1 / 24

Quantum communication from Alice to Bob

Quantum communication from Alice to Bob. Aram Harrow, MIT. quant-ph/0308044. Andreas Winter, Bristol. Igor Devetak, USC. outline. Introduction basic concepts and resource inequalities historical overview of quantum information theory A family of protocols

wynn
Download Presentation

Quantum communication from Alice to Bob

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Quantum communication from Alice to Bob Aram Harrow, MIT quant-ph/0308044 Andreas Winter, Bristol Igor Devetak, USC

  2. outline • Introduction • basic concepts and resource inequalities • historical overview of quantum information theory • A family of protocols • Rederive and connect old protocols • Prove new protocols (parents) • Optimal trade-off curves

  3. the setting • two parties: Alice and Bob • one-way communication from Alice to Bob • we want asymptotic communication rates (noisy) classical communication (noisy) quantum communication (noisy) shared entanglement or classical correlations Bob Alice

  4. Information processing resources may be: • classical / quantum c / q • noisy / noiseless (unit) { } / [ ] • dynamic / static ! / ¢ examples of bipartite resources

  5. Church of the larger Hilbert space Channel N:HA’!HB) isometric extension UN:HA’!HB­HE s.t. N(r) = trEUN(r). Use a test source |fiAA’ and define |yiABE = (IA­ UN)|fiAA’ A |fiAA’ |yiABE A0 UN B E static rAB) purification |yiABE s.t. rAB = trEyABE. If rAB=åi pi |fiihfi|AB, then |yiABE=åippi |iiE­|fiiAB.

  6. information theoretic quantities von Neumann entropy: H(A)y = -tr [yA log yA] mutual information: I(A:B) = H(A) + H(B) – H(AB) coherent information: Ic(AiB) = H(B) – H(AB) = -H(A|B) conditional mutual information: I(A:B|X) = H(A|X) + H(B|X) – H(AB|X) = I(A:BX) – I(B:X)

  7. resource inequalities Example: classical noisy channel coding [Shannon] {c!c}N> I(A:B)p [c!c] Meaning there exists an asymptotic and approximate protocol transforming the LHS into the RHS. For any e>0 and any R<I(A:B) and for sufficiently large n there exist encoding and decoding maps E: {0,1}nR! Xn and D: Xn! {0,1}­nR such that for any input x2{0,1}nR (D ¢ N­n ¢ E)|xi ¼e|xi The capacity is given by maxp I(A:B)p, where p is a distribution on AB resulting from B = N(A).

  8. resource inequalities Example: quantum channel coding {q!q}N> Ic(AiB)y [q!q] Meaning there exists an asymptotic and approximate protocol transforming the LHS into the RHS. For any e>0 and any R<Ic(AiB) and for sufficiently large n there exist encoding and decoding maps E: H2­nR! HA’­n and D: HB­n!H2­nR such that for any input |fi2H2­n, (D ¢ N­n ¢ E)|fi ¼e|fi The capacity is given by limn!1 (1/n) maxy Ic(AiB)y, where the maximization is over all y arising from N­n.

  9. the history of quantum information theory, part one

  10. first generation: semi-classical • Characterized by: • Results depend only on average density matrix • Protocols can be analyzed by looking at one party’s state Examples: Schumacher compression: [PRA 51, 2738 (1995)] yRA + S(A) [q!q] >yRB entanglement concentration/dilution: [BBPS, quant-ph/9511030] yAB = S(A)y [qq] remote state preparation: [BDSSTW, quant-ph/0006044] S(B) [c!c] + S(B) [qq] > EAB = {pi, |fiiB}

  11. first generation techniques semi-classical reductions: Schmidt decomposition: |yiAB=åippi |aiiA|biiB matrix diagonalization: r = åi pi |viihvi| Typical sequences: p a probability distribution p-typical sequences i1,…,in have |#{ij = x} – npx| < nd for all x # of p-typical sequences is ¼exp(n(S(p)+d)) each has probability exp(-n(S(p) ± d)) Typical projectors and subspaces: r a state with spectrum p P = åI typical |vIihvI| projects onto a typical subspace where I=i1,…,in is a typical sequence and |vIi=|vi1i…|vini

  12. 2nd generation: CQ ensembles HSW theorem:[H, IEEE IT 44, 269 (1998); SW, PRA 56, 131 (1997)] E = åi pi |iihi|A­siB@ {c!q} >I(A:B) [c!c] I(A:B) = S(åipisi) - åiS(si) = c(E) Entanglement assisted channel capacity: [BSST, quant-ph/0106052] {q!q} + H(A) ebits > I(A:B) [c!c] RSP of entangled states: [BHLSW, quant-ph/0307100] H(A) [qq] + I(A:B) [c!c]> E = åi pi |iihi|X­|yiihyi|AB Measurement compression:[Winter, quant-ph/0109050] I(X:R)[c!c] + H(X|R) [cc] > T:A! AEXAXB on |fiAR

  13. 2nd generation techniques operator Chernoff bounds:[AW, quant-ph/0012127] X1,…,Xn i.i.d. Hermitian matrices s.t. 06Xi6I and m=EXi>aI conditionally typical subspaces:E = åi pi |iihi|A­siB Compressing B requires S(B) qubits, but if you know (or have) A then you need S(B|A) = S(AB) – S(A) = åi pi S(si) qubits. The difference is S(B)-S(B|A) = S(A)+S(B)-S(AB) = I(A:B) = c.

  14. 3rd generation: fully quantum • quantum channel capacity: {q!q} > Ic(AiB) • super-dense coding of quantum states • double and triple-tradeoff curves: • N> R [c!c] + Q[q!q] + E[qq] • unification of different protocols • entanglement distillation using limited quantum or classical communication

  15. 3rd generation techniques derandomization: If the output state is pure, [cc] inputs are unnecessary. piggybacking: Time-sharing protocol Px with probability px allows an extra output of I(X:B) [c!c]. [DS, quant-ph/0311131] coherent classical communication:[H, quant-ph/0307091] Modify protocols to obtain [[c!c]]: |xiA!|xiA|xiB use coherent TP and SD to get 2 [[c!c]] = [q!q] + [qq].

  16. main result #1: parent protocols father: {q!q} + ½ I(A:E) [qq] > ½ I(A:B) [q!q] mother: {qq} + ½ I(A:E) [q!q] > ½ I(A:B) [qq] • Basic protocols combine with parents to get children. • (TP) 2[c!c] + [qq] > {q!q} • (SD) [q!q] + [qq] > 2[c!c] • (QE) [q!q] > [qq]

  17. the family tree  {q!q} + ½ I(A:E) [qq] > ½ I(A:B) [q!q]  {qq} + ½ I(A:E) [q!q] > ½ I(A:B) [qq] SD TP SD {qq} + H(A) [q!q] > I(A:B) [c!c] H3LT, [QIC 1, 2001], noisy SD {q!q} + H(A) [qq] > I(A:B) [c!c] BSST, [IEEE IT 48, 2002], E-assisted cap. QE {qq} + I(A:E) [c!c] > Ic(AiB) [q!q] DW, entanglement distillation {q!q} > Ic(AiB) [q!q] L/S/D, quantum channel cap. TP TP {qq} + I(A:B) [c!c] > Ic(AiB) [q!q] DHW, noisy TP (TP) 2[c!c] + [qq] > {q!q} (SD) [q!q] + [qq] > 2[c!c] (QE) [q!q] > [qq]

  18. coherent classical communication rule I: X + C [c!c] > Y ) X + C/2 ([q!q] – [qq])> Y rule O: X > Y + C [c!c] ) X > Y + C/2 ([q!q] + [qq]) Whenever the classical message in the original protocol is almost uniformly distributed and is almost decoupled from the remaining quantum state of Alice, Bob and Eve. based on PRL 92, 097902 (2004)

  19. generating the parents  {q!q} + ½ I(A:E) [qq] > ½ I(A:B) [q!q]  {qq} + ½ I(A:E) [q!q] > ½ I(A:B) [qq] O O SD TP SD I {qq} + H(A) [q!q] > I(A:B) [c!c] H3LT, [QIC 1, 2001], noisy SD {q!q} + H(A) [qq] > I(A:B) [c!c] BSST, [IEEE IT 48, 2002], E-assisted cap. {qq} + I(A:E) [c!c] > Ic(AiB) [q!q] DW, entanglement distillation QE {q!q} > Ic(AiB) [q!q] L/S/D, quantum channel cap. TP TP {qq} + I(A:B) [c!c] > Ic(AiB) [q!q] DHW, noisy TP

  20. qubit > ebit bound I(A:B)/2 [BSST; quant-ph/0106052] 45o Ic(A>B) [L/S/D] H(A)+I(A:B) main result #2: tradeoff curves example: quantum channel capacity with limited entanglement Q: qubits sent per use of channel E: ebits allowed per use of channel

  21. I(A:B)/2 father 45o Ic(AiB) [L/S/D] I(A:E)/2 = I(A:B)/2 - Ic(AiB) father trade-off curve Q: qubits sent per use of channel E: ebits allowed per use of channel

  22. mother trade-off curve preprocessing instrument T:A!AE’X {qq} + ½ I(A:EE’|X) [q!q] + H(X)[c!c] > ½ I(A:B|X)[qq] measurement compression I(X:BE) [c!c] + H(X|BE) [cc] derandomization I(X:BE) [c!c] ½ I(X:BE) ([q!q] – [qq]) rule I {qq} + ½ I(A:E) [q!q] > ½ I(A:B)[qq] H(X) [c!c] {qq} + ½ (I(A:EE’|X) + I(X:BE)) [q!q] > ½ (I(A:B|X) + I(X:BE)) [qq]

  23. converse proof techniques Holevo bound/data processing inequality: X Q  Y: I(X:Y) 6 I(X:Q) quantum data processing inequality: [quant-ph/9604022] RQ  RQ’E1  RQ’’E1E2: H(R)=Ic(RiQ)>Ic(RiQ’) > Ic(RiQ’’) Fano/Fannes inequality: error e on n qubits makes entropy change by O(e(n+log(1/e)). unnamed identity that shows up everywhere: I(X:AB) = H(A) + Ic(AiBX) – I(A:B) + I(X:B)

  24. what’s left • In quant-ph/0308044, we prove similar tradeoff curves for the rest of the resource inequalities in the family. • Remaining open questions include • Finding single-letter formulae (i.e. additivity) • Reducing the optimizations over instruments • Addressing two-way communication • Multiple noisy resources • Reverse coding theorems

More Related