, 7:0438, Oct 005. [8] I. Devetak and P. W. Shor. The capacity of a quantum channel for simultaneous transmission of classical and quantum information. Comm. Math. Phys., 56(:87 303, 005. [9] T. S. Cubitt, M. B. Ruskai, and G. Smith. The structure of degradable quantum channels. J. Math. Phys., 49(10:10104, 008. [30] C. H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J. A. Smolin, and W. K. Wootters. Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett., 76:7 75, Jan

21 [31] Z. Huang, C.-K. Li,. Poon, and N.-S. Sze. Physical transformations between quantum states. J. Math. Phys., 53(10:1009, 01. [3] M. B. Ruskai. Beyond Strong Subadditivity? Improved Bounds on the Contraction of Generalized Relative ntropy. Rev. Math. Phys., 6: , [33] M. A. Nielsen and I. L. Chuang. Quantum Computation and Quantum Information. CUP, 000. [34] R. Renner, N. Gisin, and B. Kraus. Information-theoretic security proof for quantum-keydistribution protocols. Phys. Rev. A, 7:0133, Jul

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key

More information

LINEAR MAPS PRESERVING NUMERICAL RADIUS OF TENSOR PRODUCTS OF MATRICES

LINEAR MAPS PRESERVING NUMERICAL RADIUS OF TENSOR PRODUCTS OF MATRICES LINEAR MAPS PRESERVING NUMERICAL RADIUS OF TENSOR PRODUCTS OF MATRICES AJDA FOŠNER, ZEJUN HUANG, CHI-KWONG LI, AND NUNG-SING SZE Abstract. Let m, n 2 be positive integers. Denote by M m the set of m m

More information

Degradable Quantum Channels

Degradable Quantum Channels Degradable Quantum Channels Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA May 27, 2010 References The capacity of a quantum channel for simultaneous transmission of classical

More information

Theory of Quantum Entanglement

Theory of Quantum Entanglement Theory of Quantum Entanglement Shao-Ming Fei Capital Normal University, Beijing Universität Bonn, Bonn Richard Feynman 1980 Certain quantum mechanical effects cannot be simulated efficiently on a classical

More information

for all A M m and B M n Key words. Complex matrix, linear preserver, spectral norm, Ky Fan k-norm, Schatten p-norm, tensor product.

for all A M m and B M n Key words. Complex matrix, linear preserver, spectral norm, Ky Fan k-norm, Schatten p-norm, tensor product. LINEAR MAPS PRESERVING KY FAN NORMS AND SCHATTEN NORMS OF TENSOR PRODUCTS OF MATRICES AJDA FOŠNER, ZEJUN HUANG, CHI-KWONG LI, AND NUNG-SING SZE Abstract. For a positive integer n, let M n be the set of

More information

Some Bipartite States Do Not Arise from Channels

Some Bipartite States Do Not Arise from Channels Some Bipartite States Do Not Arise from Channels arxiv:quant-ph/0303141v3 16 Apr 003 Mary Beth Ruskai Department of Mathematics, Tufts University Medford, Massachusetts 0155 USA marybeth.ruskai@tufts.edu

More information

A new criterion and a special class of k-positive maps

A new criterion and a special class of k-positive maps A new criterion and a special class of k-positive maps Dedicated to Professor Leiba Rodman. Jinchuan Hou Department of Mathematics, Taiyuan University of Technology, Taiyuan, 030024, China. jinchuanhou@aliyun.com

More information

On PPT States in C K C M C N Composite Quantum Systems

On PPT States in C K C M C N Composite Quantum Systems Commun. Theor. Phys. (Beijing, China) 42 (2004) pp. 25 222 c International Academic Publishers Vol. 42, No. 2, August 5, 2004 On PPT States in C K C M C N Composite Quantum Systems WANG Xiao-Hong, FEI

More information

A Holevo-type bound for a Hilbert Schmidt distance measure

A Holevo-type bound for a Hilbert Schmidt distance measure Journal of Quantum Information Science, 205, *,** Published Online **** 204 in SciRes. http://www.scirp.org/journal/**** http://dx.doi.org/0.4236/****.204.***** A Holevo-type bound for a Hilbert Schmidt

More information

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36 QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING

More information

arxiv: v2 [quant-ph] 7 Apr 2014

arxiv: v2 [quant-ph] 7 Apr 2014 Quantum Chernoff bound as a measure of efficiency of quantum cloning for mixed states arxiv:1404.0915v [quant-ph] 7 Apr 014 Iulia Ghiu Centre for Advanced Quantum Physics, Department of Physics, University

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

On balance of information in bipartite quantum communication systems: entanglement-energy analogy

On balance of information in bipartite quantum communication systems: entanglement-energy analogy On balance of information in bipartite quantum communication systems: entanglement-energy analogy Ryszard Horodecki 1,, Micha l Horodecki 1, and Pawe l Horodecki 2, 1 Institute of Theoretical Physics and

More information

CHI-KWONG LI AND YIU-TUNG POON. Dedicated to Professor John Conway on the occasion of his retirement.

CHI-KWONG LI AND YIU-TUNG POON. Dedicated to Professor John Conway on the occasion of his retirement. INTERPOLATION BY COMPLETELY POSITIVE MAPS CHI-KWONG LI AND YIU-TUNG POON Dedicated to Professor John Conway on the occasion of his retirement. Abstract. Given commuting families of Hermitian matrices {A

More information

arxiv: v4 [quant-ph] 8 Mar 2013

arxiv: v4 [quant-ph] 8 Mar 2013 Decomposition of unitary matrices and quantum gates Chi-Kwong Li, Rebecca Roberts Department of Mathematics, College of William and Mary, Williamsburg, VA 2387, USA. (E-mail: ckli@math.wm.edu, rlroberts@email.wm.edu)

More information

arxiv: v1 [quant-ph] 3 Jan 2008

arxiv: v1 [quant-ph] 3 Jan 2008 A paradigm for entanglement theory based on quantum communication Jonathan Oppenheim 1 1 Department of Applied Mathematics and Theoretical Physics, University of Cambridge U.K. arxiv:0801.0458v1 [quant-ph]

More information

arxiv: v2 [quant-ph] 5 Dec 2013

arxiv: v2 [quant-ph] 5 Dec 2013 Decomposition of quantum gates Chi Kwong Li and Diane Christine Pelejo Department of Mathematics, College of William and Mary, Williamsburg, VA 23187, USA E-mail: ckli@math.wm.edu, dcpelejo@gmail.com Abstract

More information

Quantum Correlations as Necessary Precondition for Secure Communication

Quantum Correlations as Necessary Precondition for Secure Communication Quantum Correlations as Necessary Precondition for Secure Communication Phys. Rev. Lett. 92, 217903 (2004) quant-ph/0307151 Marcos Curty 1, Maciej Lewenstein 2, Norbert Lütkenhaus 1 1 Institut für Theoretische

More information

Application of Structural Physical Approximation to Partial Transpose in Teleportation. Satyabrata Adhikari Delhi Technological University (DTU)

Application of Structural Physical Approximation to Partial Transpose in Teleportation. Satyabrata Adhikari Delhi Technological University (DTU) Application of Structural Physical Approximation to Partial Transpose in Teleportation Satyabrata Adhikari Delhi Technological University (DTU) Singlet fraction and its usefulness in Teleportation Singlet

More information

Recovery in quantum error correction for general noise without measurement

Recovery in quantum error correction for general noise without measurement Quantum Information and Computation, Vol. 0, No. 0 (2011) 000 000 c Rinton Press Recovery in quantum error correction for general noise without measurement CHI-KWONG LI Department of Mathematics, College

More information

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

Ph 219/CS 219. Exercises Due: Friday 20 October 2006 1 Ph 219/CS 219 Exercises Due: Friday 20 October 2006 1.1 How far apart are two quantum states? Consider two quantum states described by density operators ρ and ρ in an N-dimensional Hilbert space, and

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol

Supplementary Material I. BEAMSPLITTER ATTACK The beamsplitter attack has been discussed [C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smol Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances Hoi-Kwong Lo 1 and H. F. Chau, 2y 1 Hewlett-Packard Labs, Filton Road, Stoke Giord, Bristol BS34 8QZ, U. K. 2 Department

More information

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Probabilistic exact cloning and probabilistic no-signalling. Abstract Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract

More information

The automorphism group of separable states in quantum information theory. University of Illinois at Chicago, Chicago, Illinois ,

The automorphism group of separable states in quantum information theory. University of Illinois at Chicago, Chicago, Illinois , The automorphism group of separable states in quantum information theory Shmuel Friedland, 1, a) Chi-Kwong Li, 2, b) Yiu-Tung Poon, 3, c) 4, d) and Nung-Sing Sze 1) Department of Mathematics, Statistics

More information

TELEBROADCASTING OF ENTANGLED TWO-SPIN-1/2 STATES

TELEBROADCASTING OF ENTANGLED TWO-SPIN-1/2 STATES TELEBRODCSTING OF ENTNGLED TWO-SPIN-/ STTES IULI GHIU Department of Physics, University of Bucharest, P.O. Box MG-, R-775, Bucharest-Mãgurele, Romania Receive December, 4 quantum telebroacasting process

More information

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector 1 Query model In the quantum query model we wish to compute some function f and we access the input through queries. The complexity of f is the number of queries needed to compute f on a worst-case input

More information

Quantum Hadamard channels (I)

Quantum Hadamard channels (I) .... Quantum Hadamard channels (I) Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. July 8, 2010 Vlad Gheorghiu (CMU) Quantum Hadamard channels (I) July 8, 2010

More information

Realizing probabilistic identification and cloning of quantum states via universal quantum logic gates

Realizing probabilistic identification and cloning of quantum states via universal quantum logic gates Realizing probabilistic identification and cloning of quantum states via universal quantum logic gates Chuan-Wei Zhang, Zi-Yang Wang, Chuan-Feng Li,* and Guang-Can Guo Laboratory of Quantum Communication

More information

Lecture 6: Quantum error correction and quantum capacity

Lecture 6: Quantum error correction and quantum capacity Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Local cloning of entangled states

Local cloning of entangled states Local cloning of entangled states Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. March 16, 2010 Vlad Gheorghiu (CMU) Local cloning of entangled states March

More information

RANKS OF QUANTUM STATES WITH PRESCRIBED REDUCED STATES

RANKS OF QUANTUM STATES WITH PRESCRIBED REDUCED STATES RANKS OF QUANTUM STATES WITH PRESCRIBED REDUCED STATES CHI-KWONG LI, YIU-TUNG POON, AND XUEFENG WANG Abstract. Let M n be the set of n n complex matrices. in this note, all the possible ranks of a bipartite

More information

Squashed entanglement

Squashed entanglement Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

arxiv: v3 [quant-ph] 5 Jun 2015

arxiv: v3 [quant-ph] 5 Jun 2015 Entanglement and swap of quantum states in two qubits Takaya Ikuto and Satoshi Ishizaka Graduate School of Integrated Arts and Sciences, Hiroshima University, Higashihiroshima, 739-8521, Japan (Dated:

More information

Quantum secret sharing based on quantum error-correcting codes

Quantum secret sharing based on quantum error-correcting codes Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,

More information

Maximizing the numerical radii of matrices by permuting their entries

Maximizing the numerical radii of matrices by permuting their entries Maximizing the numerical radii of matrices by permuting their entries Wai-Shun Cheung and Chi-Kwong Li Dedicated to Professor Pei Yuan Wu. Abstract Let A be an n n complex matrix such that every row and

More information

MP 472 Quantum Information and Computation

MP 472 Quantum Information and Computation MP 472 Quantum Information and Computation http://www.thphys.may.ie/staff/jvala/mp472.htm Outline Open quantum systems The density operator ensemble of quantum states general properties the reduced density

More information

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Coherence of Assistance and Regularized Coherence of Assistance by Ming-Jing Zhao, Teng Ma, and Shao-Ming Fei Preprint no.: 14 2018

More information

arxiv: v3 [math.ra] 22 Aug 2014

arxiv: v3 [math.ra] 22 Aug 2014 arxiv:1407.0331v3 [math.ra] 22 Aug 2014 Positivity of Partitioned Hermitian Matrices with Unitarily Invariant Norms Abstract Chi-Kwong Li a, Fuzhen Zhang b a Department of Mathematics, College of William

More information

Estimation of Optimal Singlet Fraction (OSF) and Entanglement Negativity (EN)

Estimation of Optimal Singlet Fraction (OSF) and Entanglement Negativity (EN) Estimation of Optimal Singlet Fraction (OSF) and Entanglement Negativity (EN) Satyabrata Adhikari Delhi Technological University satyabrata@dtu.ac.in December 4, 2018 Satyabrata Adhikari (DTU) Estimation

More information

Lecture 11 September 30, 2015

Lecture 11 September 30, 2015 PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

A scheme for protecting one-qubit information against erasure. error. Abstract

A scheme for protecting one-qubit information against erasure. error. Abstract A scheme for protecting one-qubit information against erasure error Chui-Ping Yang 1, Shih-I Chu 1, and Siyuan Han 1 Department of Chemistry, University of Kansas, and Kansas Center for Advanced Scientific

More information

Lecture 4: Purifications and fidelity

Lecture 4: Purifications and fidelity CS 766/QIC 820 Theory of Quantum Information (Fall 2011) Lecture 4: Purifications and fidelity Throughout this lecture we will be discussing pairs of registers of the form (X, Y), and the relationships

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

GENERALIZED NUMERICAL RANGES AND QUANTUM ERROR CORRECTION

GENERALIZED NUMERICAL RANGES AND QUANTUM ERROR CORRECTION J. OPERATOR THEORY 00:0(0000, 101 110 Copyright by THETA, 0000 GENERALIZED NUMERICAL RANGES AND QUANTUM ERROR CORRECTION CHI-KWONG LI and YIU-TUNG POON Communicated by Editor ABSTRACT. For a noisy quantum

More information

1. Basic rules of quantum mechanics

1. Basic rules of quantum mechanics 1. Basic rules of quantum mechanics How to describe the states of an ideally controlled system? How to describe changes in an ideally controlled system? How to describe measurements on an ideally controlled

More information

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute High Fidelity to Low Weight Daniel Gottesman Perimeter Institute A Word From Our Sponsor... Quant-ph/0212066, Security of quantum key distribution with imperfect devices, D.G., H.-K. Lo, N. Lutkenhaus,

More information

Generalized Interlacing Inequalities

Generalized Interlacing Inequalities Generalized Interlacing Inequalities Chi-Kwong Li, Yiu-Tung Poon, and Nung-Sing Sze In memory of Professor Ky Fan Abstract We discuss some applications of generalized interlacing inequalities of Ky Fan

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Entanglement: Definition, Purification and measures

Entanglement: Definition, Purification and measures Entanglement: Definition, Purification and measures Seminar in Quantum Information processing 3683 Gili Bisker Physics Department Technion Spring 006 Gili Bisker Physics Department, Technion Introduction

More information

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure

More information

Probabilistic quantum cloning via Greenberger-Horne-Zeilinger states

Probabilistic quantum cloning via Greenberger-Horne-Zeilinger states Probabilistic quantum cloning via Greenberger-Horne-Zeilinger states Chuan-Wei Zhang, Chuan-Feng Li,* Zi-Yang Wang, and Guang-Can Guo Laboratory of Quantum Communication and Quantum Computation and Department

More information

Bell inequality for qunits with binary measurements

Bell inequality for qunits with binary measurements Bell inequality for qunits with binary measurements arxiv:quant-ph/0204122v1 21 Apr 2002 H. Bechmann-Pasquinucci and N. Gisin Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland

More information

Compression and entanglement, entanglement transformations

Compression and entanglement, entanglement transformations PHYSICS 491: Symmetry and Quantum Information April 27, 2017 Compression and entanglement, entanglement transformations Lecture 8 Michael Walter, Stanford University These lecture notes are not proof-read

More information

Flocks of Quantum Clones: Multiple Copying of Qubits

Flocks of Quantum Clones: Multiple Copying of Qubits Fortschr. Phys. 46 (998) 4 ±5, 5 ±5 Flocks of Quantum Clones: Multiple Copying of Qubits V. BuzÏek ;, M. Hillery and P. L. Knight 4 Institute of Physics, Slovak Academy of Sciences, DuÂbravska cesta 9,

More information

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi

More information

Geometry of Entanglement

Geometry of Entanglement Geometry of Entanglement Bachelor Thesis Group of Quantum Optics, Quantum Nanophysics and Quantum Information University of Vienna WS 21 2659 SE Seminar Quantenphysik I Supervising Professor: Ao. Univ.-Prof.

More information

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis

More information

FINDING DECOMPOSITIONS OF A CLASS OF SEPARABLE STATES

FINDING DECOMPOSITIONS OF A CLASS OF SEPARABLE STATES FINDING DECOMPOSITIONS OF A CLASS OF SEPARABLE STATES ERIK ALFSEN AND FRED SHULTZ Abstract. We consider the class of separable states which admit a decomposition i A i B i with the B i s having independent

More information

Key distillation from quantum channels using two-way communication protocols

Key distillation from quantum channels using two-way communication protocols Key distillation from quantum channels using two-way communication protocols Joonwoo Bae and Antonio Acín ICFO-Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Castelldefels, Barcelona,

More information

Permutations and quantum entanglement

Permutations and quantum entanglement Journal of Physics: Conference Series Permutations and quantum entanglement To cite this article: D Chruciski and A Kossakowski 2008 J. Phys.: Conf. Ser. 104 012002 View the article online for updates

More information

arxiv:quant-ph/ v2 17 Jun 1996

arxiv:quant-ph/ v2 17 Jun 1996 Separability Criterion for Density Matrices arxiv:quant-ph/9604005v2 17 Jun 1996 Asher Peres Department of Physics, Technion Israel Institute of Technology, 32000 Haifa, Israel Abstract A quantum system

More information

A. Quantum Key Distribution

A. Quantum Key Distribution A. Quantum Key Distribution The purpose of QKD is to establish a string of random bits (the key ) shared by Alice and Bob, where Alice and Bob can be highly confident that eavesdropper Eve knows almost

More information

Lecture: Quantum Information

Lecture: Quantum Information Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers

More information

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS SCOTT HOTTOVY Abstract. Quantum networks are used to transmit and process information by using the phenomena of quantum mechanics.

More information

Remarks on the Additivity Conjectures for Quantum Channels

Remarks on the Additivity Conjectures for Quantum Channels Contemporary Mathematics Remarks on the Additivity Conjectures for Quantum Channels Christopher King Abstract. In this article we present the statements of the additivity conjectures for quantum channels,

More information

HIGHER RANK NUMERICAL RANGES OF NORMAL MATRICES

HIGHER RANK NUMERICAL RANGES OF NORMAL MATRICES HIGHER RANK NUMERICAL RANGES OF NORMAL MATRICES HWA-LONG GAU, CHI-KWONG LI, YIU-TUNG POON, AND NUNG-SING SZE Abstract. The higher rank numerical range is closely connected to the construction of quantum

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Quantum entanglement and symmetry

Quantum entanglement and symmetry Journal of Physics: Conference Series Quantum entanglement and symmetry To cite this article: D Chrucisi and A Kossaowsi 2007 J. Phys.: Conf. Ser. 87 012008 View the article online for updates and enhancements.

More information

Lecture Notes. Quantum Cryptography Week 2: The Power of Entanglement

Lecture Notes. Quantum Cryptography Week 2: The Power of Entanglement Lecture Notes Quantum Cryptography Week : The Power of Entanglement This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Licence. Contents.1 Entanglement

More information

Universally composable and customizable post-processing for practical quantum key distribution

Universally composable and customizable post-processing for practical quantum key distribution Title Universally composable and customizable post-processing for practical quantum key distribution Author(s) Ma, X; Fung, CHF; Boileau, JC; Chau, HF Citation Computers And Security, 2011, v. 30 n. 4,

More information

Linear and Multilinear Algebra. Linear maps preserving rank of tensor products of matrices

Linear and Multilinear Algebra. Linear maps preserving rank of tensor products of matrices Linear maps preserving rank of tensor products of matrices Journal: Manuscript ID: GLMA-0-0 Manuscript Type: Original Article Date Submitted by the Author: -Aug-0 Complete List of Authors: Zheng, Baodong;

More information

arxiv: v2 [quant-ph] 17 Nov 2016

arxiv: v2 [quant-ph] 17 Nov 2016 Improved Uncertainty Relation in the Presence of Quantum Memory Yunlong Xiao, 1, Naihuan Jing, 3,4 Shao-Ming Fei, 5, and Xianqing Li-Jost 1 School of Mathematics, South China University of Technology,

More information

arxiv: v2 [quant-ph] 21 Oct 2013

arxiv: v2 [quant-ph] 21 Oct 2013 Genuine hidden quantum nonlocality Flavien Hirsch, 1 Marco Túlio Quintino, 1 Joseph Bowles, 1 and Nicolas Brunner 1, 1 Département de Physique Théorique, Université de Genève, 111 Genève, Switzerland H.H.

More information

Uniqueness of the Solutions of Some Completion Problems

Uniqueness of the Solutions of Some Completion Problems Uniqueness of the Solutions of Some Completion Problems Chi-Kwong Li and Tom Milligan Abstract We determine the conditions for uniqueness of the solutions of several completion problems including the positive

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

Distinguishing different classes of entanglement for three qubit pure states

Distinguishing different classes of entanglement for three qubit pure states Distinguishing different classes of entanglement for three qubit pure states Chandan Datta Institute of Physics, Bhubaneswar chandan@iopb.res.in YouQu-2017, HRI Chandan Datta (IOP) Tripartite Entanglement

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

Introduction to Quantum Mechanics

Introduction to Quantum Mechanics Introduction to Quantum Mechanics R. J. Renka Department of Computer Science & Engineering University of North Texas 03/19/2018 Postulates of Quantum Mechanics The postulates (axioms) of quantum mechanics

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantumness versus Classicality of Quantum States Berry Groisman 1, Dan Kenigsberg 2 and Tal Mor 2 1. Centre for Quantum Computation, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce

More information

Lecture 19 October 28, 2015

Lecture 19 October 28, 2015 PHYS 7895: Quantum Information Theory Fall 2015 Prof. Mark M. Wilde Lecture 19 October 28, 2015 Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

Entanglement, mixedness, and spin-flip symmetry in multiple-qubit systems

Entanglement, mixedness, and spin-flip symmetry in multiple-qubit systems Boston University OpenBU College of General Studies http://open.bu.edu BU Open Access Articles 2003-08-01 Entanglement, mixedness, and spin-flip symmetry in multiple-qubit systems Jaeger, Gregg AMER PHYSICAL

More information

Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev

Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev The Superposition Principle (Physicists): If a quantum

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

arxiv: v3 [quant-ph] 30 Oct 2017

arxiv: v3 [quant-ph] 30 Oct 2017 Noname manuscript No (will be inserted by the editor) Lower bound on concurrence for arbitrary-dimensional tripartite quantum states Wei Chen Shao-Ming Fei Zhu-Jun Zheng arxiv:160304716v3 [quant-ph] 30

More information

arxiv:quant-ph/ Oct 2002

arxiv:quant-ph/ Oct 2002 Measurement of the overlap between quantum states with the use of coherently addressed teleportation Andrzej Grudka* and Antoni Wójcik** arxiv:quant-ph/00085 Oct 00 Faculty of Physics, Adam Mickiewicz

More information

Ensembles and incomplete information

Ensembles and incomplete information p. 1/32 Ensembles and incomplete information So far in this course, we have described quantum systems by states that are normalized vectors in a complex Hilbert space. This works so long as (a) the system

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

Entanglement and non-locality of pure quantum states

Entanglement and non-locality of pure quantum states MSc in Photonics Universitat Politècnica de Catalunya (UPC) Universitat Autònoma de Barcelona (UAB) Universitat de Barcelona (UB) Institut de Ciències Fotòniques (ICFO) PHOTONICSBCN http://www.photonicsbcn.eu

More information

arxiv:quant-ph/ v1 10 Apr 2006

arxiv:quant-ph/ v1 10 Apr 2006 Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification

More information

CS286.2 Lecture 15: Tsirelson s characterization of XOR games

CS286.2 Lecture 15: Tsirelson s characterization of XOR games CS86. Lecture 5: Tsirelson s characterization of XOR games Scribe: Zeyu Guo We first recall the notion of quantum multi-player games: a quantum k-player game involves a verifier V and k players P,...,

More information

CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/2 PARTICLES

CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/2 PARTICLES CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/ PARTICLES S. Ghosh, G. Kar, and A. Roy Physics and Applied Mathematics Unit Indian Statistical Institute 03, B. T. Road Calcutta 700 035 India. E

More information

Gilles Brassard. Université de Montréal

Gilles Brassard. Université de Montréal Gilles Brassard Université de Montréal Gilles Brassard Université de Montréal VOLUME 76, NUMBER 5 P H Y S I C A L R E V I E W L E T T E R S 29 JANUARY 1996 Purification of Noisy Entanglement and Faithful

More information

Principles of Quantum Mechanics Pt. 2

Principles of Quantum Mechanics Pt. 2 Principles of Quantum Mechanics Pt. 2 PHYS 500 - Southern Illinois University February 9, 2017 PHYS 500 - Southern Illinois University Principles of Quantum Mechanics Pt. 2 February 9, 2017 1 / 13 The

More information

CANONICAL FORMS, HIGHER RANK NUMERICAL RANGES, TOTALLY ISOTROPIC SUBSPACES, AND MATRIX EQUATIONS

CANONICAL FORMS, HIGHER RANK NUMERICAL RANGES, TOTALLY ISOTROPIC SUBSPACES, AND MATRIX EQUATIONS CANONICAL FORMS, HIGHER RANK NUMERICAL RANGES, TOTALLY ISOTROPIC SUBSPACES, AND MATRIX EQUATIONS CHI-KWONG LI AND NUNG-SING SZE Abstract. Results on matrix canonical forms are used to give a complete description

More information