arxiv: v2 [quant-ph] 16 Nov 2018

Similar documents
arxiv:quant-ph/ v1 12 Feb 2007

Instantaneous Nonlocal Measurements

Tensors and complexity in quantum information science

arxiv:quant-ph/ v1 19 Mar 2006

arxiv: v3 [quant-ph] 5 Jun 2015

Unitary Dynamics and Quantum Circuits

Local cloning of entangled states

arxiv: v3 [quant-ph] 11 Dec 2018

Entanglement Measures and Monotones

Shared Purity of Multipartite Quantum States

arxiv: v3 [quant-ph] 17 Nov 2014

Introduction to Quantum Information Hermann Kampermann

The Framework of Quantum Mechanics

Tensor network simulations of strongly correlated quantum systems

The Principles of Quantum Mechanics: Pt. 1

Zero-Knowledge Against Quantum Attacks

Principles of Quantum Mechanics Pt. 2

Lecture 11 September 30, 2015

1. Basic rules of quantum mechanics

ON THE ROLE OF THE BASIS OF MEASUREMENT IN QUANTUM GATE TELEPORTATION. F. V. Mendes, R. V. Ramos

arxiv: v1 [quant-ph] 29 Apr 2010

Borromean Entanglement Revisited

An exponential separation between quantum and classical one-way communication complexity

Entanglement Measures and Monotones Pt. 2

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

One-Way Quantum Computing Andrew Lopez. A commonly used model in the field of quantum computing is the Quantum

arxiv:quant-ph/ v3 11 Mar 2004

Quantum Entanglement- Fundamental Aspects

5. Communication resources

The first law of general quantum resource theories

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Maximally Entangled States

Entanglement: concept, measures and open problems

Entropy in Classical and Quantum Information Theory

Is Entanglement Sufficient to Enable Quantum Speedup?

Compression and entanglement, entanglement transformations

arxiv: v1 [quant-ph] 16 Dec 2009

Lecture 4: Postulates of quantum mechanics

arxiv: v2 [quant-ph] 18 Jul 2014

Distinguishing different classes of entanglement for three qubit pure states

Fourier analysis of boolean functions in quantum computation

Squashed entanglement

arxiv:quant-ph/ v1 11 Feb 2006

Trading classical communication, quantum communication, and entanglement in quantum Shannon theory

arxiv:quant-ph/ v5 10 Feb 2003

Lecture 21: Quantum communication complexity

Optimal copying of entangled two-qubit states

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS

Realization of Two-Qutrit Quantum Gates with Control Pulses

arxiv: v2 [quant-ph] 11 Jul 2017

Theory of Quantum Entanglement

Measurement-based quantum computation 10th Canadian Summer School on QI. Dan Browne Dept. of Physics and Astronomy University College London

Bell tests in physical systems

Lecture 6: Quantum error correction and quantum capacity

b) (5 points) Give a simple quantum circuit that transforms the state

A complete characterisation of All-versus-Nothing arguments on stabilisers

SUPERDENSE CODING AND QUANTUM TELEPORTATION

Entanglement and Quantum Teleportation

arxiv: v3 [quant-ph] 23 Jun 2011

Transmitting and Hiding Quantum Information

Lecture: Quantum Information

Multipartite entanglement in fermionic systems via a geometric

Quantum Entanglement and the Bell Matrix

MP 472 Quantum Information and Computation

Codes on graphs. Chapter Elementary realizations of linear block codes

arxiv:quant-ph/ v5 3 Dec 2009

Quantum Communication Complexity

Entanglement Manipulation

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. Boundary cliques, clique trees and perfect sequences of maximal cliques of a chordal graph

Homework 3 - Solutions

Tensor operators: constructions and applications for long-range interaction systems

Mozammel H A Khan. Marek A Perkowski. Pawel Kerntopf

arxiv: v2 [quant-ph] 12 Aug 2008

arxiv: v1 [quant-ph] 25 Apr 2017

arxiv: v3 [quant-ph] 27 Feb 2009

The Strong Largeur d Arborescence

Genuine three-partite entangled states with a hidden variable model

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Stochastic Histories. Chapter Introduction

arxiv: v2 [quant-ph] 21 Oct 2013

arxiv: v3 [quant-ph] 9 Jul 2018

A New Lower Bound Technique for Quantum Circuits without Ancillæ

Quantum Information Types

Quantum Algorithms. Andreas Klappenecker Texas A&M University. Lecture notes of a course given in Spring Preliminary draft.

Asymptotic Pure State Transformations

Simulation of quantum computers with probabilistic models

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

CS286.2 Lecture 13: Quantum de Finetti Theorems

arxiv: v1 [quant-ph] 13 Apr 2007

Single qubit + CNOT gates

Application of Structural Physical Approximation to Partial Transpose in Teleportation. Satyabrata Adhikari Delhi Technological University (DTU)

Representations of quivers

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable,

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

On the Relation between Quantum Discord and Purified Entanglement

Quantum Gates, Circuits & Teleportation

arxiv: v2 [quant-ph] 26 Mar 2012

Classical simulability, entanglement breaking, and quantum computation thresholds

Transcription:

<latexit sha1_base6="xxw9rtr/ekbnqc9fumteqm8lk0=">aaacxicdvhlsgmxfe3hv62vvswncwelkrmikdlgi7cqc1yfwyro+mthmasibkjlgg+wk3u/s2/wn8wfsxs1qsjh3nuosckjhcuhb8fry5+yxfpejyawv1bx2jxnm8tto1hftcs23ui7aohciwcjnxieojjf/xphvrdcxortlqhqykdgj6u6ako5kjmwo5gtsc0fi/qtgbvtaxmolcnxuap7gqihlspyhdblqgbicil5q1atid3qkfhfqqo+1ki6e5f+cyrt/txh1f/oj9+skd2npbhlnngojzmpd8k9tyjdw0kykioniem9jfmxflvtjmjlaseio9n9llpk/ahkfldycthdga3aj3t58/gwfolthsqx2olgidl87cdyigsjusbud182x0/7nbjs9utoacgfz/g1uj2phuaubx9u6fyy7kljdts8owchowj1dsarmc6qvbi39l78ta8bw9nvoovjv1tsanx9rbsmy8zw==</latexit> <latexit sha1_base6="tri09h5rlbgehtf9ywhz7ufq=">aaacknicdhpbhmxemyncuscqsaeugyiklifo0ijbcnopbagukqmrse1wzzqsxj8re7so1l8a68q6/wfrxnvukobqoj2f70m7e0m19rkuk5y/62knv3tx83h7ufrzz5omzzu7zy28rj2gorllutebpshoasmrfp6uj1iwik2k+3+rplsl5ac0rl0oaa7wwciofcks2swe/wmiledhqimfefsltgmawaxfffckxqke+73szxram9k7i16il6xic77a+jswvjomcxen+vyeoajqvqvldhlacsxrwv6cxkg5r8oczhqtm3kuzsqxxxge6x9oapgnr7hs5ipuae+c1ca/+awhbq/ytbkjr6a3gce680svpp6dngxfmsqywmlurps990ih0jvosoudg50zfdb0kji6026mdiotwdbhb+f6sq7yujbyaer2w938q2nxhyduo5jv7viuo3/xyrjf/en/td/orl7bhfbygt5ddb+hhnwcwjn7+hcvdx+sl8mn5hoyvypnwmv/xsctsl5ea9vixr0=</latexit> sha1_base6="xxw9rtr/ekbnqc9fumteqm8lk0=">aaacxicdvhlsgmxfe3hv62vvswncwelkrmikdlgi7cqc1yfwyro+mthmasibkjlgg+wk3u/s2/wn8wfsxs1qsjh3nuosckjhcuhb8fry5+yxfpejyawv1bx2jxnm8tto1hftcs23ui7aohciwcjnxieojjf/xphvrdcxortlqhqykdgj6u6ako5kjmwo5gtsc0fi/qtgbvtaxmolcnxuap7gqihlspyhdblqgbicil5q1atid3qkfhfqqo+1ki6e5f+cyrt/txh1f/oj9+skd2npbhlnngojzmpd8k9tyjdw0kykioniem9jfmxflvtjmjlaseio9n9llpk/ahkfldycthdga3aj3t58/gwfolthsqx2olgidl87cdyigsjusbud182x0/7nbjs9utoacgfz/g1uj2phuaubx9u6fyy7kljdts8owchowj1dsarmc6qvbi39l78ta8bw9nvoovjv1tsanx9rbsmy8zw==</latexit> <latexit <latexit sha1_base6="mcivav29bosnq3bdovbjf971ybq=">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</latexit> <latexit sha1_base6="e+/opsbxncjrrkpqe720xfrjaj8=">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</latexit> <latexit sha1_base6="b9jlhne+rthpmanb1znxjjt+us8=">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</latexit> <latexit sha1_base6="9hnxsavhexkagy8cg1s7amsbwxo=">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</latexit> Multipartite entanglement outperforming bipartite entanglement under limited quantum system sizes arxiv:1808.00005v2 [quant-ph] 16 Nov 2018 Hayata Yamasaki, 1, Alexander Pirker, 2 Mio Murao, 1 Wolfgang Dür, 2 and Barbara Kraus 2 1 Department of Physics, Graduate School of Science, The University of Tokyo, 7 3 1 Hongo, Bunkyo-ku, Tokyo, Japan 2 Institut für Theoretische Physik, Universität Innsbruck, Technikerstraße 21a, 6020 Innsbruck, Austria (Dated: November 20, 2018) Multipartite quantum entanglement serves as a resource for spatially separated parties performing distributed quantum information processing. Any multipartite entangled state can be generated from appropriately distributed bipartite entangled states by local operations and classical communication (LOCC), and in this sense, any distributed process based on shared multipartite entanglement and LOCC is simulatable by using only bipartite entangled states and LOCC. We show here that this reduction scenario does not hold when there exists a limitation on the size of the local quantum system of each party. Under such a limitation, we prove that there exists a set of multipartite quantum states such that these states in the set cannot be prepared from any distribution of bipartite entanglement while the states can be prepared from a common resource state exhibiting multipartite entanglement. We also show that temporal uses of bipartite quantum communication resources within a limitation of local system sizes are sufficient for preparing this common resource state exhibiting multipartite entanglement, yet there also exist other states exhibiting multipartite entanglement which cannot be prepared even in this setting. Hence, when the local quantum system sizes are limited, multipartite entanglement is an indispensable resource without which certain processes still cannot be accomplished. Keywords: multipartite entanglement, limitation on quantum system size, local operations and classical communication (LOCC) I. INTRODUCTION Multipartite quantum entanglement ubiquitously appears in many-body quantum systems in condensed matter physics [1] and quantum gravity [2], and also serves as a resource for multiparty tasks in distributed quantum information processing such as measurement-based quantum computation [3 5], distributed sensing [6, 7], and quantum networking [8]. Such a distributed setting is also considered as a promising candidate for realizing large-scale quantum computation due to technological limitations on the number of low-noise qubits which can be stored in a single quantum device. In a distributed setting where spatially separable parties can freely perform local operations and classical communication (LOCC), any multipartite entangled state can be prepared by LOCC from initially distributed bipartite entangled states among the parties, using quantum teleportation [9]. In this regard, even if multipartite entanglement is used for a task, initially sharing bipartite entangled states is sufficient, and hence, it would be natural to doubt whether multipartite entanglement is necessary for performing tasks by LOCC. In this paper, we show nontrivial examples demonstrating the difference between entangled resource states consisting only of bipartite entanglement and those exhibiting multipartite entanglement. This difference arises when there exists a limitation on the size of each party s party quantum communication preparation of a common resource state of dynamic setting static setting common resource state exhibiting multipartite entanglement consisting of bipartite entanglement target LOCC transformation into of FIG. 1: The task of system-size-limited quantum state transformation, where the parties transform a common resource state represented by blue circles by LOCC into an arbitrary state in a given target set { ψ 0, ψ 1,...} represented by red circles. To differentiate the capabilities of common resource states exhibiting multipartite entanglement at the top and those consisting only of bipartite entanglement at the bottom, where each connected pair of blue circles represents a bipartite entangled state, we consider the static setting where each party s local system size for storing the common resource state is limited. We also consider the dynamic setting where the parties have to prepare a common resource state within these limitations by performing quantum communication, in addition to storing the common resource state. The difference in the capabilities arises in terms of achievability of this task. Electronic address: yamasaki@eve.phys.s.u-tokyo.ac.jp

2 local quantum system, that is, the dimension of the Hilbert space representing the local quantum system. Our comparison between bipartite and multipartite entanglement, motivated by technological limitations on the number of qubits which can be stored in one quantum device, differs from the comparison in the context of quantum key distribution [10, 11] as we consider the cost of LOCC to be negligible. The difference can also be observed in a trivial example of qubits as follows. Consider three parties A, B, and C sharing two Bell states ( 2, 1 2 ( 00 + 11 )) one of which is between A and B, and the other of which is between B and C. These two Bell states as a whole are regarded as a state consisting of bipartite entangled states. In this case, once these two Bell states are given to the parties, the parties can transform the two Bell states by LOCC into any three-qubit state shared among A, B, and C, such as the Greenberger-Horne-eilinger (GH) state GH := 1 2 ( 000 + 111 ) and the W state W := 1 3 ( 100 + 010 + 001 ), which we regard as states exhibiting multipartite entanglement. However, if each party s local system size is limited to one qubit, the parties cannot store any state consisting of a collection of bipartite entangled states to obtain GH and W by LOCC while the parties can still store these states exhibiting multipartite entanglement as a resource for performing some task by LOCC. Apart from the above trivial example of qubits, this paper aims to demonstrate the difference even in cases where the size of local systems of some parties is not limited to one qubit. Given an entangled state transformable into another entangled state, the former state can be considered to have more capability as a resource than the latter state. If such a resource state having more capability is shared among parties, the parties may transform the shared resource state by LOCC into a suitable form for performing a given task. This paradigm yields a common resource state [12, 13] transformable into any state in a given set, that is, a resource state having more capability than any state in the set, such as the two Bell states for the set { GH, W }. We call this set of states the target set. Similarly, Ref. [1] also introduces common resource states in terms of state convertibility by stochastic LOCC. As illustrated in Fig. 1, we consider two settings of state preparation tasks for differentiating capabilities of common resource states consisting only of a collection of bipartite entangled states and those exhibiting multipartite entanglement. We call the tasks system-size-limited quantum state preparation, where one of the two settings is called a static setting, and the other is called a dynamic setting. In the static setting, we analyze each party s local system size for storing a common resource state for a given target set. For a given target set of states of a multipartite system in general, there may not exist any common resource state in the multipartite system itself transformable by LOCC into all the states in the set. In particular, given a multipartite system where each local dimension is d, almost no LOCC transformation among pure states of the system is possible [15 20]. This fact implies that, in general, a common resource state for a set of multipartite states may be a state of a higherdimensional system than that for the set itself. If there is a limitation on each party s local system size, it may not be possible for the parties to store an entangled state of a higher-dimensional system serving as a common resource state. Despite the efforts to understand properties of multipartite entanglement [21 26], general quantitative conditions of the smallest system size for common resource states have not yet been established. In this paper, we provide nontrivial instances where, within a given limitation on local system sizes, the preparation of a state in a given target set is not achievable by any common resource state consisting of a collection of bipartite entangled states but it is achievable by a common resource state exhibiting multipartite entanglement. These examples show the difference in the capabilities between these two types of common resource states. As for the dynamic setting, in addition to considering a limitation on local system sizes for storing a common resource state, the parties are also required preparation of the common resource state within this limitation by performing quantum communication. Some of the common resource states exhibiting multipartite entanglement analyzed in the static setting can be prepared within the limitation using quantum communication. Hence, temporal uses of bipartite quantum communication resources are still sufficient for preparing such common resource states. In contrast, we also show other examples of states exhibiting multipartite entanglement which can be stored but cannot be prepared within a limitation on local system sizes. The rest of this paper is structured as follows. In Sec. II, we recall the definition of a common resource state for a given target set. In Sec. III, we introduce the tasks of system-size-limited quantum state preparation in the static setting and the dynamic setting. We analyze system-size-limited quantum state preparation in the static setting in Sec. IV and also analyze the dynamic setting in Sec. V. Our conclusion is given in Sec. VI. II. DEFINITION OF COMMON RESOURCE STATES We begin with recalling the definition of a common resource state for a given set of states under LOCC [12, 13]. In the following, superscripts of an operator or a ket indicate the Hilbert space on which the operator acts or to which the ket belongs. Note that although we only consider the cases of pure states, generalization to mixed states is straightforward. To define a target set, consider a quantum system for the states in a target set shared among N parties denoted by v 1,..., v N. The corresponding Hilbert space is

<latexit sha1_base6="xydg7gyeyb3aolrwdarlye6w9u=">aaaclnicdvhbahrbek0db3g9bfqlmvgivggy0wi6jmeneqqwrjjbdl5re2myzpd1dd01gaey38gf+rv71h/wbeybzyda0f2nt1xb6tpoatjjpndiw7dvnp33sb97oohjx/6w0+pxkmtijgwihjtzj0pksmeutwdfjywjxtdjwtp9t13oythp9ykucjjmeatmxajlqprcfp+azeddgiawaakvfa+vc5hccq+bvn3mhaimvxysjqibk0bx1oyzjd7bym0auowkwcp07tocjxts6go6o5lrwwkj7rayaac3it33ytil8ghbpjq1hc9ywf09zj1b5vnozjexbr1wk/+s1qwbo9w1at7l8jxcpjtsxp30281exjpmwvyhmpyjxvenji0jvqsaufg/hmlbvouhjzodscfkszc0pcgwtbftlyp7aol5vv7v90sk38oa0dsnf3frmcbq/sjb+e9pfpwi92idn8ajebvffwi58cm6pqmafxmjp+bvtre+jvwj/qjxqtdppfpewz9+asyr</latexit> 3 denoted by H := N k=1 Hv k, where each party v k s system is represented by a Hilbert space H v k. Let S denote a set of states of H to be prepared from a common resource state, which we call the target set. Note that the target set S can be either finite or infinite. For a given target set S on H, a common resource state [12, 13] is defined as follows. The total system for a common resource state is denoted by H := N k=1 k, Hv where H v k for each party v k denotes the Hilbert space corresponding to v k. This total system H includes H for a target set as a subspace, that is, H v k H v k for each party v k. A state φ H is called a common resource state for the target set S under LOCC if for any state ψ S there exists an LOCC protocol which transforms φ into ψ deterministically and exactly. Regarding a formal definition of LOCC, we refer to Ref. [27] and the references therein. Note that the common resource state φ for S on H may only exist in a higher-dimensional Hilbert space H than that for S itself, that is, dim H v k dim H v k for each v k. To compare bipartite and multipartite entanglement, we introduce the notion of a common resource state consisting of a collection of bipartite entangled states and that exhibiting multipartite entanglement. In the following, common resource states are assumed to be fully entangled, that is, entangled with respect to any bipartition of the parties. Consider a collection of bipartite entangled states distributed among the parties v 1,..., v N. The distribution of the bipartite entangled states can be represented by a graph G = (V, E), where each vertex in the set V = {v 1,..., v N } represents a party, and each edge e = {v k, v k } E a bipartite entangled state φ e e shared between two parties v k and v k. A common resource state φ for a target set S is called a state consisting of bipartite entanglement if there exists a graph G = (V, E) such that φ is locally unitarily equivalent to a state in the form e E φ e e. Otherwise, φ is called a state exhibiting multipartite entanglement. For any target set S, we can always obtain a common resource state consisting of bipartite entanglement using quantum teleportation [9] or a more efficient protocol proposed in Ref. [28]. This common resource state consists of maximally entangled states distributed among the parties v 1,..., v N according to a tree T = (V, E), which is a graph including no cycle as a subgraph. The common resource state can be written as e E Φ + e, M e where for each edge e = {v k, v k } E, Φ + e M e := 1 Me 1 Me l=0 l v k l v k is a maximally entangled state of Schmidt rank M e shared between v k and v k. For any tree T = (V, E), if an edge e E is deleted, T is divided into two disjoint trees, whose vertices are represented by disjoint sets V e and V e satisfying V = V e V e. For any ψ S on H = N k=1 Hv k, we let R e ( ψ ) denote the Schmidt rank of ψ with respect to the bipartition v k V e H v k and v k V e H v k of H = N k=1 Hv k. Given any ψ S and a tree T = (V, E), Ref. [28] provides the necessary and sufficient condition for the rev 1 i v 2 v3 +i +i ( )i v 2,v 3 FIG. 2: A simple example of a graph representing a graph state and a quantum circuit representing a class of states parameterized by α which can be deterministically prepared using this graph state. Given a graph state Φ v 1,v 2,v 3 as illustrated on the left, by performing the unitary exp (iαx v 1 ) parameterized by α and a measurement in the basis { 0, 1 } on the qubit represented by the black vertex v 1, followed by local unitary corrections on the white vertices v 2 and v 3 conditioned by the measurement outcome, we can deterministically obtain a two-qubit state ψ (α) defined in Eq. (3) represented by v 2 and v 3. The state ψ (α) can also be represented as the output of the quantum circuit on the right, where a twoqubit gate exp (iα v 2 v 3 ) parameterized by α is applied to v 2 v 3. source state e E Φ + e M e being transformable into ψ by LOCC. This transformation is achievable if and only if the Schmidt rank of each bipartite maximally entangled state of the resource state is not smaller than the Schmidt rank of ψ with respect to the corresponding bipartition, that is, for each e E, M e R e ( ψ ). (1) To obtain a common resource state consisting of bipartite entanglement for S, it is sufficient to ensure that the condition of the Schmidt ranks given in Inequality (1) is fulfilled for all the states in S. As a common resource state exhibiting multipartite entanglement, we can use a class of graph states proposed in Ref. [12]. A graph state [29, 30] is a multiqubit entangled state characterized by a graph G = (V, E). Note that, while graphs in this paper also represent distribution of bipartite entanglement as explained above, a graph state is a different concept, which is a state exhibiting multipartite entanglement obtained for a graph G = (V, E) as follows: first, for each vertex v k V, a qubit labeled v k is initialized as v k := 1 2 ( 0 v k + 1 v k ), and then, for each edge e = {v k, v k } E, the controlled- gate C v k,v k := ( 00 00 + 01 01 + 10 10 11 11 ) v k,v k (2) is applied to two qubits labeled as v k and v k. Reference [12] proposes an LOCC protocol for preparing any pure state of an arbitrary number of qubits by performing sequential projective measurements and local unitary corrections on a particular type of graph states. (See also

measurement-based quantum computation [3 5].) To see how this protocol works, consider the three-vertex graph shown in Fig. 2 as a simple example. The graph state Φ v1,v2,v3 represented by this graph is invariant under a local unitary transformation X v1 v2 v3, that is, X v1 v2 v3 Φ v1,v2,v3 = Φ v1,v2,v3, where X and are the Pauli operators. Thus, if the unitary operator exp (iαx v1 ) parameterized by α is performed on qubit v 1, the action is equivalent to exp (iαx v1 ) 11 v2 11 v3 Φ v1,v2,v3 = 11 v1 exp (iα v2 v3 ) Φ v1,v2,v3, which can be shown using the Taylor series of the exponential function. Then, it is straightforward to verify that, performing exp (iαx v1 ) and a measurement in basis { 0, 1 } on the qubit v 1, we obtain a state of two qubits v 2 and v 3 which can be deterministically transformed by local unitary corrections 11 v2 11 v3 or v2 v3 conditioned by the measurement outcome 0 or 1, respectively, into ψ (α) v2,v3 := exp (iα v2 v3 ) ( v2 v3 ). (3) In the same way, it is shown in Ref. [12] that any quantum circuit consisting of one-qubit Clifford gates and multiqubit gates exp (iα ) parameterized by α can be implemented by performing sequential projective measurements and local unitary corrections on a particular graph state corresponding to the quantum circuit. In addition, it is shown that any pure state of an arbitrary number of qubits is locally unitarily equivalent to a pure state generated by a quantum circuit consisting of these types of gates. Using this argument, we can obtain a graph state serving as a common resource state exhibiting multipartite entanglement for a given target set. We remark that the above graph states for common resource states require at least one auxiliary qubit per parameter describing local unitary equivalence classes of n-qubit states. Since the number of parameters of states increases exponentially with respect to n, the size of the required graph states is also exponentially large. At the same time, if we consider the target set S to be a smaller subset of the n qubits, the number of the parameters describing the states in S can be decreased. In this case, we may construct another class of graph states which serve as common resource states for the smaller subset S, which require a smaller number of auxiliary qubits than the original graph states serving as common resource states for the set of arbitrary n-qubit states. We will use this observation in the subsequent section where the task of system-size-limited quantum state preparation is introduced. III. DEFINITION OF SYSTEM-SIE-LIMITED QUANTUM STATE PREPARATION We introduce the tasks of system-size-limited quantum state preparation. We consider a scenario in which a multipartite system is distributed among spatially separated parties v 1,..., v N, and each party s local system size is limited. The system-size-limited quantum state preparation for a given target set S is a task for the parties to transform a shared common resource state into an arbitrary state ψ S by performing local operations on a limited-size quantum system and classical communication. To compare multipartite and bipartite resources, we analyze system-size-limited quantum state preparation in two settings the static setting and the dynamic setting. In this section, we first describe the definition of local operations on a limited-size quantum system and then define system-size-limited quantum state preparation in the static setting and the dynamic setting. To clarify the meaning of local operations on a limitedsize quantum system, we assume that each party v k {v 1,..., v N } has a quantum system corresponding to a Hilbert space H v k of dimension d (v k) := dim H v k. The configuration of system sizes for all the parties is denoted by a tuple ( ) d = d (v1),..., d (v N ). As explained in Sec. II, the target set S is given from a subspace H of the total system H. Each party v k can perform any unitary and any measurement on the system H v k but is not allowed to add an auxiliary system to increase the dimension of H v k. Measurements are represented by quantum instruments, and while an indirect measurement may require an auxiliary working quantum system, the protocols in this paper use only projective measurements [37]. Classical information processing and classical communication without using a quantum system can be freely performed. For a given configuration of system sizes specified by d, we assume in both the static setting and the dynamic setting that the parties can perform local operations on a limited-size quantum system in the above sense and classical communication. We refer to this restricted LOCC as LOCC within the configuration d. In the dynamic setting, we also allow any two parties v k and v k to perform quantum communication. When v k sends a state of a d-dimensional system to v k by quantum communication, v k has to initially store the state to be sent in a d-dimensional subsystem of H v k, and v k has to initialize a d-dimensional subsystem of H v k as a fixed state 0 so that v k receives the state using this subsystem. After each quantum communication, the d- dimensional subsystem of H v k is initialized as a fixed state 0 so that v k can reuse this subsystem. Each quantum communication from one party to another party is

5 called one round of quantum communication. If a protocol includes multiple rounds of quantum communication, the multiple rounds of quantum communication are performed sequentially. Quantum communication between the parties is allowed only if it is stated explicitly. The system-size-limited quantum state preparation in the static setting for a configuration d of system sizes and a target set S is a task for N parties to achieve the following: 1. A common resource state φ H for S is given to the parties; 2. A particular target state ψ S is chosen from the target set S, and all the parameters of ψ given to all the parties. Then the parties perform LOCC within the configuration d to transform the common resource state φ into this target state ψ. Our analysis concerns properties of the common resource state φ for achieving a system-size-limited quantum state preparation, that is, whether the task is achievable or not when the common resource state φ is a state consisting of bipartite entanglement or a state exhibiting multipartite entanglement. In a similar way, we define system-size-limited quantum state preparation in the dynamic setting as follows. The system-size-limited quantum state preparation in the dynamic setting for a configuration d of system sizes and a target set S is a task for N parties to achieve the following: 1. A common resource state φ H for S is prepared by the parties using quantum communication in addition to LOCC within the configuration d; 2. A particular target state ψ S is chosen from the target set S, and all the parameters of ψ given to all the parties. Then the parties perform LOCC within the configuration d to transform the common resource state φ into this target state ψ. In this dynamic setting, φ can be a state exhibiting multipartite entanglement as long as φ is deterministically prepared by finitely many rounds of quantum communication. Note that while we differentiate the capabilities of common resource states consisting of bipartite entanglement and those exhibiting multipartite entanglement in the static setting, common resource states in the dynamic setting are expected to have an intermediate capability, since only temporal uses of bipartite quantum communication resources are allowed in the dynamic setting for preparing the common resource states. In the following, we provide nontrivial examples differentiating between bipartite and multipartite entanglement in the static setting in Sec. IV. Also, other examples in the dynamic setting are provided in Sec. V for differentiating the capability of the common resource states in the dynamic setting from that of the common resource states consisting of bipartite entanglement and exhibiting multipartite entanglement in the static setting. IV. SYSTEM-SIE-LIMITED QUANTUM STATE PREPARATION IN THE STATIC SETTING In this section, we analyze system-size-limited quantum state preparation in the static setting. We show the existence of a system-size-limited quantum state preparation which is achievable by a common resource state exhibiting multipartite entanglement but not by any common resource state consisting of bipartite entanglement. To show such a nontrivial example, consider ( eight parties v 1,..., v 8. The configuration d 0 = d (v1) 0,..., d (v8) 0 ) of the quantum system sizes are given as follows: d (v k) 0 = dim H v k =, dim H v k = 2, v k {v 1,..., v 7 }; d (v8) 0 = dim H v8 = dim H v8 = 2. () For each v k {v 1,..., v 7 }, we regard the fourdimensional system H v k as two qubits, where one is for the target set denoted by H v k and the other is an auxiliary qubit denoted by H v k a, that is, H v k = H v k H v k a. We define a target set S 0 on H = N k=1 Hv k as the set of all the possible output states of a quantum circuit illustrated in Fig. 3. This circuit consists of seven two-qubit gates exp (iα i ) parameterized by α i {α 1,..., α 7 }, where 0 α i < 2π for each α i. The tuple of the seven parameters is denoted by α := (α 1,..., α 7 ). As input to the circuit, we consider an eight-qubit product state 8 H. The target set S 0 consists of the eight-qubit output states of the circuit parameterized by α, that is, S 0 := { ψ (α) H : α = (α 1,..., α 7 )}, (5) where each qubit is placed at one of the parties, as illustrated in Fig. 3. For example, given the parameters α 0 := (0, 0, 0, 0, 0, 0, 0), each gate in the circuit reduces to the identity and hence ψ (α 0 ) = 8 S 0 is a product state. In contrast, given the parameters α π := ( π, π, π, π, π, π, π ψ ( α π ) S0 is a fully entangled state, since each gate exp ( i π ) entangles. Using the configuration d 0 and the target set S 0 defined above, we present the following two propositions on the system-size-limited quantum state preparation for d 0 and S 0. Proposition 1 shows the feasibility of the systemsize-limited quantum state preparation using a common resource state exhibiting multipartite entanglement while Proposition 2 is a no-go theorem for any common resource state consisting of bipartite entanglement. ),

<latexit sha1_base6="m5i9+xbwybayitxciftl2nebm=">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</latexit> <latexit sha1_base6="bxwotsfksu3valnqutmqck3y0=">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</latexit> <latexit sha1_base6="txalacrrciy7iacgp/zsryzq=">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</latexit> <latexit sha1_base6="rrobd8mruwwqsvuormunhnl5q+y=">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</latexit> <latexit sha1_base6="5y9d939oqjgga3mnsnnsaz2eega=">aaacgnicdvfnsynbeo2m7qpd161mowqa9ymwuogcpgh68+lfg/mdjdjwdijbp6r66a8tqzmvf1x/jf/gnpjdgrwgm8d7vfdqvviysmknhvb1psxrzozc81v899/llqwl86slg3hdtdsmsmleqhseocjfubihpjj5ng71ap79fyvwpzqssjvdtrj9wye8lbwkxzohon0b9u/d5tuvmlceedlabkw+1oixpv+b7ey9bmzpjfxthsu/zmkdfxik1v3fuunebicelvs2ktfgah8a1xnmoiefbdam1qndnm72wr1/isir+/+eg9zay75ztq0ndrq8kotkhrad8ycfmwtxagbkgtlqm/3xvcfswhq8m+6umsyd1nmfpgoqkhxan8lvgfibmmdjp95sjvvogzb6c0cf2iathgjatwo3oj/pinm5u5nfyfmu/3oz3ruzx36i9ezm+xsxbyt/oovfttlb+yedrhn9+ybpbknydrfctbn9fwodgewwvkth5aeutx7w=</latexit> <latexit sha1_base6="wmcqmvbuz0v02jgckhjbuqwtq=">aaacgnicdvfnsynbeo2m7qpd161mowqa9ymwuqacpgh68+lfg/mdjdjwdijbp6r66a8tqzmvf1x/jf/gnpjdgrwgm8d7vfdqvviysmknhvb1psxrzozc81v899/llqwl86slg3hdtdsmsmleqhseocjfubihpjj5ng71ap79fyvwpzqssjvdtrj9wye8lbwkxzohon0b9u/d5tuvmlceedlabkw+1oixpv+b7ey9bmzpjfxthsu/zmkdfxik1v3fuunebicelvs2ktfgah8a1xnmoiefbdam1qndnm72wr1/isir+/+eg9zay75ztq0ndrq8kotkhrad8ycfmwtxagbkgtlqm/3xvcfswhq8m+6umsyd1nmfpgoqkhxan8lvgfibmmdjp95sjvvogzb6c0cf2iathgjatwo3oj/pinm5u5nfyfmu/3oz3ruzx36i9ezm+xsxbyt/oovfttlb+yedrhn9+ybpbknydrfctbn9fwodgewwvkth5aecgx70=</latexit> <latexit sha1_base6="/2vk6fqsvjjjhewhmn7euapsuga=">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</latexit> <latexit sha1_base6="nnrsblte9vqbfh91daayraeqrq=">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</latexit> <latexit sha1_base6="afgebljycj2puytyxxwhfonpy=">aaacd3icdvhlsitbeo2mxh/xxk106clbmwvzfwu6flqhrtfyhzgxfdtqwitnu6hu0yjzxykw/0mp8wdpteljvrqzegckjh1ks2lsbrfl7vgavrxzozcfh3h95/fpuz+dzqwnbscy21uuzbohqk2yrimvueljuku62kv0i3s0vmh1rsmcoxncktexhmht3uyzyyduoeh3un6++7/sttorvvrqmkvib6dfhvxsbdo0p6mhckuisrl2oo5w6dgwjlrgsjxfhpgabvhaqwu2obes/ddc/0wr2/ikkr+zhcqetcms92vuzupves3wswq1tj+mudsnjsgdayqjlxsf6fjhmolqsxftfylgioqxddnjdisq9ag6e3zpkd2cak+6xk/20qdh8nbbom7ragnjegnqulrr/0mhmdkdmeoc8wtex8h5v63y9ootxs1vsucw2xrbjpfbjvtsgn2wtqmswf2yj7yc+01wav+bpvvruftplpcpluqvwgiisoo</latexit> <latexit sha1_base6="bloj0ylwzjii3xwmi7lzovspr=">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</latexit> <latexit sha1_base6="tyvk92utulqvqrbyd9dcwhwvro=">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</latexit> <latexit sha1_base6="wqictf/6+7rhpbvaxu5ggtqety=">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</latexit> <latexit sha1_base6="rkzhmwm7e57gadfrlhivellh6q=">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</latexit> <latexit sha1_base6="bd/bhccyovm6njop7tlbgh8jukw=">aaacd3icdvfntxsxehwwqtnqaekppxrfrmuj7xkbixicuecdrd6qbihmnqly8dorexyuwfttumjv6k/pdw/ioyr2jftp781ib96kurswouh3lvj7sl7xsf6psfl5a/tls7xts7owhltcs20gkviuqmgxbekc5ayhsyx209lppffv0vih1txncxxlckvevhagt2brsqduumg3xl5+7hx+w2yookwf70g8bg22rm6vbtmjpoxgsrieqwdxlfoiwegbjdynplcyg58brc9fbbhnbkft7lcm8zk3cqjx+kwgx79sdznp5lvroyqld1sryn1rfknbsvjhg0jrbiqzmkfc0vr5itkc0lfx01ocxmsdqsqwkwyenopqbuhn8z5hdggjoputfiztahyfdcw/iowhsxiug1kx0i/8/hwrkd22qc8sreb8hvcod2oorqh3ya3mlovvgdtk+i9kro2hnrmo6jlmh9sie2hptt/a9+bhsv7ygtexmv/amgvgfkcrdkg==</latexit> <latexit sha1_base6="id6yan5jhydh7cnmviy5bwgvo8=">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</latexit> 6 H v 1 : v 1 α 1 α 2 α 3 H v 2 : v 2 H v 3 : v 3 α H v : v H v 5 : v 5 α 5 α 6 ψ (α) H v 6 : v 6 H v 7 : v 7 α 7 H v 8 : v 8 FIG. 3: A quantum circuit generating all the states in the target set S 0 := { ψ (α) } for the system-size-limited quantum state preparation in Propositions 1 and 2, where α = (α 1,..., α 7) is a tuple of parameters. The wires of the circuit starting from the input v 1,..., v 8 represent qubits held by the parties v 1,..., v 8, respectively. The circuit consists of seven two-qubit gates exp (iα i ) parameterized by α i {α 1,..., α 7}. Proposition 1. Multipartite entanglement in a systemsize-limited quantum state preparation in the static setting. The system-size-limited quantum state preparation in the static setting for the configuration d 0 defined in Eq. () and the target set S 0 defined in Eq. (5) is achievable using a common resource state exhibiting multipartite entanglement. Proposition 2. Bipartite entanglement in a systemsize-limited quantum state preparation in the static setting. The system-size-limited quantum state preparation in the static setting for the configuration d 0 defined in Eq. () and the target set S 0 defined in Eq. (5) is not achievable using any common resource state consisting only of bipartite entanglement. In the following, we prove Propositions 1 and 2. Note that while shallower quantum circuits having a similar structure to the circuit in Fig. 3 are not sufficient for differentiating between multipartite and bipartite entanglement, this example might not be the simplest, and further sets of states with the same properties will also be given after the proofs. Proof of Proposition 1. We provide a common resource state exhibiting multipartite entanglement for the target set S 0, which is the 15-qubit graph state Φ res illustrated in Fig. held by the parties v 1,..., v 8. In the same way as explained in Sec. II, given the graph state Φ res in Fig., for each i {1,..., 7}, performing exp (iα i X vi ) parameterized by α i and a measurement in the basis { 0, 1 } on the qubit represented by Ha vi, followed by local unitary corrections on other qubits conditioned by the measurement outcome, the parties can FIG. : A graph representing a 15-qubit graph state Φ res used as a common resource state exhibiting multipartite entanglement in Proposition 1. Each of the parties v k {v 1,..., v 7} holds two qubits H v k H v k a, while party v 8 holds one qubit H v 8. Eight of the 15 qubits H v 1,..., H v 8 represented by white vertices are qubits which can be prepared in any state ψ (α) in the target set S 0. The other seven H v 1 a,..., H v 7 a represented by black vertices are auxiliary qubits to be measured. To obtain ψ (α) S 0 parameterized by α = (α 1,... α 7), each party v i {v 1,..., v 7} performs the following protocol in order. First, a unitary exp (iα ix) parameterized by α i is performed on H v i a. Then, the qubit H v i a is measured in the basis { 0, 1 }, and depending on the outcome, a unitary correction is applied to the remaining qubits. Using this protocol, the parties can deterministically transform Φ res into ψ (α) S 0 for any α. obtain ψ (α) S 0 deterministically for any parameters α = (α 1,..., α 7 ). Q.E.D. Proof of Proposition 2. We derive a necessary condition for preparing the state ( ) ψ α π S0 from a resource state consisting of bipartite entanglement by LOCC within ( ) the configuration d 0. Observe that the state ψ α π is fully entangled, that is, entangled with respect to any bipartition of the eight qubits. To prepare a fully entangled state, the resource state at party v 8 has to be entangled with some other parties. As dim H v8 = 2, the party v 8 can store only one qubit of a bipartite resource state entangled with another party, which we label as u 7 {v 1,..., v 7 }. The quantum system H u7 at u 7 is decomposed into H u7 = H u7 {u 7,v 8} Hu7 r where H u7 {u 7,v 8} is a system of more than one dimension for the bipartite entangled resource state shared with v 8, and Hr u7 the remaining quantum system. It is necessary that dim H u7 {u 7,v 8} = 2, dim H u7 r = 2, (6) which can be shown by contradiction as follows. Assume that dim H u7 {u 7,v 8} > 2. Then we have dim Hu7 r < 2, and the resource state shared between the parties u 7 and v 8

7 a permutation of (v 1,..., v 7 ) u 1 u 2 u 3 u u 5 u 6 u 7 v 8 FIG. 5: A line-topology tree representing a resource state consisting of bipartite entanglement to prepare a fully entangled state within the configuration d 0. Since ) the target set S 0 includes a fully entangled state ψ (α π, the common resource states consisting of bipartite entanglement for S 0 have to be represented by the line-topology tree in the figure, which leads to a contradiction with the condition given in Inequality (1) as shown in the main text. cannot be entangled with any of the other parties. This contradicts the assumption that a fully entangled state can be prepared, and Eq. (6) is shown. As dim Hr u7 = 2, the party u 7 can store another single qubit of a bipartite resource state entangled with a party other than v 8, which we label as u 6 {v 1,..., v 7 } \ {u 7 }. By iterating the above argument, any resource state consisting of bipartite entanglement for preparing a fully entangled state by LOCC within the configuration d 0 is required to be seven two-qubit entangled states shared between u 1 u 2,..., u 6 u 7, and u 7 v 8, respectively, where (u 1,..., u 7 ) is a permutation of (v 1,..., v 7 ). (7) Note that although u 1 uses only one qubit in this case, the remaining system of u 1, which is two dimensional, cannot be used for sharing an entangled state with the other parties since there is no dimension left in the quantum systems of the other parties. Therefore, the distribution of the two-qubit entangled states is represented by a line-topology graph, as illustrated in Fig. 5. Note that this line-topology graph is a tree. Since the target set S 0 includes a fully entangled state ( ) ψ α π, it is necessary that any common resource state consisting of bipartite entanglement for S 0 within the configuration d 0 is a state consisting of seven two-qubit entangled states represented by the line-topology tree as shown in Fig. 5. We prove that the state ψ(α π ) cannot be prepared from any such resource state. Since any two-qubit entangled state can be obtained by LOCC from a Bell state 1 2 ( 00 + 11 ), it suffices to consider resource states consisting of seven Bell states represented by the linetopology tree. Thus, the condition given in Inequality (1) implies that the state ψ ( α π ) can be prepared from resource states consisting of seven Bell states represented by a line-topology tree if and only if R e ( ψ ( α π ) ) 2 for any edge e of the line-topology tree. In other words, the Schmidt rank of ( ) ψ α π with respect to each edge of the line-topology tree needs to be smaller than ( or equal to 2. However, the explicit calculation of R e ψ(α π ) ) for all the edges e of all the 7! = 500 different trees obtained from the permutations of v 1,..., v 7 in Eq. (7) shows that, for any of the permutations, there exists an edge e such that R e ( ψ ( α π ) ) > 2. (8) For( details, ( ) ) see Appendix A. The calculation of R e ψ α π implies that the state ψ(α π ) cannot be prepared from any resource state consisting of the seven Bell states. Therefore, we conclude that there exists no common resource state consisting of bipartite entanglement for the target set S 0 within the configuration d 0. Q.E.D. We remark that, regarding the required system sizes for storing a common resource state consisting of bipartite entanglement, the above argument for Proposition 2 based on the Schmidt ranks of a common resource state consisting of bipartite entanglement can also apply to more general target sets. In particular, we analyze in Appendix B a target set S of 2m-qudit states, where the size of each qudit is d, and each state in S has maximal Schmidt ranks with respect to any bipartition between m qudits and the other m qudits. Note that random weighted graph states or random pure states fulfill this condition, for which the reduced states have almost maximum entropy for any bipartition [32]. We show in Appendix B that for any resource state consisting of bipartite entanglement to obtain such a state by LOCC, or even by stochastic LOCC, there has to be at least one party for which the local quantum system size for storing this resource state needs to be almost quadratically larger than d, that is, greater than or equal to d 2 1 m. We also note that for some special configurations of local system sizes, these differences between bipartite and multipartite entanglement do not arise, especially if dim H v1 N k=2 dim Hv k [33]. V. SYSTEM-SIE-LIMITED QUANTUM STATE PREPARATION IN THE DYNAMIC SETTING In this section, we analyze the difference in system-sizelimited quantum state preparation between the static setting and the dynamic setting. Before analyzing multipartite cases, we first discuss a simpler bipartite case to clarify the difference between the static setting and the dynamic setting. Consider two parties v 1 and v 2, where each party has two qubits; that is, the configuration ( d (v1), d (v2)) is given by d (v1) = dim H v1 =, d (v2) = dim H v1 =. In this case, these two parties can store an entangled resource state of Schmidt rank in the static setting. However, in the dynamic setting, the parties can prepare an entangled resource state of Schmidt rank at most 2, which is shown as follows. Consider any shared state

8 φ v1,v2 after the last round of quantum communication for preparing φ v1,v2, where we assume that the direction of the quantum communication in the last round is from v 1 to v 2 without loss of generality. Since the quantum communication sends out at least one qubit from v 1, the rank of v 1 s reduced state for φ v1,v2 is at most 2; that is, the Schmidt rank of φ v1,v2 is at most two. Since the Schmidt rank is monotonically nonincreasing by LOCC [31], v 1 and v 2 after the last round of quantum communication cannot prepare an entangled resource state of Schmidt rank more than 2, which yields the conclusion. Although this two-party example is trivial, we also show nontrivial cases of more than two parties in the following. We present the following two propositions. Proposition 3 shows that the common resource states available in the dynamic setting can still have more capability than any common resource state consisting of bipartite entanglement in the static setting, similarly to the common resource states exhibiting multipartite entanglement in the static setting. In contrast, Proposition shows the existence of common resource states which cannot be prepared in the dynamic setting by the parties within a limitation of local system sizes, while the common resource states can still be stored within the limitation in the static setting. This implies that the common resource states in the dynamic setting have in this case less capability than a common resource state exhibiting multipartite entanglement in the static setting. Proposition 3. A common resource state in the dynamic setting having more capability than any common resource state consisting of bipartite entanglement. The state Φ res in the proof of Proposition 1 and in Fig. can be used as a common resource state for achieving the system-size-limited quantum state preparation in the dynamic setting for the configuration d 0 defined in Eq. () and the target set S 0 defined in Eq. (5), while the systemsize-limited quantum state preparation in the static setting for d 0 and S 0 cannot be achieved by any common resource state consisting of bipartite entanglement due to Proposition 2. Proposition. Common resource states exhibiting multipartite entanglement which cannot be prepared in the dynamic setting. Consider four( parties v 1, v 2, v 3, and ) v. Given a configuration d 1 = d (v1) 1, d (v2) 1, d (v3) 1, d (v) 1, where d (v1) 1 = dim H v1 =, d (v k) 1 = dim H v k = 2, v k {v 2, v 3, v }, any fully entangled common resource state φ H whose Schmidt rank with respect to the bipartition between v 1 and v 2 v 3 v is more than 2 cannot be prepared in the dynamic setting, although there exists such a common resource state which can be stored in the static setting. First, we prove Proposition 3 as follows. Proof of Proposition 3. We show that the common resource state Φ res in the proof of Proposition 1 and in Fig. can be prepared by the parties using quantum communication in addition to LOCC within the configuration d 0. The protocol for preparing Φ res is represented by a quantum circuit illustrated in Fig. 6. In this circuit, the parties repeatedly perform C gates defined in Eq. (2) to entangle qubits initialized as, distribute one qubit of the entangled state by quantum communication, and perform a C gate again to entangle the remaining part of the entangled state with another qubit initialized as. After this protocol, the state Φ res is shared among the parties v 1,..., v 8. Q.E.D. Next, we prove Proposition in a similar way to the example given at the beginning of this section. Proof of Proposition. Consider any fully entangled state φ v1,v2,v3,v shared among v 1, v 2, v 3, and v after the last round of quantum communication for preparing φ v1,v2,v3,v. The direction of the quantum communication in the last round is either of the following three possibilities: 1. From v 1 to v k where k {2, 3, }; 2. From v k to v k where k, k {2, 3, } and k k ; 3. From v k to v 1 where k {2, 3, }. Since φ v1,v2,v3,v is fully entangled, we exclude the latter two possibilities 2 and 3, which lead to a product state between v k and the others. Regarding possibility 1, after sending at least one qubit from v 1 to v k, the rank of v 1 s reduced state for φ v1,v2,v3,v is at most 2; that is, the Schmidt rank of φ v1,v2,v3,v with respect to the bipartition between v 1 and v 2 v 3 v is at most 2. Since the Schmidt rank is monotonically nonincreasing by LOCC [31], the parties after the last round of quantum communication cannot prepare any common resource state whose Schmidt rank with respect to the bipartition between v 1 and v 2 v 3 v is more than 2, which yields the conclusion. Q.E.D. Note that under the limitation in Proposition, the parties can prepare any state whose Schmidt rank with respect to the bipartition between v 1 and v 2 v 3 v is not more than 2. This is because v 1 s reduced state can be represented by one qubit in this case, and hence, the parties can perform quantum communication to bring arbitrary two qubits to v 1 to perform any two-qubit gates. We also remark that, while we assume in our analysis that quantum communication is performed sequentially, one can also consider simultaneous quantum communication between two parties, which is considered as a swap operation between the two. However, this simultaneous quantum communication yields a trivial result, since the parties under the limitation in Proposition can prepare any state Φ H using swap operations for letting v 1 perform arbitrary two-qubit gates.