-
Efficient unitary designs and pseudorandom unitaries from permutations
Authors:
Chi-Fang Chen,
Adam Bouland,
Fernando G. S. L. Brandão,
Jordan Docter,
Patrick Hayden,
Michelle Xu
Abstract:
In this work we give an efficient construction of unitary $k$-designs using $\tilde{O}(k\cdot poly(n))$ quantum gates, as well as an efficient construction of a parallel-secure pseudorandom unitary (PRU). Both results are obtained by giving an efficient quantum algorithm that lifts random permutations over $S(N)$ to random unitaries over $U(N)$ for $N=2^n$. In particular, we show that products of…
▽ More
In this work we give an efficient construction of unitary $k$-designs using $\tilde{O}(k\cdot poly(n))$ quantum gates, as well as an efficient construction of a parallel-secure pseudorandom unitary (PRU). Both results are obtained by giving an efficient quantum algorithm that lifts random permutations over $S(N)$ to random unitaries over $U(N)$ for $N=2^n$. In particular, we show that products of exponentiated sums of $S(N)$ permutations with random phases approximately match the first $2^{Ω(n)}$ moments of the Haar measure. By substituting either $\tilde{O}(k)$-wise independent permutations, or quantum-secure pseudorandom permutations (PRPs) in place of the random permutations, we obtain the above results. The heart of our proof is a conceptual connection between the large dimension (large-$N$) expansion in random matrix theory and the polynomial method, which allows us to prove query lower bounds at finite-$N$ by interpolating from the much simpler large-$N$ limit. The key technical step is to exhibit an orthonormal basis for irreducible representations of the partition algebra that has a low-degree large-$N$ expansion. This allows us to show that the distinguishing probability is a low-degree rational polynomial of the dimension $N$.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Learning interacting fermionic Hamiltonians at the Heisenberg limit
Authors:
Arjun Mirani,
Patrick Hayden
Abstract:
Efficiently learning an unknown Hamiltonian given access to its dynamics is a problem of interest for quantum metrology, many-body physics and machine learning. A fundamental question is whether learning can be performed at the Heisenberg limit, where the Hamiltonian evolution time scales inversely with the error, $\varepsilon$, in the reconstructed parameters. The Heisenberg limit has previously…
▽ More
Efficiently learning an unknown Hamiltonian given access to its dynamics is a problem of interest for quantum metrology, many-body physics and machine learning. A fundamental question is whether learning can be performed at the Heisenberg limit, where the Hamiltonian evolution time scales inversely with the error, $\varepsilon$, in the reconstructed parameters. The Heisenberg limit has previously been shown to be achievable for certain classes of qubit and bosonic Hamiltonians. Most recently, a Heisenberg-limited learning algorithm was proposed for a simplified class of fermionic Hubbard Hamiltonians restricted to real hopping amplitudes and zero chemical potential at all sites, along with on-site interactions. In this work, we provide an algorithm to learn a more general class of fermionic Hubbard Hamiltonians at the Heisenberg limit, allowing complex hopping amplitudes and nonzero chemical potentials in addition to the on-site interactions, thereby including several models of physical interest. The required evolution time across all experiments in our protocol is $\mathcal{O}(1/\varepsilon)$ and the number of experiments required to learn all the Hamiltonian parameters is $\mathcal{O}(\text{polylog}(1/\varepsilon))$, independent of system size as long as each fermionic mode interacts with $\mathcal{O}(1)$ other modes. Unlike prior algorithms for bosonic and fermionic Hamiltonians, to obey fermionic parity superselection constraints in our more general setting, our protocol utilizes $\mathcal{O}(N)$ ancillary fermionic modes, where $N$ is the system size. Each experiment involves preparing fermionic Gaussian states, interleaving time evolution with fermionic linear optics unitaries, and performing local occupation number measurements on the fermionic modes. The protocol is robust to a constant amount of state preparation and measurement error.
△ Less
Submitted 15 March, 2024; v1 submitted 29 February, 2024;
originally announced March 2024.
-
Efficient Unitary T-designs from Random Sums
Authors:
Chi-Fang Chen,
Jordan Docter,
Michelle Xu,
Adam Bouland,
Patrick Hayden
Abstract:
Unitary $T$-designs play an important role in quantum information, with diverse applications in quantum algorithms, benchmarking, tomography, and communication. Until now, the most efficient construction of unitary $T$-designs for $n$-qudit systems has been via random local quantum circuits, which have been shown to converge to approximate $T$-designs in the diamond norm using $O(T^{5+o(1)} n^2)$…
▽ More
Unitary $T$-designs play an important role in quantum information, with diverse applications in quantum algorithms, benchmarking, tomography, and communication. Until now, the most efficient construction of unitary $T$-designs for $n$-qudit systems has been via random local quantum circuits, which have been shown to converge to approximate $T$-designs in the diamond norm using $O(T^{5+o(1)} n^2)$ quantum gates. In this work, we provide a new construction of $T$-designs via random matrix theory using $\tilde{O}(T^2 n^2)$ quantum gates. Our construction leverages two key ideas. First, in the spirit of central limit theorems, we approximate the Gaussian Unitary Ensemble (GUE) by an i.i.d. sum of random Hermitian matrices. Second, we show that the product of just two exponentiated GUE matrices is already approximately Haar random. Thus, multiplying two exponentiated sums over rather simple random matrices yields a unitary $T$-design, via Hamiltonian simulation. A central feature of our proof is a new connection between the polynomial method in quantum query complexity and the large-dimension ($N$) expansion in random matrix theory. In particular, we show that the polynomial method provides exponentially improved bounds on the high moments of certain random matrix ensembles, without requiring intricate Weingarten calculations. In doing so, we define and solve a new type of moment problem on the unit circle, asking whether a finite number of equally weighted points, corresponding to eigenvalues of unitary matrices, can reproduce a given set of moments.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Entanglement cost for infinite-dimensional physical systems
Authors:
Hayata Yamasaki,
Kohdai Kuroiwa,
Patrick Hayden,
Ludovico Lami
Abstract:
We prove that the entanglement cost equals the regularized entanglement of formation for any infinite-dimensional quantum state $ρ_{AB}$ with finite quantum entropy on at least one of the subsystems $A$ or $B$. This generalizes a foundational result in quantum information theory that was previously formulated only for operations and states on finite-dimensional systems. The extension to infinite d…
▽ More
We prove that the entanglement cost equals the regularized entanglement of formation for any infinite-dimensional quantum state $ρ_{AB}$ with finite quantum entropy on at least one of the subsystems $A$ or $B$. This generalizes a foundational result in quantum information theory that was previously formulated only for operations and states on finite-dimensional systems. The extension to infinite dimensions is nontrivial because the conventional tools for establishing both the direct and converse bounds, i.e., strong typically, monotonicity, and asymptotic continuity, are no longer directly applicable. To address this problem, we construct a new entanglement dilution protocol for infinite-dimensional states implementable by local operations and a finite amount of one-way classical communication (one-way LOCC), using weak and strong typicality multiple times. We also prove the optimality of this protocol among all protocols even under infinite-dimensional separable operations by developing an argument based on alternative forms of monotonicity and asymptotic continuity of the entanglement of formation for infinite-dimensional states. Along the way, we derive a new integral representation for the quantum entropy of infinite-dimensional states, which we believe to be of independent interest. Our results allow us to fully characterize an important operational entanglement measure -- the entanglement cost -- for all infinite-dimensional physical systems.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Security of position-based quantum cryptography limits Hamiltonian simulation via holography
Authors:
Harriet Apel,
Toby Cubitt,
Patrick Hayden,
Tamara Kohler,
David Pérez-García
Abstract:
We investigate the link between position-based quantum cryptography (PBQC) and holography established in [MPS19] using holographic quantum error correcting codes as toy models. If the "temporal" scaling of the AdS metric is inserted by hand into the toy model via the bulk Hamiltonian interaction strength we recover a toy model with consistent causality structure. This leads to an interesting impli…
▽ More
We investigate the link between position-based quantum cryptography (PBQC) and holography established in [MPS19] using holographic quantum error correcting codes as toy models. If the "temporal" scaling of the AdS metric is inserted by hand into the toy model via the bulk Hamiltonian interaction strength we recover a toy model with consistent causality structure. This leads to an interesting implication between two topics in quantum information: if position-based cryptography is secure against attacks with small entanglement then there are new fundamental lower bounds for resources required for one Hamiltonian to simulate another.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Efficient Quantum Algorithm for Port-based Teleportation
Authors:
Jiani Fei,
Sydney Timmerman,
Patrick Hayden
Abstract:
In this paper, we provide the first efficient algorithm for port-based teleportation, a unitarily equivariant version of teleportation useful for constructing programmable quantum processors and performing instantaneous nonlocal computation (NLQC). The latter connection is important in AdS/CFT, where bulk computations are realized as boundary NLQC. Our algorithm yields an exponential improvement t…
▽ More
In this paper, we provide the first efficient algorithm for port-based teleportation, a unitarily equivariant version of teleportation useful for constructing programmable quantum processors and performing instantaneous nonlocal computation (NLQC). The latter connection is important in AdS/CFT, where bulk computations are realized as boundary NLQC. Our algorithm yields an exponential improvement to the known relationship between the amount of entanglement available and the complexity of the nonlocal part of any unitary that can be implemented using NLQC. Similarly, our algorithm provides the first nontrivial efficient algorithm for an approximate universal programmable quantum processor. The key to our approach is a generalization of Schur-Weyl duality we call twisted Schur-Weyl duality, as well as an efficient algorithm we develop for the twisted Schur transform, which transforms to a subgroup-reduced irrep basis of the partially transposed permutation algebra, whose dual is the $U^{\otimes n-k} \otimes (U^*)^{\otimes k}$ representation of the unitary group.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
What exactly does Bekenstein bound?
Authors:
Patrick Hayden,
Jinzhao Wang
Abstract:
The Bekenstein bound posits a maximum entropy for matter with finite energy confined to a spacetime region. It is often interpreted as a fundamental limit on the information that can be stored by physical objects. In this work, we test this interpretation by asking whether the Bekenstein bound imposes constraints on a channel's communication capacity, a context in which information can be given a…
▽ More
The Bekenstein bound posits a maximum entropy for matter with finite energy confined to a spacetime region. It is often interpreted as a fundamental limit on the information that can be stored by physical objects. In this work, we test this interpretation by asking whether the Bekenstein bound imposes constraints on a channel's communication capacity, a context in which information can be given a mathematically rigorous and operationally meaningful definition. We first derive a bound on the accessible information and demonstrate that the Bekenstein bound constrains the decoding instead of the encoding. Then we study specifically the Unruh channel that describes a stationary Alice exciting different species of free scalar fields to send information to an accelerating Bob, who is therefore confined to a Rindler wedge and exposed to the noise of Unruh radiation. We show that the classical and quantum capacities of the Unruh channel obey the Bekenstein bound. In contrast, the entanglement-assisted capacity is as large as the input size even at arbitrarily high Unruh temperatures. This reflects that the Bekenstein bound can be violated if we do not properly constrain the decoding operation in accordance with the bound. We further find that the Unruh channel can transmit a significant number of zero-bits, which are communication resources that can be used as minimal substitutes for the classical/quantum bits needed for many primitive information processing protocols, such as dense coding and teleportation. We show that the Unruh channel has a large zero-bit capacity even at high temperatures, which underpins the capacity boost with entanglement assistance and allows Alice and Bob to perform quantum identification. Therefore, unlike classical bits and qubits, zero-bits and their associated information processing capability are not constrained by the Bekenstein bound.
△ Less
Submitted 14 September, 2023;
originally announced September 2023.
-
Reflected entropy is not a correlation measure
Authors:
Patrick Hayden,
Marius Lemm,
Jonathan Sorce
Abstract:
By explicit counterexample, we show that the "reflected entropy" defined by Dutta and Faulkner is not monotonically decreasing under partial trace, and so is not a measure of physical correlations. In fact, our counterexamples show that none of the Rényi reflected entropies $S_{R}^{(α)}$ for $0 < α< 2$ is a correlation measure; the usual reflected entropy is realized as the $α=1$ member of this fa…
▽ More
By explicit counterexample, we show that the "reflected entropy" defined by Dutta and Faulkner is not monotonically decreasing under partial trace, and so is not a measure of physical correlations. In fact, our counterexamples show that none of the Rényi reflected entropies $S_{R}^{(α)}$ for $0 < α< 2$ is a correlation measure; the usual reflected entropy is realized as the $α=1$ member of this family. The counterexamples are given by quantum states that correspond to classical probability distributions, so reflected entropy fails to measure correlations even at the classical level.
△ Less
Submitted 7 June, 2023; v1 submitted 20 February, 2023;
originally announced February 2023.
-
Concatenation Schemes for Topological Fault-tolerant Quantum Error Correction
Authors:
Zhaoyi Li,
Isaac Kim,
Patrick Hayden
Abstract:
We investigate a family of fault-tolerant quantum error correction schemes based on the concatenation of small error detection or error correction codes with the three-dimensional cluster state. We propose fault-tolerant state preparation and decoding schemes that effectively convert every circuit-level error into an erasure error, leveraging the cluster state's high threshold against such errors.…
▽ More
We investigate a family of fault-tolerant quantum error correction schemes based on the concatenation of small error detection or error correction codes with the three-dimensional cluster state. We propose fault-tolerant state preparation and decoding schemes that effectively convert every circuit-level error into an erasure error, leveraging the cluster state's high threshold against such errors. We find a set of codes for which such a conversion is possible, and study their performance against the standard circuit-level depolarizing model. Our best performing scheme, which is based on a concatenation with a classical code, improves the threshold by $16.5\%$ and decreases the spacetime overhead by $32\%$ compared to the scheme without concatenation, with each scheme subject to a physical error rate of $10^{-3}$ and achieving a logical error rate of $10^{-6}$.
△ Less
Submitted 5 August, 2023; v1 submitted 19 September, 2022;
originally announced September 2022.
-
A canonical Hamiltonian for open quantum systems
Authors:
Patrick Hayden,
Jonathan Sorce
Abstract:
If an open quantum system is initially uncorrelated from its environment, then its dynamics can be written in terms of a Lindblad-form master equation. The master equation is divided into a unitary piece, represented by an effective Hamiltonian, and a dissipative piece, represented by a hermiticity-preserving superoperator; however, the division of open system dynamics into unitary and dissipative…
▽ More
If an open quantum system is initially uncorrelated from its environment, then its dynamics can be written in terms of a Lindblad-form master equation. The master equation is divided into a unitary piece, represented by an effective Hamiltonian, and a dissipative piece, represented by a hermiticity-preserving superoperator; however, the division of open system dynamics into unitary and dissipative pieces is non-unique. For finite-dimensional quantum systems, we resolve this non-uniqueness by specifying a norm on the space of dissipative superoperators and defining the canonical Hamiltonian to be the one whose dissipator is minimal. We show that the canonical Hamiltonian thus defined is equivalent to the Hamiltonian initially defined by Lindblad, and that it is uniquely specified by requiring the dissipator's jump operators to be traceless, extending a uniqueness result known previously in the special case of Markovian master equations. For a system weakly coupled to its environment, we give a recursive formula for computing the canonical effective Hamiltonian to arbitrary orders in perturbation theory, which we can think of as a perturbative scheme for renormalizing the system's bare Hamiltonian.
△ Less
Submitted 11 May, 2022; v1 submitted 18 August, 2021;
originally announced August 2021.
-
Perturbative quantum simulation
Authors:
Jinzhao Sun,
Suguru Endo,
Huiping Lin,
Patrick Hayden,
Vlatko Vedral,
Xiao Yuan
Abstract:
Approximation based on perturbation theory is the foundation for most of the quantitative predictions of quantum mechanics, whether in quantum many-body physics, chemistry, quantum field theory or other domains. Quantum computing provides an alternative to the perturbation paradigm, yet state-of-the-art quantum processors with tens of noisy qubits are of limited practical utility. Here, we introdu…
▽ More
Approximation based on perturbation theory is the foundation for most of the quantitative predictions of quantum mechanics, whether in quantum many-body physics, chemistry, quantum field theory or other domains. Quantum computing provides an alternative to the perturbation paradigm, yet state-of-the-art quantum processors with tens of noisy qubits are of limited practical utility. Here, we introduce perturbative quantum simulation, which combines the complementary strengths of the two approaches, enabling the solution of large practical quantum problems using limited noisy intermediate-scale quantum hardware. The use of a quantum processor eliminates the need to identify a solvable unperturbed Hamiltonian, while the introduction of perturbative coupling permits the quantum processor to simulate systems larger than the available number of physical qubits. We present an explicit perturbative expansion that mimics the Dyson series expansion and involves only local unitary operations, and show its optimality over other expansions under certain conditions. We numerically benchmark the method for interacting bosons, fermions, and quantum spins in different topologies, and study different physical phenomena, such as information propagation, charge-spin separation, and magnetism, on systems of up to $48$ qubits only using an $8+1$ qubit quantum hardware. We experimentally demonstrate our scheme on the IBM quantum cloud, verifying its noise robustness and illustrating its potential for benchmarking large quantum processors with smaller ones.
△ Less
Submitted 28 September, 2022; v1 submitted 10 June, 2021;
originally announced June 2021.
-
Black hole microstates vs. the additivity conjectures
Authors:
Patrick Hayden,
Geoff Penington
Abstract:
We argue that one of the following statements must be true: (a) extensive violations of quantum information theory's additivity conjectures exist or (b) there exists a set of `disentangled' black hole microstates that can account for the entire Bekenstein-Hawking entropy, up to at most a subleading $O(1)$ correction. Possibility (a) would be a significant result in quantum communication theory, de…
▽ More
We argue that one of the following statements must be true: (a) extensive violations of quantum information theory's additivity conjectures exist or (b) there exists a set of `disentangled' black hole microstates that can account for the entire Bekenstein-Hawking entropy, up to at most a subleading $O(1)$ correction. Possibility (a) would be a significant result in quantum communication theory, demonstrating that entanglement can enhance the ability to transmit information much more than has currently been established. Option (b) would provide new insight into the microphysics of black holes. In particular, the disentangled microstates would have to have nontrivial structure at or outside the black hole horizon, assuming the validity of the quantum extremal surface prescription for calculating entanglement entropy in AdS/CFT.
△ Less
Submitted 14 December, 2020;
originally announced December 2020.
-
Recycling qubits in near-term quantum computers
Authors:
Galit Anikeeva,
Isaac H. Kim,
Patrick Hayden
Abstract:
Quantum computers are capable of efficiently contracting unitary tensor networks, a task that is likely to remain difficult for classical computers. For instance, networks based on matrix product states or the multi-scale entanglement renormalization ansatz (MERA) can be contracted on a small quantum computer to aid the simulation of a large quantum system. However, without the ability to selectiv…
▽ More
Quantum computers are capable of efficiently contracting unitary tensor networks, a task that is likely to remain difficult for classical computers. For instance, networks based on matrix product states or the multi-scale entanglement renormalization ansatz (MERA) can be contracted on a small quantum computer to aid the simulation of a large quantum system. However, without the ability to selectively reset qubits, the associated spatial cost can be exorbitant. In this paper, we propose a protocol that can unitarily reset qubits when the circuit has a common convolutional form, thus dramatically reducing the spatial cost for implementing the contraction algorithm on general near-term quantum computers. This protocol generates fresh qubits from used ones by partially applying the time-reversed quantum circuit over qubits that are no longer in use. In the absence of noise, we prove that the state of a subset of these qubits becomes $|0\ldots 0\rangle$, up to an error exponentially small in the number of gates applied. We also provide a numerical evidence that the protocol works in the presence of noise. We also provide a numerical evidence that the protocol works in the presence of noise, and formulate a condition under which the noise-resilience follows rigorously.
△ Less
Submitted 26 December, 2020; v1 submitted 2 December, 2020;
originally announced December 2020.
-
Fault-tolerant qubit from a constant number of components
Authors:
Kianna Wan,
Soonwon Choi,
Isaac H. Kim,
Noah Shutty,
Patrick Hayden
Abstract:
With gate error rates in multiple technologies now below the threshold required for fault-tolerant quantum computation, the major remaining obstacle to useful quantum computation is scaling, a challenge greatly amplified by the huge overhead imposed by quantum error correction itself. We propose a fault-tolerant quantum computing scheme that can nonetheless be assembled from a small number of expe…
▽ More
With gate error rates in multiple technologies now below the threshold required for fault-tolerant quantum computation, the major remaining obstacle to useful quantum computation is scaling, a challenge greatly amplified by the huge overhead imposed by quantum error correction itself. We propose a fault-tolerant quantum computing scheme that can nonetheless be assembled from a small number of experimental components, potentially dramatically reducing the engineering challenges associated with building a large-scale fault-tolerant quantum computer. Our scheme has a threshold of 0.39% for depolarising noise, assuming that memory errors are negligible. In the presence of memory errors, the logical error rate decays exponentially with $\sqrt{T/τ}$, where $T$ is the memory coherence time and $τ$ is the timescale for elementary gates. Our approach is based on a novel procedure for fault-tolerantly preparing three-dimensional cluster states using a single actively controlled qubit and a pair of delay lines. Although a circuit-level error may propagate to a high-weight error, the effect of this error on the prepared state is always equivalent to that of a constant-weight error. We describe how the requisite gates can be implemented using existing technologies in quantum photonic and phononic systems. With continued improvements in only a few components, we expect these systems to be promising candidates for demonstrating fault-tolerant quantum computation with a comparatively modest experimental effort.
△ Less
Submitted 7 December, 2021; v1 submitted 16 November, 2020;
originally announced November 2020.
-
Continuous symmetries and approximate quantum error correction
Authors:
Philippe Faist,
Sepehr Nezami,
Victor V. Albert,
Grant Salton,
Fernando Pastawski,
Patrick Hayden,
John Preskill
Abstract:
Quantum error correction and symmetry arise in many areas of physics, including many-body systems, metrology in the presence of noise, fault-tolerant computation, and holographic quantum gravity. Here we study the compatibility of these two important principles. If a logical quantum system is encoded into $n$ physical subsystems, we say that the code is covariant with respect to a symmetry group…
▽ More
Quantum error correction and symmetry arise in many areas of physics, including many-body systems, metrology in the presence of noise, fault-tolerant computation, and holographic quantum gravity. Here we study the compatibility of these two important principles. If a logical quantum system is encoded into $n$ physical subsystems, we say that the code is covariant with respect to a symmetry group $G$ if a $G$ transformation on the logical system can be realized by performing transformations on the individual subsystems. For a $G$-covariant code with $G$ a continuous group, we derive a lower bound on the error correction infidelity following erasure of a subsystem. This bound approaches zero when the number of subsystems $n$ or the dimension $d$ of each subsystem is large. We exhibit codes achieving approximately the same scaling of infidelity with $n$ or $d$ as the lower bound. Leveraging tools from representation theory, we prove an approximate version of the Eastin-Knill theorem: If a code admits a universal set of transversal gates and corrects erasure with fixed accuracy, then, for each logical qubit, we need a number of physical qubits per subsystem that is inversely proportional to the error parameter. We construct codes covariant with respect to the full logical unitary group, achieving good accuracy for large $d$ (using random codes) or $n$ (using codes based on $W$-states). We systematically construct codes covariant with respect to general groups, obtaining natural generalizations of qubit codes to, for instance, oscillators and rotors. In the context of the AdS/CFT correspondence, our approach provides insight into how time evolution in the bulk corresponds to time evolution on the boundary without violating the Eastin-Knill theorem, and our five-rotor code can be stacked to form a covariant holographic code.
△ Less
Submitted 20 February, 2019;
originally announced February 2019.
-
Quantum Virtual Cooling
Authors:
Jordan Cotler,
Soonwon Choi,
Alexander Lukin,
Hrant Gharibyan,
Tarun Grover,
M. Eric Tai,
Matthew Rispoli,
Robert Schittko,
Philipp M. Preiss,
Adam M. Kaufman,
Markus Greiner,
Hannes Pichler,
Patrick Hayden
Abstract:
We propose a quantum information based scheme to reduce the temperature of quantum many-body systems, and access regimes beyond the current capability of conventional cooling techniques. We show that collective measurements on multiple copies of a system at finite temperature can simulate measurements of the same system at a lower temperature. This idea is illustrated for the example of ultracold…
▽ More
We propose a quantum information based scheme to reduce the temperature of quantum many-body systems, and access regimes beyond the current capability of conventional cooling techniques. We show that collective measurements on multiple copies of a system at finite temperature can simulate measurements of the same system at a lower temperature. This idea is illustrated for the example of ultracold atoms in optical lattices, where controlled tunnel coupling and quantum gas microscopy can be naturally combined to realize the required collective measurements to access a lower, virtual temperature. Our protocol is experimentally implemented for a Bose-Hubbard model on up to 12 sites, and we successfully extract expectation values of observables at half the temperature of the physical system. Additionally, we present related techniques that enable the extraction of zero-temperature states directly.
△ Less
Submitted 13 August, 2019; v1 submitted 5 December, 2018;
originally announced December 2018.
-
A Quantum Multiparty Packing Lemma and the Relay Channel
Authors:
Dawei Ding,
Hrant Gharibyan,
Patrick Hayden,
Michael Walter
Abstract:
Optimally encoding classical information in a quantum system is one of the oldest and most fundamental challenges of quantum information theory. Holevo's bound places a hard upper limit on such encodings, while the Holevo-Schumacher-Westmoreland (HSW) theorem addresses the question of how many classical messages can be "packed" into a given quantum system. In this article, we use Sen's recent quan…
▽ More
Optimally encoding classical information in a quantum system is one of the oldest and most fundamental challenges of quantum information theory. Holevo's bound places a hard upper limit on such encodings, while the Holevo-Schumacher-Westmoreland (HSW) theorem addresses the question of how many classical messages can be "packed" into a given quantum system. In this article, we use Sen's recent quantum joint typicality results to prove a one-shot multiparty quantum packing lemma generalizing the HSW theorem. The lemma is designed to be easily applicable in many network communication scenarios. As an illustration, we use it to straightforwardly obtain quantum generalizations of well-known classical coding schemes for the relay channel: multihop, coherent multihop, decode-forward, and partial decode-forward. We provide both finite blocklength and asymptotic results, the latter matching existing classical formulas. Given the key role of the classical packing lemma in network information theory, our packing lemma should help open the field to direct quantum generalization.
△ Less
Submitted 26 May, 2020; v1 submitted 26 September, 2018;
originally announced September 2018.
-
Tight Limits on Nonlocality from Nontrivial Communication Complexity; a.k.a. Reliable Computation with Asymmetric Gate Noise
Authors:
Noah Shutty,
Mary Wootters,
Patrick Hayden
Abstract:
It has long been known that the existence of certain superquantum nonlocal correlations would cause communication complexity to collapse. The absurdity of a world in which any nonlocal binary function could be evaluated with a constant amount of communication in turn provides a tantalizing way to distinguish quantum mechanics from incorrect theories of physics; the statement "communication complex…
▽ More
It has long been known that the existence of certain superquantum nonlocal correlations would cause communication complexity to collapse. The absurdity of a world in which any nonlocal binary function could be evaluated with a constant amount of communication in turn provides a tantalizing way to distinguish quantum mechanics from incorrect theories of physics; the statement "communication complexity is nontrivial" has even been conjectured to be a concise information-theoretic axiom for characterizing quantum mechanics. We directly address the viability of that perspective with two results. First, we exhibit a nonlocal game such that communication complexity collapses in any physical theory whose maximal winning probability exceeds the quantum value. Second, we consider the venerable CHSH game that initiated this line of inquiry. In that case, the quantum value is about 0.85 but it is known that a winning probability of approximately 0.91 would collapse communication complexity. We provide evidence that the 0.91 result is the best possible using a large class of proof strategies, suggesting that the communication complexity axiom is insufficient for characterizing CHSH correlations. Both results build on new insights about reliable classical computation. The first exploits our formalization of an equivalence between amplification and reliable computation, while the second follows from an upper bound on the threshold for reliable computation with formulas of noisy XOR and AND gates.
△ Less
Submitted 1 May, 2023; v1 submitted 25 September, 2018;
originally announced September 2018.
-
Bit Threads and Holographic Monogamy
Authors:
Shawn X. Cui,
Patrick Hayden,
Temple He,
Matthew Headrick,
Bogdan Stoica,
Michael Walter
Abstract:
Bit threads provide an alternative description of holographic entanglement, replacing the Ryu-Takayanagi minimal surface with bulk curves connecting pairs of boundary points. We use bit threads to prove the monogamy of mutual information (MMI) property of holographic entanglement entropies. This is accomplished using the concept of a so-called multicommodity flow, adapted from the network setting,…
▽ More
Bit threads provide an alternative description of holographic entanglement, replacing the Ryu-Takayanagi minimal surface with bulk curves connecting pairs of boundary points. We use bit threads to prove the monogamy of mutual information (MMI) property of holographic entanglement entropies. This is accomplished using the concept of a so-called multicommodity flow, adapted from the network setting, and tools from the theory of convex optimization. Based on the bit thread picture, we conjecture a general ansatz for a holographic state, involving only bipartite and perfect-tensor type entanglement, for any decomposition of the boundary into four regions. We also give new proofs of analogous theorems on networks.
△ Less
Submitted 28 June, 2019; v1 submitted 15 August, 2018;
originally announced August 2018.
-
Learning the Alpha-bits of Black Holes
Authors:
Patrick Hayden,
Geoffrey Penington
Abstract:
When the bulk geometry in AdS/CFT contains a black hole, the boundary reconstruction of a given bulk operator will often necessarily depend on the choice of black hole microstate, an example of state dependence. As a result, whether a given bulk operator can be reconstructed on the boundary at all can depend on whether the black hole is described by a pure state or thermal ensemble. We refine this…
▽ More
When the bulk geometry in AdS/CFT contains a black hole, the boundary reconstruction of a given bulk operator will often necessarily depend on the choice of black hole microstate, an example of state dependence. As a result, whether a given bulk operator can be reconstructed on the boundary at all can depend on whether the black hole is described by a pure state or thermal ensemble. We refine this dichotomy, demonstrating that the same boundary operator can often be used for large subspaces of black hole microstates, corresponding to a constant fraction $α$ of the black hole entropy. In the Schrodinger picture, the boundary subregion encodes the $α$-bits (a concept from quantum information) of a bulk region containing the black hole and bounded by extremal surfaces. These results have important consequences for the structure of AdS/CFT and for quantum information. Firstly, they imply that the bulk reconstruction is necessarily only approximate and allow us to place non-perturbative lower bounds on the error when doing so. Second, they provide a simple and tractable limit in which the entanglement wedge is state-dependent, but in a highly controlled way. Although the state dependence of operators comes from ordinary quantum error correction, there are clear connections to the Papadodimas-Raju proposal for understanding operators behind black hole horizons. In tensor network toy models of AdS/CFT, we see how state dependence arises from the bulk operator being `pushed' through the black hole itself. Finally, we show that black holes provide the first `explicit' examples of capacity-achieving $α$-bit codes. Unintuitively, Hawking radiation always reveals the $α$-bits of a black hole as soon as possible. In an appendix, we apply a result from the quantum information literature to prove that entanglement wedge reconstruction can be made exact to all orders in $1/N$.
△ Less
Submitted 12 May, 2020; v1 submitted 16 July, 2018;
originally announced July 2018.
-
Localizing and excluding quantum information; or, how to share a quantum secret in spacetime
Authors:
Patrick Hayden,
Alex May
Abstract:
When can quantum information be localized to each of a collection of spacetime regions, while also excluded from another collection of regions? We answer this question by defining and analyzing the localize-exclude task, in which a quantum system must be localized to a collection of authorized regions while also being excluded from a set of unauthorized regions. This task is a spacetime analogue o…
▽ More
When can quantum information be localized to each of a collection of spacetime regions, while also excluded from another collection of regions? We answer this question by defining and analyzing the localize-exclude task, in which a quantum system must be localized to a collection of authorized regions while also being excluded from a set of unauthorized regions. This task is a spacetime analogue of quantum secret sharing, with authorized and unauthorized regions replacing authorized and unauthorized sets of parties. Our analysis yields the first quantum secret sharing scheme for arbitrary access structures for which the number of qubits required scales polynomially with the number of authorized sets. We also study a second related task called state-assembly, in which shares of a quantum system are requested at sets of spacetime points. We fully characterize the conditions under which both the localize-exclude and state-assembly tasks can be achieved, and give explicit protocols. Finally, we propose a cryptographic application of these tasks which we call party-independent transfer.
△ Less
Submitted 14 October, 2019; v1 submitted 11 June, 2018;
originally announced June 2018.
-
Error Correction of Quantum Reference Frame Information
Authors:
Patrick Hayden,
Sepehr Nezami,
Sandu Popescu,
Grant Salton
Abstract:
The existence of quantum error correcting codes is one of the most counterintuitive and potentially technologically important discoveries of quantum information theory. However, standard error correction refers to abstract quantum information, i.e., information that is independent of the physical incarnation of the systems used for storing the information. There are, however, other forms of inform…
▽ More
The existence of quantum error correcting codes is one of the most counterintuitive and potentially technologically important discoveries of quantum information theory. However, standard error correction refers to abstract quantum information, i.e., information that is independent of the physical incarnation of the systems used for storing the information. There are, however, other forms of information that are physical - one of the most ubiquitous being reference frame information. Here we analyze the problem of error correcting physical information. The basic question we seek to answer is whether or not such error correction is possible and, if so, what limitations govern the process. The main challenge is that the systems used for transmitting physical information, in addition to any actions applied to them, must necessarily obey these limitations. Encoding and decoding operations that obey a restrictive set of limitations need not exist a priori. We focus on the case of erasure errors, and we first show that the problem is equivalent to quantum error correction using group-covariant encodings. We prove a no-go theorem showing that that no finite dimensional, group-covariant quantum codes exist for Lie groups with an infinitesimal generator (e.g., U(1), SU(2), and SO(3)). We then explain how one can circumvent this no-go theorem using infinite dimensional codes, and we give an explicit example of a covariant quantum error correcting code using continuous variables for the group U(1). Finally, we demonstrate that all finite groups have finite dimensional codes, giving both an explicit construction and a randomized approximate construction with exponentially better parameters.
△ Less
Submitted 13 September, 2017;
originally announced September 2017.
-
Approximate Quantum Error Correction Revisited: Introducing the Alpha-bit
Authors:
Patrick Hayden,
Geoffrey Penington
Abstract:
We establish that, in an appropriate limit, qubits of communication should be regarded as composite resources, decomposing cleanly into independent correlation and transmission components. Because qubits of communication can establish ebits of entanglement, qubits are more powerful resources than ebits. We identify a new communications resource, the zero-bit, which is precisely half the gap betwee…
▽ More
We establish that, in an appropriate limit, qubits of communication should be regarded as composite resources, decomposing cleanly into independent correlation and transmission components. Because qubits of communication can establish ebits of entanglement, qubits are more powerful resources than ebits. We identify a new communications resource, the zero-bit, which is precisely half the gap between them, replacing classical bits by zero-bits makes teleportation asymptotically reversible. The decomposition of a qubit into an ebit and two zero-bits has wide-ranging consequences including applications to state merging, the quantum channel capacity, entanglement distillation, quantum identification and remote state preparation. The source of these results is the theory of approximate quantum error correction. The action of a quantum channel is reversible if and only if no information is leaked to the environment, a characterization that is useful even in approximate form. However, different notions of approximation lead to qualitatively different forms of quantum error correction in the limit of large dimension. We study the effect of a constraint on the dimension of the reference system when considering information leakage. While the resulting condition fails to ensure that the entire input can be corrected, it does ensure that all subspaces of dimension matching that of the reference are correctable. The size of the reference can be characterized by a parameter $α$, we call the associated resource an $α$-bit. Changing $α$ interpolates between standard quantum error correction and quantum identification, a form of equality testing for quantum states. We develop the theory of $α$-bits, including the applications above, and determine the $α$-bit capacity of general quantum channels, finding single-letter formulas for the entanglement-assisted and amortised variants.
△ Less
Submitted 13 January, 2018; v1 submitted 28 June, 2017;
originally announced June 2017.
-
Entanglement Wedge Reconstruction via Universal Recovery Channels
Authors:
Jordan Cotler,
Patrick Hayden,
Geoffrey Penington,
Grant Salton,
Brian Swingle,
Michael Walter
Abstract:
We apply and extend the theory of universal recovery channels from quantum information theory to address the problem of entanglement wedge reconstruction in AdS/CFT. It has recently been proposed that any low-energy local bulk operators in a CFT boundary region's entanglement wedge can be reconstructed on that boundary region itself. Existing work arguing for this proposal relies on algebraic cons…
▽ More
We apply and extend the theory of universal recovery channels from quantum information theory to address the problem of entanglement wedge reconstruction in AdS/CFT. It has recently been proposed that any low-energy local bulk operators in a CFT boundary region's entanglement wedge can be reconstructed on that boundary region itself. Existing work arguing for this proposal relies on algebraic consequences of the exact equivalence between bulk and boundary relative entropies, namely the theory of operator algebra quantum error correction. However, bulk and boundary relative entropies are only approximately equal in bulk effective field theory, and in similar situations it is known that predictions from exact entropic equalities can be qualitatively incorrect. The framework of universal recovery channels provides a robust demonstration of the entanglement wedge reconstruction conjecture in addition to new physical insights. Most notably, we find that a bulk operator acting in a given boundary region's entanglement wedge can be expressed as the response of the boundary region's modular Hamiltonian to a perturbation of the bulk state in the direction of the bulk operator. This formula can be interpreted as a noncommutative version of Bayes' rule that attempts to undo the noise induced by restricting to only a portion of the boundary, and has an integral representation in terms of modular flows. To reach these conclusions, we extend the theory of universal recovery channels to finite-dimensional operator algebras and demonstrate that recovery channels approximately preserve the multiplicative structure of the operator algebra.
△ Less
Submitted 4 September, 2018; v1 submitted 19 April, 2017;
originally announced April 2017.
-
The Universal Composable Security of Quantum Message Authentication with Key Recyling
Authors:
Patrick Hayden,
Debbie W. Leung,
Dominic Mayers
Abstract:
Barnum, Crepeau, Gottesman, Tapp, and Smith (quant-ph/0205128) proposed methods for authentication of quantum messages. The first method is an interactive protocol (TQA') based on teleportation. The second method is a noninteractive protocol (QA) in which the sender first encrypts the message using a protocol QEnc and then encodes the quantum ciphertext with an error correcting code chosen secretl…
▽ More
Barnum, Crepeau, Gottesman, Tapp, and Smith (quant-ph/0205128) proposed methods for authentication of quantum messages. The first method is an interactive protocol (TQA') based on teleportation. The second method is a noninteractive protocol (QA) in which the sender first encrypts the message using a protocol QEnc and then encodes the quantum ciphertext with an error correcting code chosen secretly from a set (a purity test code (PTC)). Encryption was shown to be necessary for authentication.
We augment the protocol QA with an extra step which recycles the entire encryption key provided QA accepts the message. We analyze the resulting integrated protocol for quantum authentication and key generation, which we call QA+KG. Our main result is a proof that QA+KG is universal composably (UC) secure in the Ben-Or-Mayers model (quant-ph/0409062). More specifically, this implies the UC-security of (a) QA, (b) recycling of the encryption key in QA, and (c) key-recycling of the encryption scheme QEnc by appending PTC. For an m-qubit message, encryption requires 2m bits of key; but PTC can be performed using only O(log m) + O(log e) bits of key for probability of failure e. Thus, we reduce the key required for both QA and QEnc, from linear to logarithmic net consumption, at the expense of one bit of back communication which can happen any time after the conclusion of QA and before reusing the key. UC-security of QA also extends security to settings not obvious from quant-ph/0205128.
Our security proof structure is inspired by and similar to that of quant-ph/0205128, reducing the security of QA to that of TQA'. In the process, we define UC-secure entanglement, and prove the UC-security of the entanglement generating protocol given in quant-ph/0205128, which could be of independent interest.
△ Less
Submitted 28 October, 2016;
originally announced October 2016.
-
Conditional Mutual Information of Bipartite Unitaries and Scrambling
Authors:
Dawei Ding,
Patrick Hayden,
Michael Walter
Abstract:
One way to diagnose chaos in bipartite unitary channels is via the tripartite information of the corresponding Choi state, which for certain choices of the subsystems reduces to the negative conditional mutual information (CMI). We study this quantity from a quantum information-theoretic perspective to clarify its role in diagnosing scrambling. When the CMI is zero, we find that the channel has a…
▽ More
One way to diagnose chaos in bipartite unitary channels is via the tripartite information of the corresponding Choi state, which for certain choices of the subsystems reduces to the negative conditional mutual information (CMI). We study this quantity from a quantum information-theoretic perspective to clarify its role in diagnosing scrambling. When the CMI is zero, we find that the channel has a special normal form consisting of local channels between individual inputs and outputs. However, we find that arbitrarily low CMI does not imply arbitrary proximity to a channel of this form, although it does imply a type of approximate recoverability of one of the inputs. When the CMI is maximal, we find that the residual channel from an individual input to an individual output is completely depolarizing when the other input is maximally mixed. However, we again find that this result is not robust. We also extend some of these results to the multipartite case and to the case of Haar-random pure input states. Finally, we look at the relationship between tripartite information and its Renyi-2 version which is directly related to out-of-time-order correlation functions. In particular, we demonstrate an arbitrarily large gap between the two quantities.
△ Less
Submitted 13 December, 2016; v1 submitted 16 August, 2016;
originally announced August 2016.
-
Measuring the scrambling of quantum information
Authors:
Brian Swingle,
Gregory Bentsen,
Monika Schleier-Smith,
Patrick Hayden
Abstract:
We provide a protocol to measure out-of-time-order correlation functions. These correlation functions are of theoretical interest for diagnosing the scrambling of quantum information in black holes and strongly interacting quantum systems generally. Measuring them requires an echo-type sequence in which the sign of a many-body Hamiltonian is reversed. We detail an implementation employing cold ato…
▽ More
We provide a protocol to measure out-of-time-order correlation functions. These correlation functions are of theoretical interest for diagnosing the scrambling of quantum information in black holes and strongly interacting quantum systems generally. Measuring them requires an echo-type sequence in which the sign of a many-body Hamiltonian is reversed. We detail an implementation employing cold atoms and cavity quantum electrodynamics to realize the chaotic kicked top model, and we analyze effects of dissipation to verify its feasibility with current technology. Finally, we propose in broad strokes a number of other experimental platforms where similar out-of-time-order correlation functions can be measured.
△ Less
Submitted 29 August, 2016; v1 submitted 19 February, 2016;
originally announced February 2016.
-
Spacetime replication of continuous variable quantum information
Authors:
Patrick Hayden,
Sepehr Nezami,
Grant Salton,
Barry C. Sanders
Abstract:
The theory of relativity requires that no information travel faster than light, whereas the unitarity of quantum mechanics ensures that quantum information cannot be cloned. These conditions provide the basic constraints that appear in information replication tasks, which formalize aspects of the behavior of information in relativistic quantum mechanics. In this article, we provide continuous vari…
▽ More
The theory of relativity requires that no information travel faster than light, whereas the unitarity of quantum mechanics ensures that quantum information cannot be cloned. These conditions provide the basic constraints that appear in information replication tasks, which formalize aspects of the behavior of information in relativistic quantum mechanics. In this article, we provide continuous variable (CV) strategies for spacetime quantum information replication that are directly amenable to optical or mechanical implementation. We use a new class of homologically-constructed CV quantum error correcting codes to provide efficient solutions for the general case of information replication. As compared to schemes encoding qubits, our CV solution requires half as many shares per encoded system. We also provide an optimized five-mode strategy for replicating quantum information in a particular configuration of four spacetime regions designed not to be reducible to previously performed experiments. For this optimized strategy, we provide detailed encoding and decoding procedures using standard optical apparatus and calculate the recovery fidelity when finite squeezing is used. As such we provide a scheme for experimentally realizing quantum information replication using quantum optics.
△ Less
Submitted 7 November, 2016; v1 submitted 11 January, 2016;
originally announced January 2016.
-
Holographic duality from random tensor networks
Authors:
Patrick Hayden,
Sepehr Nezami,
Xiao-Liang Qi,
Nathaniel Thomas,
Michael Walter,
Zhao Yang
Abstract:
Tensor networks provide a natural framework for exploring holographic duality because they obey entanglement area laws. They have been used to construct explicit toy models realizing many interesting structural features of the AdS/CFT correspondence, including the non-uniqueness of bulk operator reconstruction in the boundary theory. In this article, we explore the holographic properties of networ…
▽ More
Tensor networks provide a natural framework for exploring holographic duality because they obey entanglement area laws. They have been used to construct explicit toy models realizing many interesting structural features of the AdS/CFT correspondence, including the non-uniqueness of bulk operator reconstruction in the boundary theory. In this article, we explore the holographic properties of networks of random tensors. We find that our models naturally incorporate many features that are analogous to those of the AdS/CFT correspondence. When the bond dimension of the tensors is large, we show that the entanglement entropy of boundary regions, whether connected or not, obey the Ryu-Takayanagi entropy formula, a fact closely related to known properties of the multipartite entanglement of assistance. Moreover, we find that each boundary region faithfully encodes the physics of the entire bulk entanglement wedge. Our method is to interpret the average over random tensors as the partition function of a classical ferromagnetic Ising model, so that the minimal surfaces of Ryu-Takayanagi appear as domain walls. Upon including the analog of a bulk field, we find that our model reproduces the expected corrections to the Ryu-Takayanagi formula: the minimal surface is displaced and the entropy is augmented by the entanglement of the bulk field. Increasing the entanglement of the bulk field ultimately changes the minimal surface topologically in a way similar to creation of a black hole. Extrapolating bulk correlation functions to the boundary permits the calculation of the scaling dimensions of boundary operators, which exhibit a large gap between a small number of low-dimension operators and the rest. While we are primarily motivated by AdS/CFT duality, our main results define a more general form of bulk-boundary correspondence which could be useful for extending holography to other spacetimes.
△ Less
Submitted 17 October, 2016; v1 submitted 7 January, 2016;
originally announced January 2016.
-
Bidirectional holographic codes and sub-AdS locality
Authors:
Zhao Yang,
Patrick Hayden,
Xiao-Liang Qi
Abstract:
Tensor networks implementing quantum error correcting codes have recently been used to construct toy models of holographic duality explicitly realizing some of the more puzzling features of the AdS/CFT correspondence. These models reproduce the Ryu-Takayanagi entropy formula for boundary intervals, and allow bulk operators to be mapped to the boundary in a redundant fashion. These exactly solvable…
▽ More
Tensor networks implementing quantum error correcting codes have recently been used to construct toy models of holographic duality explicitly realizing some of the more puzzling features of the AdS/CFT correspondence. These models reproduce the Ryu-Takayanagi entropy formula for boundary intervals, and allow bulk operators to be mapped to the boundary in a redundant fashion. These exactly solvable, explicit models have provided valuable insight but nonetheless suffer from many deficiencies, some of which we attempt to address in this article. We propose a new class of tensor network models that subsume the earlier advances and, in addition, incorporate additional features of holographic duality, including: (1) a holographic interpretation of all boundary states, not just those in a "code" subspace, (2) a set of bulk states playing the role of "classical geometries" which reproduce the Ryu-Takayanagi formula for boundary intervals, (3) a bulk gauge symmetry analogous to diffeomorphism invariance in gravitational theories, (4) emergent bulk locality for sufficiently sparse excitations, and (5) the ability to describe geometry at sub-AdS resolutions or even flat space.
△ Less
Submitted 13 October, 2015;
originally announced October 2015.
-
Random and free positive maps with applications to entanglement detection
Authors:
Benoit Collins,
Patrick Hayden,
Ion Nechita
Abstract:
We apply random matrix and free probability techniques to the study of linear maps of interest in quantum information theory. Random quantum channels have already been widely investigated with spectacular success. Here, we are interested in more general maps, asking only for $k$-positivity instead of the complete positivity required of quantum channels. Unlike the theory of completely positive map…
▽ More
We apply random matrix and free probability techniques to the study of linear maps of interest in quantum information theory. Random quantum channels have already been widely investigated with spectacular success. Here, we are interested in more general maps, asking only for $k$-positivity instead of the complete positivity required of quantum channels. Unlike the theory of completely positive maps, the theory of $k$-positive maps is far from being completely understood, and our techniques give many new parametrized families of such maps. We also establish a conceptual link with free probability theory, and show that our constructions can be obtained to some extent without random techniques in the setup of free products of von Neumann algebras. Finally, we study the properties of our examples and show that for some parameters, they are indecomposable. In particular, they can be used to detect the presence of entanglement missed by the partial transposition test, that is, PPT entanglement. As an application, we considerably refine our understanding of PPT states in the case where one of the spaces is large whereas the other one remains small.
△ Less
Submitted 29 May, 2015;
originally announced May 2015.
-
The Information Theoretic Interpretation of the Length of a Curve
Authors:
Bartlomiej Czech,
Patrick Hayden,
Nima Lashkari,
Brian Swingle
Abstract:
In the context of holographic duality with AdS3 asymptotics, the Ryu-Takayanagi formula states that the entanglement entropy of a subregion is given by the length of a certain bulk geodesic. The entanglement entropy can be operationalized as the entanglement cost necessary to transmit the state of the subregion from one party to another while preserving all correlations with a reference party. The…
▽ More
In the context of holographic duality with AdS3 asymptotics, the Ryu-Takayanagi formula states that the entanglement entropy of a subregion is given by the length of a certain bulk geodesic. The entanglement entropy can be operationalized as the entanglement cost necessary to transmit the state of the subregion from one party to another while preserving all correlations with a reference party. The question then arises as to whether the lengths of other bulk curves can be interpreted as entanglement costs for some other information theoretic tasks. Building on recent results showing that the length of more general bulk curves is computed by the differential entropy, we introduce a new task called constrained state merging, whereby the state of the boundary subregion must be transmitted using operations restricted in location and scale in a way determined by the geometry of the bulk curve. Our main result is that the cost to transmit the state of a subregion under the conditions of constrained state merging is given by the differential entropy and hence the signed length of the corresponding bulk curve. When the cost is negative, constrained state merging distills entanglement rather than consuming it. This demonstration has two parts: first, we exhibit a protocol whose cost is the length of the curve and second, we prove that this protocol is optimal in that it uses the minimum amount of entanglement. In order to complete the proof, we additionally demonstrate that single-shot smooth conditional entropies for intervals in 1+1-dimensional conformal field theories with large central charge are well approximated by their von Neumann counterparts. We also revisit the relationship between the differential entropy and the maximum entropy among locally consistent density operators, demonstrating large quantitative discrepancy between the two quantities in conformal field theories.
△ Less
Submitted 6 October, 2014;
originally announced October 2014.
-
Universal Quantum Computation by Scattering in the Fermi-Hubbard Model
Authors:
Ning Bao,
Patrick Hayden,
Grant Salton,
Nathaniel Thomas
Abstract:
The Hubbard model may be the simplest model of particles interacting on a lattice, but simulation of its dynamics remains beyond the reach of current numerical methods. In this article, we show that general quantum computations can be encoded into the physics of wave packets propagating through a planar graph, with scattering interactions governed by the fermionic Hubbard model. Therefore, simulat…
▽ More
The Hubbard model may be the simplest model of particles interacting on a lattice, but simulation of its dynamics remains beyond the reach of current numerical methods. In this article, we show that general quantum computations can be encoded into the physics of wave packets propagating through a planar graph, with scattering interactions governed by the fermionic Hubbard model. Therefore, simulating the model on planar graphs is as hard as simulating quantum computation. We give two different arguments, demonstrating that the simulation is difficult both for wave packets prepared as excitations of the fermionic vacuum, and for hole wave packets at filling fraction one-half in the limit of strong coupling. In the latter case, which is described by the t-J model, there is only reflection and no transmission in the scattering events, as would be the case for classical hard spheres. In that sense, the construction provides a quantum mechanical analog of the Fredkin-Toffoli billiard ball computer.
△ Less
Submitted 14 September, 2014; v1 submitted 11 September, 2014;
originally announced September 2014.
-
Multiboundary Wormholes and Holographic Entanglement
Authors:
Vijay Balasubramanian,
Patrick Hayden,
Alexander Maloney,
Donald Marolf,
Simon F. Ross
Abstract:
The AdS/CFT correspondence relates quantum entanglement between boundary Conformal Field Theories and geometric connections in the dual asymptotically Anti-de Sitter space-time. We consider entangled states in the n-fold tensor product of a 1+1 dimensional CFT Hilbert space defined by the Euclidean path integral over a Riemann surface with n holes. In one region of moduli space, the dual bulk stat…
▽ More
The AdS/CFT correspondence relates quantum entanglement between boundary Conformal Field Theories and geometric connections in the dual asymptotically Anti-de Sitter space-time. We consider entangled states in the n-fold tensor product of a 1+1 dimensional CFT Hilbert space defined by the Euclidean path integral over a Riemann surface with n holes. In one region of moduli space, the dual bulk state is a black hole with n asymptotically AdS_3 regions connected by a common wormhole, while in other regions the bulk fragments into disconnected components. We study the entanglement structure and compute the wave function explicitly in the puncture limit of the Riemann surface in terms of CFT n-point functions. We also use AdS minimal surfaces to measure entanglement more generally. In some regions of the moduli space the entanglement is entirely multipartite, though not of the GHZ type. However, even when the bulk is completely connected, in some regions of the moduli space the entanglement is almost entirely bipartite: significant entanglement occurs only between pairs of CFTs. We develop new tools to analyze intrinsically n-partite entanglement, and use these to show that for some wormholes with n similar sized horizons there is intrinsic entanglement between at least n-1 parties, and that the distillable entanglement between the asymptotic regions is at least (n+1)/2 partite.
△ Less
Submitted 23 June, 2014; v1 submitted 10 June, 2014;
originally announced June 2014.
-
Quantum interactive proofs and the complexity of separability testing
Authors:
Gus Gutoski,
Patrick Hayden,
Kevin Milner,
Mark M. Wilde
Abstract:
We identify a formal connection between physical problems related to the detection of separable (unentangled) quantum states and complexity classes in theoretical computer science. In particular, we show that to nearly every quantum interactive proof complexity class (including BQP, QMA, QMA(2), and QSZK), there corresponds a natural separability testing problem that is complete for that class. Of…
▽ More
We identify a formal connection between physical problems related to the detection of separable (unentangled) quantum states and complexity classes in theoretical computer science. In particular, we show that to nearly every quantum interactive proof complexity class (including BQP, QMA, QMA(2), and QSZK), there corresponds a natural separability testing problem that is complete for that class. Of particular interest is the fact that the problem of determining whether an isometry can be made to produce a separable state is either QMA-complete or QMA(2)-complete, depending upon whether the distance between quantum states is measured by the one-way LOCC norm or the trace norm. We obtain strong hardness results by proving that for each n-qubit maximally entangled state there exists a fixed one-way LOCC measurement that distinguishes it from any separable state with error probability that decays exponentially in n.
△ Less
Submitted 30 September, 2014; v1 submitted 27 August, 2013;
originally announced August 2013.
-
Quantum enigma machines and the locking capacity of a quantum channel
Authors:
Saikat Guha,
Patrick Hayden,
Hari Krovi,
Seth Lloyd,
Cosmo Lupo,
Jeffrey H. Shapiro,
Masahiro Takeoka,
Mark M. Wilde
Abstract:
The locking effect is a phenomenon which is unique to quantum information theory and represents one of the strongest separations between the classical and quantum theories of information. The Fawzi-Hayden-Sen (FHS) locking protocol harnesses this effect in a cryptographic context, whereby one party can encode n bits into n qubits while using only a constant-size secret key. The encoded message is…
▽ More
The locking effect is a phenomenon which is unique to quantum information theory and represents one of the strongest separations between the classical and quantum theories of information. The Fawzi-Hayden-Sen (FHS) locking protocol harnesses this effect in a cryptographic context, whereby one party can encode n bits into n qubits while using only a constant-size secret key. The encoded message is then secure against any measurement that an eavesdropper could perform in an attempt to recover the message, but the protocol does not necessarily meet the composability requirements needed in quantum key distribution applications. In any case, the locking effect represents an extreme violation of Shannon's classical theorem, which states that information-theoretic security holds in the classical case if and only if the secret key is the same size as the message. Given this intriguing phenomenon, it is of practical interest to study the effect in the presence of noise, which can occur in the systems of both the legitimate receiver and the eavesdropper. This paper formally defines the locking capacity of a quantum channel as the maximum amount of locked information that can be reliably transmitted to a legitimate receiver by exploiting many independent uses of a quantum channel and an amount of secret key sublinear in the number of channel uses. We provide general operational bounds on the locking capacity in terms of other well-known capacities from quantum Shannon theory. We also study the important case of bosonic channels, finding limitations on these channels' locking capacity when coherent-state encodings are employed and particular locking protocols for these channels that might be physically implementable.
△ Less
Submitted 9 November, 2013; v1 submitted 19 July, 2013;
originally announced July 2013.
-
Towards efficient decoding of classical-quantum polar codes
Authors:
Mark M. Wilde,
Olivier Landon-Cardinal,
Patrick Hayden
Abstract:
Known strategies for sending bits at the capacity rate over a general channel with classical input and quantum output (a cq channel) require the decoder to implement impractically complicated collective measurements. Here, we show that a fully collective strategy is not necessary in order to recover all of the information bits. In fact, when coding for a large number N uses of a cq channel W, N I(…
▽ More
Known strategies for sending bits at the capacity rate over a general channel with classical input and quantum output (a cq channel) require the decoder to implement impractically complicated collective measurements. Here, we show that a fully collective strategy is not necessary in order to recover all of the information bits. In fact, when coding for a large number N uses of a cq channel W, N I(W_acc) of the bits can be recovered by a non-collective strategy which amounts to coherent quantum processing of the results of product measurements, where I(W_acc) is the accessible information of the channel W. In order to decode the other N (I(W) - I(W_acc)) bits, where I(W) is the Holevo rate, our conclusion is that the receiver should employ collective measurements. We also present two other results: 1) collective Fuchs-Caves measurements (quantum likelihood ratio measurements) can be used at the receiver to achieve the Holevo rate and 2) we give an explicit form of the Helstrom measurements used in small-size polar codes. The main approach used to demonstrate these results is a quantum extension of Arikan's polar codes.
△ Less
Submitted 2 February, 2013;
originally announced February 2013.
-
Quantum Computation vs. Firewalls
Authors:
Daniel Harlow,
Patrick Hayden
Abstract:
In this paper we discuss quantum computational restrictions on the types of thought experiments recently used by Almheiri, Marolf, Polchinski, and Sully to argue against the smoothness of black hole horizons. We argue that the quantum computations required to do these experiments take a time which is exponential in the entropy of the black hole under study, and we show that for a wide variety of b…
▽ More
In this paper we discuss quantum computational restrictions on the types of thought experiments recently used by Almheiri, Marolf, Polchinski, and Sully to argue against the smoothness of black hole horizons. We argue that the quantum computations required to do these experiments take a time which is exponential in the entropy of the black hole under study, and we show that for a wide variety of black holes this prevents the experiments from being done. We interpret our results as motivating a broader type of non-locality than is usually considered in the context of black hole thought experiments, and claim that once this type of non-locality is allowed there may be no need for firewalls. Our results do not threaten the unitarity of of black hole evaporation or the ability of advanced civilizations to test it.
△ Less
Submitted 6 April, 2013; v1 submitted 18 January, 2013;
originally announced January 2013.
-
Two-message quantum interactive proofs and the quantum separability problem
Authors:
Patrick Hayden,
Kevin Milner,
Mark M. Wilde
Abstract:
Suppose that a polynomial-time mixed-state quantum circuit, described as a sequence of local unitary interactions followed by a partial trace, generates a quantum state shared between two parties. One might then wonder, does this quantum circuit produce a state that is separable or entangled? Here, we give evidence that it is computationally hard to decide the answer to this question, even if one…
▽ More
Suppose that a polynomial-time mixed-state quantum circuit, described as a sequence of local unitary interactions followed by a partial trace, generates a quantum state shared between two parties. One might then wonder, does this quantum circuit produce a state that is separable or entangled? Here, we give evidence that it is computationally hard to decide the answer to this question, even if one has access to the power of quantum computation. We begin by exhibiting a two-message quantum interactive proof system that can decide the answer to a promise version of the question. We then prove that the promise problem is hard for the class of promise problems with "quantum statistical zero knowledge" (QSZK) proof systems by demonstrating a polynomial-time Karp reduction from the QSZK-complete promise problem "quantum state distinguishability" to our quantum separability problem. By exploiting Knill's efficient encoding of a matrix description of a state into a description of a circuit to generate the state, we can show that our promise problem is NP-hard with respect to Cook reductions. Thus, the quantum separability problem (as phrased above) constitutes the first nontrivial promise problem decidable by a two-message quantum interactive proof system while being hard for both NP and QSZK. We also consider a variant of the problem, in which a given polynomial-time mixed-state quantum circuit accepts a quantum state as input, and the question is to decide if there is an input to this circuit which makes its output separable across some bipartite cut. We prove that this problem is a complete promise problem for the class QIP of problems decidable by quantum interactive proof systems. Finally, we show that a two-message quantum interactive proof system can also decide a multipartite generalization of the quantum separability problem.
△ Less
Submitted 6 September, 2013; v1 submitted 26 November, 2012;
originally announced November 2012.
-
Summoning Information in Spacetime, or Where and When Can a Qubit Be?
Authors:
Patrick Hayden,
Alex May
Abstract:
One of the most important properties of quantum information, and the one ultimately responsible for its cryptographic applications, is that it can't be copied. That statement, however, is not completely accurate. While the no-cloning theorem of quantum mechanics prevents quantum information from being copied in space, the reversibility of microscopic physics actually requires that the information…
▽ More
One of the most important properties of quantum information, and the one ultimately responsible for its cryptographic applications, is that it can't be copied. That statement, however, is not completely accurate. While the no-cloning theorem of quantum mechanics prevents quantum information from being copied in space, the reversibility of microscopic physics actually requires that the information be copied in time. In spacetime as a whole, therefore, quantum information is widely replicated but in a restricted fashion. We fully characterize which regions of spacetime can all hold the same quantum information. Because quantum information can be delocalized through quantum error correction and teleportation, it need not follow well-defined trajectories. Instead, replication of the information in any configuration of spacetime regions not leading to violations of causality or the no-cloning principle is allowed. To demonstrate this, we answer the operational question of exactly when the information can be summoned to a set of spacetime points, showing how to do so efficiently using a combination of teleportation and codeword-stabilized quantum codes. This provides a simple and complete description of where and when a qubit can be located in spacetime, revealing a remarkable variety of possibilities.
△ Less
Submitted 17 February, 2016; v1 submitted 2 October, 2012;
originally announced October 2012.
-
Information trade-offs for optical quantum communication
Authors:
Mark M. Wilde,
Patrick Hayden,
Saikat Guha
Abstract:
Recent work has precisely characterized the achievable trade-offs between three key information processing tasks---classical communication (generation or consumption), quantum communication (generation or consumption), and shared entanglement (distribution or consumption), measured in bits, qubits, and ebits per channel use, respectively. Slices and corner points of this three-dimensional region r…
▽ More
Recent work has precisely characterized the achievable trade-offs between three key information processing tasks---classical communication (generation or consumption), quantum communication (generation or consumption), and shared entanglement (distribution or consumption), measured in bits, qubits, and ebits per channel use, respectively. Slices and corner points of this three-dimensional region reduce to well-known protocols for quantum channels. A trade-off coding technique can attain any point in the region and can outperform time-sharing between the best-known protocols for accomplishing each information processing task by itself. Previously, the benefits of trade-off coding that had been found were too small to be of practical value (viz., for the dephasing and the universal cloning machine channels). In this letter, we demonstrate that the associated performance gains are in fact remarkably high for several physically relevant bosonic channels that model free-space / fiber-optic links, thermal-noise channels, and amplifiers. We show that significant performance gains from trade-off coding also apply when trading photon-number resources between transmitting public and private classical information simultaneously over secret-key-assisted bosonic channels.
△ Less
Submitted 21 June, 2012;
originally announced June 2012.
-
The information-theoretic costs of simulating quantum measurements
Authors:
Mark M. Wilde,
Patrick Hayden,
Francesco Buscemi,
Min-Hsiu Hsieh
Abstract:
Winter's measurement compression theorem stands as one of the most penetrating insights of quantum information theory (QIT). In addition to making an original and profound statement about measurement in quantum theory, it also underlies several other general protocols in QIT. In this paper, we provide a full review of Winter's measurement compression theorem, detailing the information processing t…
▽ More
Winter's measurement compression theorem stands as one of the most penetrating insights of quantum information theory (QIT). In addition to making an original and profound statement about measurement in quantum theory, it also underlies several other general protocols in QIT. In this paper, we provide a full review of Winter's measurement compression theorem, detailing the information processing task, giving examples for understanding it, reviewing Winter's achievability proof, and detailing a new approach to its single-letter converse theorem. We prove an extension of the theorem to the case in which the sender is not required to receive the outcomes of the simulated measurement. The total cost of common randomness and classical communication can be lower for such a "non-feedback" simulation, and we prove a single-letter converse theorem demonstrating optimality. We then review the Devetak-Winter theorem on classical data compression with quantum side information, providing new proofs of its achievability and converse parts. From there, we outline a new protocol that we call "measurement compression with quantum side information," announced previously by two of us in our work on triple trade-offs in quantum Shannon theory. This protocol has several applications, including its part in the "classically-assisted state redistribution" protocol, which is the most general protocol on the static side of the quantum information theory tree, and its role in reducing the classical communication cost in a task known as local purity distillation. We also outline a connection between measurement compression with quantum side information and recent work on entropic uncertainty relations in the presence of quantum memory. Finally, we prove a single-letter theorem characterizing measurement compression with quantum side information when the sender is not required to obtain the measurement outcome.
△ Less
Submitted 18 September, 2012; v1 submitted 19 June, 2012;
originally announced June 2012.
-
Towards the fast scrambling conjecture
Authors:
Nima Lashkari,
Douglas Stanford,
Matthew Hastings,
Tobias Osborne,
Patrick Hayden
Abstract:
Many proposed quantum mechanical models of black holes include highly nonlocal interactions. The time required for thermalization to occur in such models should reflect the relaxation times associated with classical black holes in general relativity. Moreover, the time required for a particularly strong form of thermalization to occur, sometimes known as scrambling, determines the time scale on wh…
▽ More
Many proposed quantum mechanical models of black holes include highly nonlocal interactions. The time required for thermalization to occur in such models should reflect the relaxation times associated with classical black holes in general relativity. Moreover, the time required for a particularly strong form of thermalization to occur, sometimes known as scrambling, determines the time scale on which black holes should start to release information. It has been conjectured that black holes scramble in a time logarithmic in their entropy, and that no system in nature can scramble faster. In this article, we address the conjecture from two directions. First, we exhibit two examples of systems that do indeed scramble in logarithmic time: Brownian quantum circuits and the antiferromagnetic Ising model on a sparse random graph. Unfortunately, both fail to be truly ideal fast scramblers for reasons we discuss. Second, we use Lieb-Robinson techniques to prove a logarithmic lower bound on the scrambling time of systems with finite norm terms in their Hamiltonian. The bound holds in spite of any nonlocal structure in the Hamiltonian, which might permit every degree of freedom to interact directly with every other one.
△ Less
Submitted 20 November, 2012; v1 submitted 28 November, 2011;
originally announced November 2011.
-
Holographic Mutual Information is Monogamous
Authors:
Patrick Hayden,
Matthew Headrick,
Alexander Maloney
Abstract:
We identify a special information-theoretic property of quantum field theories with holographic duals: the mutual informations among arbitrary disjoint spatial regions A,B,C obey the inequality I(A:BC) >= I(A:B)+I(A:C), provided entanglement entropies are given by the Ryu-Takayanagi formula. Inequalities of this type are known as monogamy relations and are characteristic of measures of quantum ent…
▽ More
We identify a special information-theoretic property of quantum field theories with holographic duals: the mutual informations among arbitrary disjoint spatial regions A,B,C obey the inequality I(A:BC) >= I(A:B)+I(A:C), provided entanglement entropies are given by the Ryu-Takayanagi formula. Inequalities of this type are known as monogamy relations and are characteristic of measures of quantum entanglement. This suggests that correlations in holographic theories arise primarily from entanglement rather than classical correlations. We also show that the Ryu-Takayanagi formula is consistent with all known general inequalities obeyed by the entanglement entropy, including an infinite set recently discovered by Cadney, Linden, and Winter; this constitutes strong evidence in favour of its validity.
△ Less
Submitted 2 February, 2013; v1 submitted 14 July, 2011;
originally announced July 2011.
-
Quantum trade-off coding for bosonic communication
Authors:
Mark M. Wilde,
Patrick Hayden,
Saikat Guha
Abstract:
The trade-off capacity region of a quantum channel characterizes the optimal net rates at which a sender can communicate classical, quantum, and entangled bits to a receiver by exploiting many independent uses of the channel, along with the help of the same resources. Similarly, one can consider a trade-off capacity region when the noiseless resources are public, private, and secret key bits. In […
▽ More
The trade-off capacity region of a quantum channel characterizes the optimal net rates at which a sender can communicate classical, quantum, and entangled bits to a receiver by exploiting many independent uses of the channel, along with the help of the same resources. Similarly, one can consider a trade-off capacity region when the noiseless resources are public, private, and secret key bits. In [Phys. Rev. Lett. 108, 140501 (2012)], we identified these trade-off rate regions for the pure-loss bosonic channel and proved that they are optimal provided that a longstanding minimum output entropy conjecture is true. Additionally, we showed that the performance gains of a trade-off coding strategy when compared to a time-sharing strategy can be quite significant. In the present paper, we provide detailed derivations of the results announced there, and we extend the application of these ideas to thermalizing and amplifying bosonic channels. We also derive a "rule of thumb" for trade-off coding, which determines how to allocate photons in a coding strategy if a large mean photon number is available at the channel input. Our results on the amplifying bosonic channel also apply to the "Unruh channel" considered in the context of relativistic quantum information theory.
△ Less
Submitted 21 November, 2012; v1 submitted 30 April, 2011;
originally announced May 2011.
-
Quantum interference channels
Authors:
Ivan Savov,
Omar Fawzi,
Mark M. Wilde,
Pranab Sen,
Patrick Hayden
Abstract:
The discrete memoryless interference channel is modelled as a conditional probability distribution with two outputs depending on two inputs and has widespread applications in practical communication scenarios. In this paper, we introduce and study the quantum interference channel, a generalization of a two-input, two-output memoryless channel to the setting of quantum Shannon theory. We discuss th…
▽ More
The discrete memoryless interference channel is modelled as a conditional probability distribution with two outputs depending on two inputs and has widespread applications in practical communication scenarios. In this paper, we introduce and study the quantum interference channel, a generalization of a two-input, two-output memoryless channel to the setting of quantum Shannon theory. We discuss three different coding strategies and obtain corresponding achievable rate regions for quantum interference channels. We calculate the capacity regions in the special cases of "very strong" and "strong" interference. The achievability proof in the case of "strong" interference exploits a novel quantum simultaneous decoder for two-sender quantum multiple access channels. We formulate a conjecture regarding the existence of a quantum simultaneous decoder in the three-sender case and use it to state the rates achievable by a quantum Han-Kobayashi strategy.
△ Less
Submitted 28 July, 2011; v1 submitted 14 February, 2011;
originally announced February 2011.
-
Classical communication over a quantum interference channel
Authors:
Omar Fawzi,
Patrick Hayden,
Ivan Savov,
Pranab Sen,
Mark M. Wilde
Abstract:
Calculating the capacity of interference channels is a notorious open problem in classical information theory. Such channels have two senders and two receivers, and each sender would like to communicate with a partner receiver. The capacity of such channels is known exactly in the settings of "very strong" and "strong" interference, while the Han-Kobayashi coding strategy gives the best known achi…
▽ More
Calculating the capacity of interference channels is a notorious open problem in classical information theory. Such channels have two senders and two receivers, and each sender would like to communicate with a partner receiver. The capacity of such channels is known exactly in the settings of "very strong" and "strong" interference, while the Han-Kobayashi coding strategy gives the best known achievable rate region in the general case. Here, we introduce and study the quantum interference channel, a natural generalization of the interference channel to the setting of quantum information theory. We restrict ourselves for the most part to channels with two classical inputs and two quantum outputs in order to simplify the presentation of our results (though generalizations of our results to channels with quantum inputs are straightforward). We are able to determine the exact classical capacity of this channel in the settings of "very strong" and "strong" interference, by exploiting Winter's successive decoding strategy and a novel two-sender quantum simultaneous decoder, respectively. We provide a proof that a Han-Kobayashi strategy is achievable with Holevo information rates, up to a conjecture regarding the existence of a three-sender quantum simultaneous decoder. This conjecture holds for a special class of quantum multiple access channels with average output states that commute, and we discuss some other variations of the conjecture that hold. Finally, we detail a connection between the quantum interference channel and prior work on the capacity of bipartite unitary gates.
△ Less
Submitted 14 February, 2012; v1 submitted 13 February, 2011;
originally announced February 2011.
-
One-shot Multiparty State Merging
Authors:
Nicolas Dutil,
Patrick Hayden
Abstract:
We present a protocol for performing state merging when multiple parties share a single copy of a mixed state, and analyze the entanglement cost in terms of min- and max-entropies. Our protocol allows for interpolation between corner points of the rate region without the need for time-sharing, a primitive which is not available in the one-shot setting. We also compare our protocol to the more naiv…
▽ More
We present a protocol for performing state merging when multiple parties share a single copy of a mixed state, and analyze the entanglement cost in terms of min- and max-entropies. Our protocol allows for interpolation between corner points of the rate region without the need for time-sharing, a primitive which is not available in the one-shot setting. We also compare our protocol to the more naive strategy of repeatedly applying a single-party merging protocol one party at a time, by performing a detailed analysis of the rates required to merge variants of the embezzling states. Finally, we analyze a variation of multiparty merging, which we call split-transfer, by considering two receivers and many additional helpers sharing a mixed state. We give a protocol for performing a split-transfer and apply it to the problem of assisted entanglement distillation.
△ Less
Submitted 9 November, 2010;
originally announced November 2010.
-
Assisted Entanglement Distillation
Authors:
Nicolas Dutil,
Patrick Hayden
Abstract:
Motivated by the problem of designing quantum repeaters, we study entanglement distillation between two parties, Alice and Bob, starting from a mixed state and with the help of "repeater" stations. To treat the case of a single repeater, we extend the notion of entanglement of assistance to arbitrary mixed tripartite states and exhibit a protocol, based on a random coding strategy, for extracting…
▽ More
Motivated by the problem of designing quantum repeaters, we study entanglement distillation between two parties, Alice and Bob, starting from a mixed state and with the help of "repeater" stations. To treat the case of a single repeater, we extend the notion of entanglement of assistance to arbitrary mixed tripartite states and exhibit a protocol, based on a random coding strategy, for extracting pure entanglement. The rates achievable by this protocol formally resemble those achievable if the repeater station could merge its state to one of Alice and Bob even when such merging is impossible. This rate is provably better than the hashing bound for sufficiently pure tripartite states. We also compare our assisted distillation protocol to a hierarchical strategy consisting of entanglement distillation followed by entanglement swapping. We demonstrate by the use of a simple example that our random measurement strategy outperforms hierarchical distillation strategies when the individual helper stations' states fail to individually factorize into portions associated specifically with Alice and Bob. Finally, we use these results to find achievable rates for the more general scenario, where many spatially separated repeaters help two recipients distill entanglement.
△ Less
Submitted 11 April, 2011; v1 submitted 8 November, 2010;
originally announced November 2010.
-
Locking classical information
Authors:
Frédéric Dupuis,
Jan Florjanczyk,
Patrick Hayden,
Debbie Leung
Abstract:
It is known that the maximum classical mutual information that can be achieved between measurements on a pair of quantum systems can drastically underestimate the quantum mutual information between those systems. In this article, we quantify this distinction between classical and quantum information by demonstrating that after removing a logarithmic-sized quantum system from one half of a pair of…
▽ More
It is known that the maximum classical mutual information that can be achieved between measurements on a pair of quantum systems can drastically underestimate the quantum mutual information between those systems. In this article, we quantify this distinction between classical and quantum information by demonstrating that after removing a logarithmic-sized quantum system from one half of a pair of perfectly correlated bitstrings, even the most sensitive pair of measurements might only yield outcomes essentially independent of each other. This effect is a form of information locking but the definition we use is strictly stronger than those used previously. Moreover, we find that this property is generic, in the sense that it occurs when removing a random subsystem. As such, the effect might be relevant to statistical mechanics or black hole physics. Previous work on information locking had always assumed a uniform message. In this article, we assume only a min-entropy bound on the message and also explore the effect of entanglement. We find that classical information is strongly locked almost until it can be completely decoded. As a cryptographic application of these results, we exhibit a quantum key distribution protocol that is "secure" if the eavesdropper's information about the secret key is measured using the accessible information but in which leakage of even a logarithmic number of key bits compromises the secrecy of all the others.
△ Less
Submitted 7 November, 2010;
originally announced November 2010.