Concentration of Measure Effects in Quantum Information. Patrick Hayden (McGill University)

Similar documents
!! Let x n = x 1,x 2,,x n with x j! X!! We say that x n is "-typical with respect to p(x) if

Entanglement Manipulation

Lecture: Quantum Information

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

Quantum Teleportation Pt. 3

Problem Set: TT Quantum Information

An Introduction to Quantum Computation and Quantum Information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Physics 239/139 Spring 2018 Assignment 2 Solutions

Compression and entanglement, entanglement transformations

Asymptotic Pure State Transformations

Quantum Information Types

Ping Pong Protocol & Auto-compensation

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Introduction to Quantum Mechanics

Entanglement Measures and Monotones Pt. 2

FRAMES IN QUANTUM AND CLASSICAL INFORMATION THEORY

Lecture 18: Quantum Information Theory and Holevo s Bound

Lecture 19 October 28, 2015

Quantum Information Theory and Cryptography

Free probability and quantum information

Transmitting and Hiding Quantum Information

Lecture Notes. edx Quantum Cryptography: Week 3

Introduction to Quantum Information Hermann Kampermann

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

Instantaneous Nonlocal Measurements

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

MP 472 Quantum Information and Computation

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Entanglement and Quantum Teleportation

Lecture 4: Postulates of quantum mechanics

Lecture 6: Quantum error correction and quantum capacity

to mere bit flips) may affect the transmission.

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Quantum decoherence. Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, Quantum decoherence p. 1/2

Lecture 11: Quantum Information III - Source Coding

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Entanglement and information

Quantum Wireless Sensor Networks

Converse bounds for private communication over quantum channels

Private quantum subsystems and error correction

Uniformly Additive Entropic Formulas

Valerio Cappellini. References

Classical and Quantum Channel Simulations

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

Quantum Technologies for Cryptography

Lecture 11 September 30, 2015

Quantum information and quantum computing

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

Quantum Information Theory

Introduction to Information Theory. B. Škorić, Physical Aspects of Digital Security, Chapter 2

Security Proofs for Quantum Key Distribution Protocols by Numerical Approaches

Classical Verification of Quantum Computations

Quantum Hadamard channels (II)

Chapter 5. Density matrix formalism

Ensembles and incomplete information

PHY305: Notes on Entanglement and the Density Matrix

1. Basic rules of quantum mechanics

Output entropy of tensor products of random quantum channels 1

Entanglement: concept, measures and open problems

Useful Concepts from Information Theory

Distribution of Bipartite Entanglement of a Random Pure State

A Holevo-type bound for a Hilbert Schmidt distance measure

Some Bipartite States Do Not Arise from Channels

arxiv:quant-ph/ v1 13 Jan 2003

Entropic security using conditional min-entropy

Information measures, entanglement and quantum evolution

Entanglement Measures and Monotones

Shared Purity of Multipartite Quantum States

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Schur-Weyl duality, quantum data compression, tomography

Lecture 3: Superdense coding, quantum circuits, and partial measurements

Quantum Physics II (8.05) Fall 2002 Assignment 3

Lecture 2: Perfect Secrecy and its Limitations

Physics 239/139 Spring 2018 Assignment 6

Introduction to Quantum Key Distribution

2. Introduction to quantum mechanics

Invertible Quantum Operations and Perfect Encryption of Quantum States

Fourier analysis of boolean functions in quantum computation

Quantum Data Compression

Exemple of Hilbert spaces with dimension equal to two. *Spin1/2particle

Other Topics in Quantum Information

Universal Blind Quantum Computing

Quantum Information Chapter 10. Quantum Shannon Theory

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Thermodynamics

Quantum Mechanics II: Examples

Information Theory Primer:

Gilles Brassard. Université de Montréal

Quantum state discrimination and selected applications

On some special cases of the Entropy Photon-Number Inequality

Lecture 20: Bell inequalities and nonlocality

Uncertainty Relations, Unbiased bases and Quantification of Quantum Entanglement

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Lecture Notes. Quantum Cryptography Week 2: The Power of Entanglement

Lecture 21: Quantum communication complexity

A Course in Quantum Information Theory

Lecture 21: Quantum Communication

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Quantum Teleportation Pt. 1

Transcription:

Concentration of Measure Effects in Quantum Information Patrick Hayden (McGill University)

Overview Superdense coding Random states and random subspaces Superdense coding of quantum states Quantum mechanical encryption

Information theory A practical question: How to best make use of a given communications resource? A mathematico-epistemological question: How to quantify uncertainty and information? Shannon: Solved the first by considering the second. A mathematical theory of communication [1948] The

A challenge to the physicists John Pierce [1973]: I think that I have never met a physicist who understood information theory. I wish that physicists would stop talking about reformulating information theory and would give us a general expression for the capacity of a channel with quantum effects taken into account rather than a number of special cases.

Superdense coding To send i 2 {0,1,2,3} ¾ i Time Ψ 0 i 1 ebit + 1 qubit 2 cbits Ψ i i

More generally... Superdense coding: To send i 2 {1,,d 2 } Ψ (d) i U i Time log d ebits + log d qubits 2 log d cbits i

Quantifying uncertainty Entropy: H(X) = - x p(x) log 2 p(x) Proportional to entropy of statistical physics Term suggested by von Neumann (more on him later) Can arrive at definition axiomatically: H(X,Y) = H(X) + H(Y) for independent X, Y, etc. Operational point of view

Mixing quantum states: The density operator Draw φ x i with probability p(x) Perform a measurement { 0i, 1i}: Probability of outcome j: q j = x p(x) hj φ x i 2 = x p(x) tr[ jih j φ x ihφ x ] Á 1 i Á 2 i Á3 i Á 4 i = tr[ jih j ρ ], where ½ = x p(x) Á x ihá x Outcome probability is linear in ρ

Properties of the density operator ρ is Hermitian: ρ = [ x p(x) φ x ihφ x ] = x p(x) [ φ x ihφ x ] =ρ ρ is positive semidefinite: hω ρ ωi = x p(x) hω φ x ihφ x ωi 0 tr[ρ] = 1: tr[ρ] = x p(x) tr[ φ x ihφ x ] = x p(x) = 1 Ensemble ambiguity: I/2 = ½[ 0ih0 + 1ih1 ] = ½[ +ih+ + -ih- ]

The density operator: examples Which of the following are density operators?

Quantifying uncertainty Let ρ = x p(x) φ x ihφ x be a density operator von Neumann entropy: H(ρ) = - tr [ρ log ρ] Equal to Shannon entropy of ρ eigenvalues Analog of a joint random variable: ρ AB describes a composite system A B H(A) ρ = H(ρ A ) = H( tr B ρ AB )

Quantifying uncertainty: Examples H( φihφ ) = 0 H(I/2) = 1 H(ρ σ) = H(ρ) + H(σ) H(I/2 n ) = n H(pρ (1-p)σ) = H(p,1-p) + ph(ρ) + (1-p)H(σ)

Surprises in high dimension Choose a random pure quantum state: φ 2 R C d A C d B What can we expect of φ? (d A d B ) On average, states are highly entangled Lubkin, Lloyd, Page, Foong & Kanno, Sanchez-Ruiz, Sen

Concentration of measure A n θ A n ~ exp[-n f(θ)] S n LEVY: Given an η-lipschitz function f : S n! R with median M, the probability that a random x 2 R S n is further than ε from M is bounded above by exp (-nε 2 C/η 2 ) from some C > 0.

Application to entropy Choose a random pure quantum state: φ 2 R C d A C d B (d A d B ) P H(φ A )

Random subspaces S ½ C d A C d B 1) Choose a fine net N of states on S. 2) P( Not all states in N highly entangled ) N P( One state isn t ) 3) True for sufficiently fine N implies true for all of S. THEOREM: There exist subspaces of dimension Cd A d B α 3 /(log d A ) 3, all of whose states have entanglement at least log d A - α - 2β. The probability that a random subspace does goes to 1 with d A d B.

In qubit language In a bipartite system of n by n+o(n) qubits, there exists a subspace of 2n o(n) qubits in which all states have at least n o(1) ebits of entanglement. The subspace of nearly maximally entangled states is almost as big as the whole system!

Compare to pairs of qubits The subspace spanned by two or more Bell pairs always contains some product states. (No subspaces of entangled states, let alone maximally entangled states.) C 2 C 2

What s this good for? Superdense coding: To send i 2 {1,,d 2 } U i Time Ψ d i i

What s this good for? Superdense coding: To send maximally entangled φi U φ Time Ψ d i φi Asymptotically, an arbitrary 2 qubit maximally entangled quantum state can be communicated using 1 qubit and 1 ebit.

What s this good for? Superdense coding: To send arbitrary Ái 2 C k Ψ d i U E(Á) Time E( φi ) ~E(φ) There exists a subspace S of near-full size containing only nearly maximally entangled states. Asymptotically, an arbitrary 2 qubit quantum state can be communicated using 1 qubit and 1 ebit.

What s this good for? Superdense coding: To send arbitrary Ái 2 C k Ψ d i U E(Á) Time 1 ebit + 1 qubit 2 cbits E -1 ~ φi There exists a subspace S of near-full size containing only nearly maximally entangled states. Asymptotically, an arbitrary 2 qubit quantum state can be communicated using 1 qubit and 1 ebit.

Recurse: 1 ebit + 1 qubit 2 qubits 2 ebits + (1 ebit + 1 qubit) 4 qubits 4 ebits + (3 ebits + 1 qubit) 8 qubits 2 r -1 ebits + 1 qubit 2 r qubit Send an unbounded amount of quantum information with a single qubit? NO!

Knowledge is power??? Oblivious Alice: 1 ebit + 1 qubit 1 qubit All you need in this life is ignorance and confidence, and then success is sure. -Mark Twain! Non-Oblivious Alice: 1 ebit + 1 qubit 2 qubits

Credit where credit is due Accidental quantum information theorists? Milman and Schechtman. Asymptotic theory of finite dimensional normed spaces. Springer-Verlag, 1986. Others: Gowers, Gromov, Ledoux, Szarek, Talagrand

Another application: One-time pad Message 10110101 "01101001 11011100 Shared key 10110101! 01101001 11011100 1 bit of key per bit of message necessary and sufficient [Shannon49]

Private quantum channels " # d!c! Sk k T! k {, } k! 1 K,n Eavesdropper learns nothing: n 1! ( ) n S k # = " 0 k = 1 Lower bound on key length: n! d 2 ( log n! 2log d) [BR,AMTW 2000]

Relax security criterion R! A physical operation is ε-randomizing if for all states, R (" ) #. I $! d % d CONSEQUENCE: Given ε>0, there exists a choice of unitaries {U k }, k=1,,n such that the map n 1 ( )! " R # = U k # U k n k = 1 is ε-randomizing, with Cd log d n =. 2! HLSW03

Approximate PQC Can encrypt a quantum state using 1 secret random bit per encrypted qubit asymptotically.! Sk k T! k E Security: { p," } Eve( )#! i i $ I ln 2 = E! = 1 poly( l) 1 bit of key/qubit # 1 2 = "!l (1+2α) bits of key/qubit

Conclusions General rule: Random states and subspaces exhibit extremal behaviour Entanglement Communication Error-correction Many effects do not have good low-dimensional analogues Tip of the iceberg: encryption, state identification, data hiding, secret sharing. Direction application of the concentration of measure phenomenon to problems in communication