-
Tomography of clock signals using the simplest possible reference
Authors:
Nuriya Nurgalieva,
Ralph Silva,
Renato Renner
Abstract:
We show that finite physical clocks always have well-behaved signals, namely that every waiting-time distribution generated by a physical process on a system of finite size is guaranteed to be bounded by a decay envelope. Following this consideration, we show that one can reconstruct the distribution using only operationally available information, namely, that of the ordering of the ticks of one c…
▽ More
We show that finite physical clocks always have well-behaved signals, namely that every waiting-time distribution generated by a physical process on a system of finite size is guaranteed to be bounded by a decay envelope. Following this consideration, we show that one can reconstruct the distribution using only operationally available information, namely, that of the ordering of the ticks of one clock with the respect to those of another clock (which we call the reference), and that the simplest possible reference clock -- a Poisson process -- suffices.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Exploring the Local Landscape in the Triangle Network
Authors:
Elisa Bäumer,
Victor Gitton,
Tamás Kriváchy,
Nicolas Gisin,
Renato Renner
Abstract:
Characterizing the set of distributions that can be realized in the triangle network is a notoriously difficult problem. In this work, we investigate inner approximations of the set of local (classical) distributions of the triangle network. A quantum distribution that appears to be nonlocal is the Elegant Joint Measurement (EJM) [Entropy. 2019; 21(3):325], which motivates us to study distribution…
▽ More
Characterizing the set of distributions that can be realized in the triangle network is a notoriously difficult problem. In this work, we investigate inner approximations of the set of local (classical) distributions of the triangle network. A quantum distribution that appears to be nonlocal is the Elegant Joint Measurement (EJM) [Entropy. 2019; 21(3):325], which motivates us to study distributions having the same symmetries as the EJM. We compare analytical and neural-network-based inner approximations and find a remarkable agreement between the two methods. Using neural network tools, we also conjecture network Bell inequalities that give a trade-off between the levels of correlation and symmetry that a local distribution may feature. Our results considerably strengthen the conjecture that the EJM is nonlocal.
△ Less
Submitted 14 May, 2024;
originally announced May 2024.
-
Learning-to-learn enables rapid learning with phase-change memory-based in-memory computing
Authors:
Thomas Ortner,
Horst Petschenig,
Athanasios Vasilopoulos,
Roland Renner,
Špela Brglez,
Thomas Limbacher,
Enrique Piñero,
Alejandro Linares Barranco,
Angeliki Pantazi,
Robert Legenstein
Abstract:
There is a growing demand for low-power, autonomously learning artificial intelligence (AI) systems that can be applied at the edge and rapidly adapt to the specific situation at deployment site. However, current AI models struggle in such scenarios, often requiring extensive fine-tuning, computational resources, and data. In contrast, humans can effortlessly adjust to new tasks by transferring kn…
▽ More
There is a growing demand for low-power, autonomously learning artificial intelligence (AI) systems that can be applied at the edge and rapidly adapt to the specific situation at deployment site. However, current AI models struggle in such scenarios, often requiring extensive fine-tuning, computational resources, and data. In contrast, humans can effortlessly adjust to new tasks by transferring knowledge from related ones. The concept of learning-to-learn (L2L) mimics this process and enables AI models to rapidly adapt with only little computational effort and data. In-memory computing neuromorphic hardware (NMHW) is inspired by the brain's operating principles and mimics its physical co-location of memory and compute. In this work, we pair L2L with in-memory computing NMHW based on phase-change memory devices to build efficient AI models that can rapidly adapt to new tasks. We demonstrate the versatility of our approach in two scenarios: a convolutional neural network performing image classification and a biologically-inspired spiking neural network generating motor commands for a real robotic arm. Both models rapidly learn with few parameter updates. Deployed on the NMHW, they perform on-par with their software equivalents. Moreover, meta-training of these models can be performed in software with high-precision, alleviating the need for accurate hardware models.
△ Less
Submitted 22 April, 2024;
originally announced May 2024.
-
Commuting operations factorise
Authors:
Renato Renner,
Ramona Wolf
Abstract:
Consider two agents, Alice and Bob, each of whom takes a quantum input, operates on a shared quantum system $K$, and produces a quantum output. Alice and Bob's operations may commute, in the sense that the joint input-output behaviour is independent of the order in which they access $K$. Here we ask whether this commutation property implies that $K$ can be split into two factors on which Alice and…
▽ More
Consider two agents, Alice and Bob, each of whom takes a quantum input, operates on a shared quantum system $K$, and produces a quantum output. Alice and Bob's operations may commute, in the sense that the joint input-output behaviour is independent of the order in which they access $K$. Here we ask whether this commutation property implies that $K$ can be split into two factors on which Alice and Bob act separately. The question can be regarded as a "fully quantum" generalisation of a problem posed by Tsirelson, who considered the case where Alice and Bob's inputs and outputs are classical. In this case, the answer is negative in general, but it is known that a factorisation exists in finite dimensions. Here we show the same holds in the fully quantum case, i.e., commuting operations factorise, provided that all input systems are finite-dimensional.
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
The debate over QKD: A rebuttal to the NSA's objections
Authors:
Renato Renner,
Ramona Wolf
Abstract:
A recent publication by the NSA assessing the usability of quantum cryptography has generated significant attention, concluding that this technology is not recommended for use. Here, we reply to this criticism and argue that some of the points raised are unjustified, whereas others are problematic now but can be expected to be resolved in the foreseeable future.
A recent publication by the NSA assessing the usability of quantum cryptography has generated significant attention, concluding that this technology is not recommended for use. Here, we reply to this criticism and argue that some of the points raised are unjustified, whereas others are problematic now but can be expected to be resolved in the foreseeable future.
△ Less
Submitted 27 July, 2023;
originally announced July 2023.
-
Energy requirement for implementing unitary gates on energy-unbounded systems
Authors:
Yuxiang Yang,
Renato Renner,
Giulio Chiribella
Abstract:
The processing of quantum information always has a cost in terms of physical resources such as energy or time. Determining the resource requirements is not only an indispensable step in the design of practical devices - the resources need to be actually provided - but may also yield fundamental constraints on the class of processes that are physically possible. Here we study how much energy is req…
▽ More
The processing of quantum information always has a cost in terms of physical resources such as energy or time. Determining the resource requirements is not only an indispensable step in the design of practical devices - the resources need to be actually provided - but may also yield fundamental constraints on the class of processes that are physically possible. Here we study how much energy is required to implement a desired unitary gate on a quantum system with a non-trivial energy spectrum. We derive a general lower bound on the energy requirement, extending the main result of Ref. [1] from finite dimensional systems to systems with unbounded Hamiltonians. Such an extension has immediate applications in quantum information processing with optical systems, and allows us to provide bounds on the energy requirement of continuous variable quantum gates, such as displacement and squeezing gates.
△ Less
Submitted 22 December, 2022;
originally announced December 2022.
-
Thought experiments in a quantum computer
Authors:
Nuriya Nurgalieva,
Simon Mathis,
Lídia del Rio,
Renato Renner
Abstract:
We introduce a software package that allows users to design and run simulations of thought experiments in quantum theory. In particular, it covers cases where several reasoning agents are modelled as quantum systems, such as Wigner's friend experiment. Users can customize the protocol of the experiment, the inner workings of agents (including a quantum circuit that models their reasoning process),…
▽ More
We introduce a software package that allows users to design and run simulations of thought experiments in quantum theory. In particular, it covers cases where several reasoning agents are modelled as quantum systems, such as Wigner's friend experiment. Users can customize the protocol of the experiment, the inner workings of agents (including a quantum circuit that models their reasoning process), the abstract logical system used (which may or not allow agents to combine premises and make inferences about each other's reasoning), and the interpretation of quantum theory used by different agents. Our open-source software is written in a quantum programming language, ProjectQ, and runs on classical or quantum hardware. As an example, we model the Frauchiger-Renner extended Wigner's friend thought experiment, where agents are allowed to measure each other's physical memories, and make inferences about each other's reasoning.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Quantum Advantage in Cryptography
Authors:
Renato Renner,
Ramona Wolf
Abstract:
Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle? At first sight, it looks as if it just lifts the competition between cryp…
▽ More
Ever since its inception, cryptography has been caught in a vicious circle: Cryptographers keep inventing methods to hide information, and cryptanalysts break them, prompting cryptographers to invent even more sophisticated encryption schemes, and so on. But could it be that quantum information technology breaks this circle? At first sight, it looks as if it just lifts the competition between cryptographers and cryptanalysts to the next level. Indeed, quantum computers will render most of today's public key cryptosystems insecure. Nonetheless, there are good reasons to believe that cryptographers will ultimately prevail over cryptanalysts. Quantum cryptography allows us to build communication schemes whose secrecy relies only on the laws of physics and some minimum assumptions about the cryptographic hardware - leaving basically no room for an attack. While we are not yet there, this article provides an overview of the principles and state of the art of quantum cryptography, as well as an assessment of current challenges and prospects for overcoming them.
△ Less
Submitted 11 January, 2023; v1 submitted 8 June, 2022;
originally announced June 2022.
-
Embedding cyclic causal structures in acyclic space-times: no-go results for indefinite causality
Authors:
V. Vilasini,
Renato Renner
Abstract:
Causality can be defined in terms of space-time or based on information-theoretic structures, which correspond to very different notions of causation. Yet, in physical experiments, these notions play together in a compatible manner. The process matrix framework is useful for modelling indefinite causal structures (ICS) in an information-theoretic sense, but there remain important open questions re…
▽ More
Causality can be defined in terms of space-time or based on information-theoretic structures, which correspond to very different notions of causation. Yet, in physical experiments, these notions play together in a compatible manner. The process matrix framework is useful for modelling indefinite causal structures (ICS) in an information-theoretic sense, but there remain important open questions regarding the physicality of such processes. In particular, there are several experiments that claim to implement ICS processes in Minkowski space-time, which presents an apparent theoretical paradox: how can an indefinite information-theoretic causal structure be compatible with a definite space-time structure? To address this, we develop a general framework that disentangles the two causality notions and formalises their relations. The framework describes a composition of quantum operations through feedback loops, and the embedding of the resulting (possibly cyclic) information-theoretic structure in an acyclic space-time structure. Relativistic causality is formalised as an operational compatibility condition between the two structures. Reformulating the process matrix framework here, we establish no-go results which imply that it is impossible to physically realise ICS in a fixed space-time with space-time localised quantum systems. Further, we prove that physical realisations of any ICS process, even those involving space-time non-localised systems, will ultimately admit an explanation in terms of a definite (and acyclic) causal order process, at a more fine-grained level. These results fully resolve the apparent paradox and we discuss their implications for the interpretation of the above-mentioned experiments. Moreover, our work offers concrete insights on the operational meaning of indefinite causality, both within and beyond the context of a fixed space-time.
△ Less
Submitted 27 December, 2023; v1 submitted 21 March, 2022;
originally announced March 2022.
-
The nonequilibrium cost of accurate information processing
Authors:
Giulio Chiribella,
Fei Meng,
Renato Renner,
Man-Hong Yung
Abstract:
Accurate information processing is crucial both in technology and in nature. To achieve it, any information processing system needs an initial supply of resources away from thermal equilibrium. Here we establish a fundamental limit on the accuracy achievable with a given amount of nonequilibrium resources. The limit applies to arbitrary information processing tasks and arbitrary information proces…
▽ More
Accurate information processing is crucial both in technology and in nature. To achieve it, any information processing system needs an initial supply of resources away from thermal equilibrium. Here we establish a fundamental limit on the accuracy achievable with a given amount of nonequilibrium resources. The limit applies to arbitrary information processing tasks and arbitrary information processing systems subject to the laws of quantum mechanics. It is easily computable and is expressed in terms of an entropic quantity, which we name reverse entropy, associated to a time reversal of the information processing task under consideration. The limit is achievable for all deterministic classical computations and for all their quantum extensions. As an application, we establish the optimal tradeoff between nonequilibrium and accuracy for the fundamental tasks of storing, transmitting, cloning, and erasing information. Our results set a target for the design of new devices approaching the ultimate efficiency limit, and provide a framework for demonstrating thermodynamical advantages of quantum devices over their classical counterparts.
△ Less
Submitted 21 September, 2022; v1 submitted 17 March, 2022;
originally announced March 2022.
-
Security of quantum key distribution from generalised entropy accumulation
Authors:
Tony Metger,
Renato Renner
Abstract:
The goal of quantum key distribution (QKD) is to establish a secure key between two parties connected by an insecure quantum channel. To use a QKD protocol in practice, one has to prove that a finite size key is secure against general attacks: no matter the adversary's attack, they cannot gain useful information about the key. A much simpler task is to prove security against collective attacks, wh…
▽ More
The goal of quantum key distribution (QKD) is to establish a secure key between two parties connected by an insecure quantum channel. To use a QKD protocol in practice, one has to prove that a finite size key is secure against general attacks: no matter the adversary's attack, they cannot gain useful information about the key. A much simpler task is to prove security against collective attacks, where the adversary is assumed to behave identically and independently in each round. In this work, we provide a formal framework for general QKD protocols and show that for any protocol that can be expressed in this framework, security against general attacks reduces to security against collective attacks, which in turn reduces to a numerical computation. Our proof relies on a recently developed information-theoretic tool called generalised entropy accumulation and can handle generic prepare-and-measure protocols directly without switching to an entanglement-based version.
△ Less
Submitted 17 November, 2023; v1 submitted 9 March, 2022;
originally announced March 2022.
-
Generalised entropy accumulation
Authors:
Tony Metger,
Omar Fawzi,
David Sutter,
Renato Renner
Abstract:
Consider a sequential process in which each step outputs a system $A_i$ and updates a side information register $E$. We prove that if this process satisfies a natural "non-signalling" condition between past outputs and future side information, the min-entropy of the outputs $A_1, \dots, A_n$ conditioned on the side information $E$ at the end of the process can be bounded from below by a sum of von…
▽ More
Consider a sequential process in which each step outputs a system $A_i$ and updates a side information register $E$. We prove that if this process satisfies a natural "non-signalling" condition between past outputs and future side information, the min-entropy of the outputs $A_1, \dots, A_n$ conditioned on the side information $E$ at the end of the process can be bounded from below by a sum of von Neumann entropies associated with the individual steps. This is a generalisation of the entropy accumulation theorem (EAT), which deals with a more restrictive model of side information: there, past side information cannot be updated in subsequent rounds, and newly generated side information has to satisfy a Markov condition. Due to its more general model of side-information, our generalised EAT can be applied more easily and to a broader range of cryptographic protocols. As examples, we give the first multi-round security proof for blind randomness expansion and a simplified analysis of the E91 QKD protocol. The proof of our generalised EAT relies on a new variant of Uhlmann's theorem and new chain rules for the Renyi divergence and entropy, which might be of independent interest.
△ Less
Submitted 28 October, 2022; v1 submitted 9 March, 2022;
originally announced March 2022.
-
The black hole information puzzle and the quantum de Finetti theorem
Authors:
Renato Renner,
**zhao Wang
Abstract:
The black hole information puzzle arises from a discrepancy between conclusions drawn from general relativity and quantum theory about the nature of the radiation emitted by a black hole. According to Hawking's original argument, the radiation is thermal and its entropy thus increases monotonically as the black hole evaporates. Conversely, due to the reversibility of time evolution according to qu…
▽ More
The black hole information puzzle arises from a discrepancy between conclusions drawn from general relativity and quantum theory about the nature of the radiation emitted by a black hole. According to Hawking's original argument, the radiation is thermal and its entropy thus increases monotonically as the black hole evaporates. Conversely, due to the reversibility of time evolution according to quantum theory, the radiation entropy should start to decrease after a certain time, as predicted by the Page curve. This decrease has been confirmed by new calculations based on the replica trick, which also exhibit its geometrical origin: spacetime wormholes that form between the replicas. Here we analyse the discrepancy between these and Hawking's original conclusions from a quantum information theory viewpoint, using in particular the quantum de Finetti theorem. The theorem implies the existence of extra information, $W$, which is neither part of the black hole nor the radiation, but plays the role of a reference. The entropy obtained via the replica trick can then be identified to be the entropy $S(R|W)$ of the radiation conditioned on the reference $W$, whereas Hawking's original result corresponds to the non-conditional entropy $S(R)$. The entropy $S(R|W)$, which mathematically is an ensemble average, gains an operational meaning in an experiment with $N$ independently prepared black holes: For large $N$, it equals the normalised entropy of their joint radiation, $S(R_1 \cdots R_N)/N$. The discrepancy between this entropy and $S(R)$ implies that the black holes are correlated. The replica wormholes may thus be interpreted as the geometrical representation of this correlation. Our results also suggest a many-black-hole extension of the widely used random unitary model, which we support with non-trivial checks.
△ Less
Submitted 22 December, 2021; v1 submitted 27 October, 2021;
originally announced October 2021.
-
Experimental quantum key distribution certified by Bell's theorem
Authors:
D. P. Nadlinger,
P. Drmota,
B. C. Nichol,
G. Araneda,
D. Main,
R. Srinivas,
D. M. Lucas,
C. J. Ballance,
K. Ivanov,
E. Y-Z. Tan,
P. Sekatski,
R. L. Urbanke,
R. Renner,
N. Sangouard,
J-D. Bancal
Abstract:
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorisation to provide security against eavesdrop** attacks. Remarkably, quantum key distribution protocols like the one proposed by Bennett and Brassard provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. H…
▽ More
Cryptographic key exchange protocols traditionally rely on computational conjectures such as the hardness of prime factorisation to provide security against eavesdrop** attacks. Remarkably, quantum key distribution protocols like the one proposed by Bennett and Brassard provide information-theoretic security against such attacks, a much stronger form of security unreachable by classical means. However, quantum protocols realised so far are subject to a new class of attacks exploiting implementation defects in the physical devices involved, as demonstrated in numerous ingenious experiments. Following the pioneering work of Ekert proposing the use of entanglement to bound an adversary's information from Bell's theorem, we present here the experimental realisation of a complete quantum key distribution protocol immune to these vulnerabilities. We achieve this by combining theoretical developments on finite-statistics analysis, error correction, and privacy amplification, with an event-ready scheme enabling the rapid generation of high-fidelity entanglement between two trapped-ion qubits connected by an optical fibre link. The secrecy of our key is guaranteed device-independently: it is based on the validity of quantum theory, and certified by measurement statistics observed during the experiment. Our result shows that provably secure cryptography with real-world devices is possible, and paves the way for further quantum information applications based on the device-independence principle.
△ Less
Submitted 5 September, 2023; v1 submitted 29 September, 2021;
originally announced September 2021.
-
Testing quantum theory with thought experiments
Authors:
Nuriya Nurgalieva,
Renato Renner
Abstract:
Quantum mechanics is one of our most successful physical theories; its predictions agree with experimental observations to an extremely high accuracy. However, the bare formalism of quantum theory does not provide straightforward answers to seemingly simple questions: for example, how should one model systems that include agents who are themselves using quantum theory? These foundational questions…
▽ More
Quantum mechanics is one of our most successful physical theories; its predictions agree with experimental observations to an extremely high accuracy. However, the bare formalism of quantum theory does not provide straightforward answers to seemingly simple questions: for example, how should one model systems that include agents who are themselves using quantum theory? These foundational questions may be investigated with a theorist's tool -- the thought experiment. Its purpose is to turn debates about the interpretation of quantum theory into actual physics questions. In this article, we give a state-of-the-art overview on quantum thought experiments involving observers, from the basic Wigner's friend to the recent Frauchiger-Renner setup, clarifying their interpretational significance and responding to objections and criticism on the way.
△ Less
Submitted 9 June, 2021;
originally announced June 2021.
-
Security in Quantum Cryptography
Authors:
Christopher Portmann,
Renato Renner
Abstract:
Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic requirement here is that the transmitted messages remain inaccessible to anyone other than the designated recipients, even if the communication channel…
▽ More
Quantum cryptography exploits principles of quantum physics for the secure processing of information. A prominent example is secure communication, i.e., the task of transmitting confidential messages from one location to another. The cryptographic requirement here is that the transmitted messages remain inaccessible to anyone other than the designated recipients, even if the communication channel is untrusted. In classical cryptography, this can usually only be guaranteed under computational hardness assumptions, e.g., that factoring large integers is infeasible. In contrast, the security of quantum cryptography relies entirely on the laws of quantum mechanics. Here we review this physical notion of security, focusing on quantum key distribution and secure communication.
△ Less
Submitted 30 August, 2021; v1 submitted 29 January, 2021;
originally announced February 2021.
-
Improved DIQKD protocols with finite-size analysis
Authors:
Ernest Y. -Z. Tan,
Pavel Sekatski,
Jean-Daniel Bancal,
René Schwonnek,
Renato Renner,
Nicolas Sangouard,
Charles C. -W. Lim
Abstract:
The security of finite-length keys is essential for the implementation of device-independent quantum key distribution (DIQKD). Presently, there are several finite-size DIQKD security proofs, but they are mostly focused on standard DIQKD protocols and do not directly apply to the recent improved DIQKD protocols based on noisy preprocessing, random key measurements, and modified CHSH inequalities. H…
▽ More
The security of finite-length keys is essential for the implementation of device-independent quantum key distribution (DIQKD). Presently, there are several finite-size DIQKD security proofs, but they are mostly focused on standard DIQKD protocols and do not directly apply to the recent improved DIQKD protocols based on noisy preprocessing, random key measurements, and modified CHSH inequalities. Here, we provide a general finite-size security proof that can simultaneously encompass these approaches, using tighter finite-size bounds than previous analyses. In doing so, we develop a method to compute tight lower bounds on the asymptotic keyrate for any such DIQKD protocol with binary inputs and outputs. With this, we show that positive asymptotic keyrates are achievable up to depolarizing noise values of $9.33\%$, exceeding all previously known noise thresholds. We also develop a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step, which yields substantially higher net key generation rates by essentially removing the sifting factor. Some of our results may also improve the keyrates of device-independent randomness expansion.
△ Less
Submitted 23 July, 2023; v1 submitted 15 December, 2020;
originally announced December 2020.
-
Are quantum cryptographic security claims vacuous?
Authors:
Joseph M. Renes,
Renato Renner
Abstract:
A central claim in quantum cryptography is that secrecy can be proved rigorously, based on the assumption that the relevant information-processing systems obey the laws of quantum physics. This claim has recently been challenged by Bernstein (arXiv:1803.04520). He argues that the laws of physics may also entail an unavoidable leakage of any classical information encoded in physical carriers. The s…
▽ More
A central claim in quantum cryptography is that secrecy can be proved rigorously, based on the assumption that the relevant information-processing systems obey the laws of quantum physics. This claim has recently been challenged by Bernstein (arXiv:1803.04520). He argues that the laws of physics may also entail an unavoidable leakage of any classical information encoded in physical carriers. The security claim of quantum key distribution would then be vacuous, as the computation of the final secret key would leak its value. However, as we explain in this short note, Bernstein's reasoning is based on a too "classical" understanding of physics. It follows from known theorems about fault-tolerant quantum computation that quantum physics avoids his conclusion.
△ Less
Submitted 22 October, 2020;
originally announced October 2020.
-
Device-independent quantum key distribution from generalized CHSH inequalities
Authors:
P. Sekatski,
J. -D. Bancal,
X. Valcarce,
E. Y. -Z. Tan,
R. Renner,
N. Sangouard
Abstract:
Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, which effectively takes into account the individual…
▽ More
Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, which effectively takes into account the individual values of two correlation functions. We show that this additional information, which is anyway available in practice, allows one to get higher key rates than with the CHSH score. We discuss the potential advantage of this technique for realistic photonic implementations of device-independent quantum key distribution.
△ Less
Submitted 16 April, 2021; v1 submitted 3 September, 2020;
originally announced September 2020.
-
Optimal universal programming of unitary gates
Authors:
Yuxiang Yang,
Renato Renner,
Giulio Chiribella
Abstract:
A universal quantum processor is a device that takes as input a (quantum) program, containing an encoding of an arbitrary unitary gate, and a (quantum) data register, on which the encoded gate is applied. While no perfect universal quantum processor can exist, approximate processors have been proposed in the past two decades. A fundamental open question is how the size of the smallest quantum prog…
▽ More
A universal quantum processor is a device that takes as input a (quantum) program, containing an encoding of an arbitrary unitary gate, and a (quantum) data register, on which the encoded gate is applied. While no perfect universal quantum processor can exist, approximate processors have been proposed in the past two decades. A fundamental open question is how the size of the smallest quantum program scales with the approximation error. Here we answer the question, by proving a bound on the size of the program and designing a concrete protocol that attains the bound in the asymptotic limit. Our result is based on a connection between optimal programming and the Heisenberg limit of quantum metrology, and establishes an asymptotic equivalence between the tasks of programming, learning, and estimating unitary gates.
△ Less
Submitted 4 February, 2021; v1 submitted 20 July, 2020;
originally announced July 2020.
-
Noisy pre-processing facilitating a photonic realisation of device-independent quantum key distribution
Authors:
M. Ho,
P. Sekatski,
E. Y. -Z. Tan,
R. Renner,
J. -D. Bancal,
N. Sangouard
Abstract:
Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i.e., the probability that the signals sent over the…
▽ More
Device-independent quantum key distribution provides security even when the equipment used to communicate over the quantum channel is largely uncharacterized. An experimental demonstration of device-independent quantum key distribution is however challenging. A central obstacle in photonic implementations is that the global detection efficiency, i.e., the probability that the signals sent over the quantum channel are successfully received, must be above a certain threshold. We here propose a method to significantly relax this threshold, while maintaining provable device-independent security. This is achieved with a protocol that adds artificial noise, which cannot be known or controlled by an adversary, to the initial measurement data (the raw key). Focusing on a realistic photonic setup using a source based on spontaneous parametric down conversion, we give explicit bounds on the minimal required global detection efficiency.
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Ultimate limit on time signal generation
Authors:
Yuxiang Yang,
Renato Renner
Abstract:
The generation of time signals is a fundamental task in science. Here we study the relation between the quality of a time signal and the physics of the system that generates it. According to quantum theory, any time signal can be decomposed into individual quanta that lead to single detection events. Our main result is a bound on how sharply peaked in time these events can be, which depends on the…
▽ More
The generation of time signals is a fundamental task in science. Here we study the relation between the quality of a time signal and the physics of the system that generates it. According to quantum theory, any time signal can be decomposed into individual quanta that lead to single detection events. Our main result is a bound on how sharply peaked in time these events can be, which depends on the dimension of the signal generator. This result promises applications in various directions, including information theory, quantum clocks, and process simulation.
△ Less
Submitted 16 April, 2020;
originally announced April 2020.
-
Independent quality assessment of a commercial quantum random number generator
Authors:
Mikhail Petrov,
Igor Radchenko,
Damian Steiger,
Renato Renner,
Matthias Troyer,
Vadim Makarov
Abstract:
We reverse-engineer, test and analyse hardware and firmware of the commercial quantum-optical random number generator Quantis from ID Quantique. We show that > 99% of its output data originates in physically random processes: random timing of photon absorption in a semiconductor material, and random growth of avalanche owing to impact ionisation. Under a strong assumption that these processes corr…
▽ More
We reverse-engineer, test and analyse hardware and firmware of the commercial quantum-optical random number generator Quantis from ID Quantique. We show that > 99% of its output data originates in physically random processes: random timing of photon absorption in a semiconductor material, and random growth of avalanche owing to impact ionisation. Under a strong assumption that these processes correspond to a measurement of an initially pure state of the components, our analysis implies the unpredictability of the generated randomness. We have also found minor non-random contributions from imperfections in detector electronics and an internal processing algorithm, specific to this particular device. Our work shows that the design quality of a commercial quantum-optical randomness source can be verified without cooperation of the manufacturer and without access to the engineering documentation.
△ Less
Submitted 13 July, 2022; v1 submitted 10 April, 2020;
originally announced April 2020.
-
Tangible phenomenological thermodynamics
Authors:
Philipp Kammerlander,
Renato Renner
Abstract:
In this paper, the foundations of classical phenomenological thermodynamics are being thoroughly revisited. A new rigorous basis for thermodynamics is laid out in the main text and presented in full detail in the appendix. All relevant concepts, such as work, heat, internal energy, heat reservoirs, reversibility, absolute temperature and entropy, are introduced on an abstract level and connected t…
▽ More
In this paper, the foundations of classical phenomenological thermodynamics are being thoroughly revisited. A new rigorous basis for thermodynamics is laid out in the main text and presented in full detail in the appendix. All relevant concepts, such as work, heat, internal energy, heat reservoirs, reversibility, absolute temperature and entropy, are introduced on an abstract level and connected through traditional results, such as Carnot's Theorem, Clausius' Theorem and the Entropy Theorem. The paper offers insights into the basic assumptions one has to make in order to formally introduce a phenomenological thermodynamic theory. This contribution is of particular importance when applying phenomenological thermodynamics to systems, such as black holes, where the microscopic physics is not yet fully understood. Altogether, this work can serve as a basis for a complete and rigorous introduction to thermodynamics in an undergraduate course which follows the traditional lines as closely as possible.
△ Less
Submitted 20 February, 2020;
originally announced February 2020.
-
Operationally meaningful representations of physical systems in neural networks
Authors:
Hendrik Poulsen Nautrup,
Tony Metger,
Raban Iten,
Sofiene Jerbi,
Lea M. Trenkwalder,
Henrik Wilming,
Hans J. Briegel,
Renato Renner
Abstract:
To make progress in science, we often build abstract representations of physical systems that meaningfully encode information about the systems. The representations learnt by most current machine learning techniques reflect statistical structure present in the training data; however, these methods do not allow us to specify explicit and operationally meaningful requirements on the representation.…
▽ More
To make progress in science, we often build abstract representations of physical systems that meaningfully encode information about the systems. The representations learnt by most current machine learning techniques reflect statistical structure present in the training data; however, these methods do not allow us to specify explicit and operationally meaningful requirements on the representation. Here, we present a neural network architecture based on the notion that agents dealing with different aspects of a physical system should be able to communicate relevant information as efficiently as possible to one another. This produces representations that separate different parameters which are useful for making statements about the physical system in different experimental settings. We present examples involving both classical and quantum physics. For instance, our architecture finds a compact representation of an arbitrary two-qubit system that separates local parameters from parameters describing quantum correlations. We further show that this method can be combined with reinforcement learning to enable representation learning within interactive scenarios where agents need to explore experimental settings to identify relevant variables.
△ Less
Submitted 2 January, 2020;
originally announced January 2020.
-
A chain rule for the quantum relative entropy
Authors:
Kun Fang,
Omar Fawzi,
Renato Renner,
David Sutter
Abstract:
The chain rule for the classical relative entropy ensures that the relative entropy between probability distributions on multipartite systems can be decomposed into a sum of relative entropies of suitably chosen conditional distributions on the individual systems. Here, we prove a similar chain rule inequality for the quantum relative entropy in terms of channel relative entropies. The new chain r…
▽ More
The chain rule for the classical relative entropy ensures that the relative entropy between probability distributions on multipartite systems can be decomposed into a sum of relative entropies of suitably chosen conditional distributions on the individual systems. Here, we prove a similar chain rule inequality for the quantum relative entropy in terms of channel relative entropies. The new chain rule allows us to solve an open problem in the context of asymptotic quantum channel discrimination: surprisingly, adaptive protocols cannot improve the error rate for asymmetric channel discrimination compared to non-adaptive strategies. In addition, we give examples of quantum channels showing that the channel relative entropy is not additive under the tensor product.
△ Less
Submitted 12 September, 2019;
originally announced September 2019.
-
Fundamental energy requirement of reversible quantum operations
Authors:
Giulio Chiribella,
Yuxiang Yang,
Renato Renner
Abstract:
Landauer's principle asserts that any computation has an unavoidable energy cost that grows proportionally to its degree of logical irreversibility. But even a logically reversible operation, when run on a physical processor that operates on different energy levels, requires energy. Here we quantify this energy requirement, providing upper and lower bounds that coincide up to a constant factor. We…
▽ More
Landauer's principle asserts that any computation has an unavoidable energy cost that grows proportionally to its degree of logical irreversibility. But even a logically reversible operation, when run on a physical processor that operates on different energy levels, requires energy. Here we quantify this energy requirement, providing upper and lower bounds that coincide up to a constant factor. We derive these bounds from a general quantum resource-theoretic argument, which implies that the initial resource requirement for implementing a unitary operation within an error~$ε$ grows like $1/\sqrt ε$ times the amount of resource generated by the operation. Applying these results to quantum circuits, we find that their energy requirement can, by an appropriate design, be made independent of their time complexity.
△ Less
Submitted 28 May, 2021; v1 submitted 28 August, 2019;
originally announced August 2019.
-
Accuracy enhancing protocols for quantum clocks
Authors:
Yuxiang Yang,
Lennart Baumgärtner,
Ralph Silva,
Renato Renner
Abstract:
The accuracy of the time information generated by clocks can be enhanced by allowing them to communicate with each other. Here we consider a basic scenario where a quantum clock receives a low-accuracy time signal as input and ask whether it can generate an output of higher accuracy. We propose protocols that use a quantum clock with a $d$-dimensional state space to achieve an accuracy enhancement…
▽ More
The accuracy of the time information generated by clocks can be enhanced by allowing them to communicate with each other. Here we consider a basic scenario where a quantum clock receives a low-accuracy time signal as input and ask whether it can generate an output of higher accuracy. We propose protocols that use a quantum clock with a $d$-dimensional state space to achieve an accuracy enhancement by a factor of $d$, for large enough $d$. If no feedback to the input signal is allowed, this enhancement is temporary. With feedback the accuracy enhancement can be retained indefinitely. Our protocols are specific to quantum clocks, and may be used to synchronise them in a network, defining a time scale that is more accurate than what can be achieved by non-interacting or classical clocks.
△ Less
Submitted 3 December, 2019; v1 submitted 23 May, 2019;
originally announced May 2019.
-
Bounds on Lyapunov exponents via entropy accumulation
Authors:
David Sutter,
Omar Fawzi,
Renato Renner
Abstract:
Lyapunov exponents describe the asymptotic behavior of the singular values of large products of random matrices. A direct computation of these exponents is however often infeasible. By establishing a link between Lyapunov exponents and an information theoretic tool called entropy accumulation theorem we derive an upper and a lower bound for the maximal and minimal Lyapunov exponent, respectively.…
▽ More
Lyapunov exponents describe the asymptotic behavior of the singular values of large products of random matrices. A direct computation of these exponents is however often infeasible. By establishing a link between Lyapunov exponents and an information theoretic tool called entropy accumulation theorem we derive an upper and a lower bound for the maximal and minimal Lyapunov exponent, respectively. The bounds assume independence of the random matrices, are analytical, and are tight in the commutative case as well as in other scenarios. They can be expressed in terms of an optimization problem that only involves single matrices rather than large products. The upper bound for the maximal Lyapunov exponent can be evaluated efficiently via the theory of convex optimization.
△ Less
Submitted 22 September, 2020; v1 submitted 8 May, 2019;
originally announced May 2019.
-
Advantage distillation for device-independent quantum key distribution
Authors:
Ernest Y. -Z. Tan,
Charles C. -W. Lim,
Renato Renner
Abstract:
We derive a sufficient condition for advantage distillation to be secure against collective attacks in device-independent quantum key distribution (DIQKD), focusing on the repetition-code protocol. In addition, we describe a semidefinite programming method to check whether this condition holds for any probability distribution obtained in a DIQKD protocol. Applying our method to various probability…
▽ More
We derive a sufficient condition for advantage distillation to be secure against collective attacks in device-independent quantum key distribution (DIQKD), focusing on the repetition-code protocol. In addition, we describe a semidefinite programming method to check whether this condition holds for any probability distribution obtained in a DIQKD protocol. Applying our method to various probability distributions, we find that advantage distillation is possible up to depolarising-noise values of $q \approx 9.1\%$ or limited detector efficiencies of $η\approx 89.1\%$ in a 2-input 2-output scenario. This exceeds the noise thresholds of $q \approx 7.1\%$ and $η\approx 90.7\%$ respectively for DIQKD with one-way error correction using the CHSH inequality, thereby showing that it is possible to distill secret key beyond those thresholds.
△ Less
Submitted 17 May, 2020; v1 submitted 25 March, 2019;
originally announced March 2019.
-
Confidence Polytopes in Quantum State Tomography
Authors:
**zhao Wang,
Volkher B. Scholz,
Renato Renner
Abstract:
Quantum State Tomography is the task of inferring the state of a quantum system from measurement data. A reliable tomography scheme should not only report an estimate for that state, but also well-justified error bars. These may be specified in terms of confidence regions, i.e., subsets of the state space which contain the system's state with high probability. Here, building upon a quantum general…
▽ More
Quantum State Tomography is the task of inferring the state of a quantum system from measurement data. A reliable tomography scheme should not only report an estimate for that state, but also well-justified error bars. These may be specified in terms of confidence regions, i.e., subsets of the state space which contain the system's state with high probability. Here, building upon a quantum generalisation of Clopper-Pearson confidence intervals--a notion known from classical statistics--we present a simple and reliable scheme for generating confidence regions. These have the shape of a polytope and can be computed efficiently. We provide several examples to demonstrate the practical usability of the scheme in experiments.
△ Less
Submitted 29 August, 2018;
originally announced August 2018.
-
Discovering physical concepts with neural networks
Authors:
Raban Iten,
Tony Metger,
Henrik Wilming,
Lidia del Rio,
Renato Renner
Abstract:
Despite the success of neural networks at solving concrete physics problems, their use as a general-purpose tool for scientific discovery is still in its infancy. Here, we approach this problem by modelling a neural network architecture after the human physical reasoning process, which has similarities to representation learning. This allows us to make progress towards the long-term goal of machin…
▽ More
Despite the success of neural networks at solving concrete physics problems, their use as a general-purpose tool for scientific discovery is still in its infancy. Here, we approach this problem by modelling a neural network architecture after the human physical reasoning process, which has similarities to representation learning. This allows us to make progress towards the long-term goal of machine-assisted scientific discovery from experimental data without making prior assumptions about the system. We apply this method to toy examples and show that the network finds the physically relevant parameters, exploits conservation laws to make predictions, and can help to gain conceptual insights, e.g. Copernicus' conclusion that the solar system is heliocentric.
△ Less
Submitted 23 January, 2020; v1 submitted 26 July, 2018;
originally announced July 2018.
-
Smooth entropy in axiomatic thermodynamics
Authors:
Mirjam Weilenmann,
Lea Krämer Gabriel,
Philippe Faist,
Renato Renner
Abstract:
Thermodynamics can be formulated in either of two approaches, the phenomenological approach, which refers to the macroscopic properties of systems, and the statistical approach, which describes systems in terms of their microscopic constituents. We establish a connection between these two approaches by means of a new axiomatic framework that can take errors and imprecisions into account. This link…
▽ More
Thermodynamics can be formulated in either of two approaches, the phenomenological approach, which refers to the macroscopic properties of systems, and the statistical approach, which describes systems in terms of their microscopic constituents. We establish a connection between these two approaches by means of a new axiomatic framework that can take errors and imprecisions into account. This link extends to systems of arbitrary sizes including microscopic systems, for which the treatment of imprecisions is pertinent to any realistic situation. Based on this, we identify the quantities that characterise whether certain thermodynamic processes are possible with entropy measures from information theory. In the error-tolerant case, these entropies are so-called smooth min and max entropies. Our considerations further show that in an appropriate macroscopic limit there is a single entropy measure that characterises which state transformations are possible. In the case of many independent copies of a system (the so-called i.i.d. regime), the relevant quantity is the von Neumann entropy.
△ Less
Submitted 19 July, 2018;
originally announced July 2018.
-
Performance of stochastic clocks in the Alternate Ticks Game
Authors:
Sandra Stupar,
Christian Klumpp,
Renato Renner,
Nicolas Gisin
Abstract:
In standard quantum theory, time is not an observable. It enters as a parameter in the Schrödinger equation, but there is no measurement operator associated to it. Nevertheless, one may take an operational viewpoint and regard time as the information one can read from clocks. The Alternate Ticks Game, introduced in arXiv:1506.01373, is a completely operational means to quantify the accuracy of tim…
▽ More
In standard quantum theory, time is not an observable. It enters as a parameter in the Schrödinger equation, but there is no measurement operator associated to it. Nevertheless, one may take an operational viewpoint and regard time as the information one can read from clocks. The Alternate Ticks Game, introduced in arXiv:1506.01373, is a completely operational means to quantify the accuracy of time scales generated by clocks. The idea is to count the number of ticks that two copies of a clock can produce until they run out of synchronisation. Here we investigate the performance of stochastic clocks in this game. These are clocks which are classical in the sense that they do not exploit quantum coherence. Our results support earlier conjectures that their accuracy grows linearly in the size of the clockwork, measured in terms of the dimension of the associated Hilbert space. In particular, we derive explicit bounds on the accuracy of a natural class of stochastic clocks, the stochastic ladder clocks.
△ Less
Submitted 22 June, 2018;
originally announced June 2018.
-
Quantum clocks are more precise than classical ones
Authors:
Mischa P. Woods,
Ralph Silva,
Gilles Pütz,
Sandra Stupar,
Renato Renner
Abstract:
A clock is, from an information-theoretic perspective, a system that emits information about time. One may therefore ask whether the theory of information imposes any constraints on the maximum precision of clocks. Here we show a quantum-over-classical advantage for clocks or, more precisely, the task of generating information about what time it is. The argument is based on information-theoretic c…
▽ More
A clock is, from an information-theoretic perspective, a system that emits information about time. One may therefore ask whether the theory of information imposes any constraints on the maximum precision of clocks. Here we show a quantum-over-classical advantage for clocks or, more precisely, the task of generating information about what time it is. The argument is based on information-theoretic considerations: we analyse how the precision of a clock scales with its size, measured in terms of the number of bits that could be stored in it. We find that a quantum clock can achieve a quadratically improved precision compared to a purely classical one of the same size.
△ Less
Submitted 24 February, 2022; v1 submitted 1 June, 2018;
originally announced June 2018.
-
The zeroth law of thermodynamics is redundant
Authors:
Philipp Kammerlander,
Renato Renner
Abstract:
We reconsider the basic building blocks of classical phenomenological thermodynamics. While doing so we show that the zeroth law is a redundant postulate for the theory by deriving it from the first and the second laws. This is in stark contrast to the prevalent conception that the three laws, the zeroth, first and second, are all necessary and independent axioms.
We reconsider the basic building blocks of classical phenomenological thermodynamics. While doing so we show that the zeroth law is a redundant postulate for the theory by deriving it from the first and the second laws. This is in stark contrast to the prevalent conception that the three laws, the zeroth, first and second, are all necessary and independent axioms.
△ Less
Submitted 25 April, 2018;
originally announced April 2018.
-
Communication Complexity of One-Shot Remote State Preparation
Authors:
Shima Bab Hadiashar,
Ashwin Nayak,
Renato Renner
Abstract:
Quantum teleportation uses prior shared entanglement and classical communication to send an unknown quantum state from one party to another. Remote state preparation (RSP) is a similar distributed task in which the sender knows the entire classical description of the state to be sent. (This may also be viewed as the task of non-oblivious compression of a single sample from an ensemble of quantum s…
▽ More
Quantum teleportation uses prior shared entanglement and classical communication to send an unknown quantum state from one party to another. Remote state preparation (RSP) is a similar distributed task in which the sender knows the entire classical description of the state to be sent. (This may also be viewed as the task of non-oblivious compression of a single sample from an ensemble of quantum states.) We study the communication complexity of approximate remote state preparation, in which the goal is to prepare an approximation of the desired quantum state. Jain [Quant. Inf. & Comp., 2006] showed that the worst-case communication complexity of approximate RSP can be bounded from above in terms of the maximum possible information in an encoding. He also showed that this quantity is a lower bound for communication complexity of (exact) remote state preparation. In this work, we tightly characterize the worst-case and average-case communication complexity of remote state preparation in terms of non-asymptotic information-theoretic quantities. We also show that the average-case communication complexity of RSP can be much smaller than the worst-case one. In the process, we show that n bits cannot be communicated with less than n transmitted bits in LOCC protocols. This strengthens a result due to Nayak and Salzman [J. ACM, 2006] and may be of independent interest.
△ Less
Submitted 21 February, 2018;
originally announced February 2018.
-
Imperfect Thermalizations Allow for Optimal Thermodynamic Processes
Authors:
Elisa Bäumer,
Martí Perarnau-Llobet,
Philipp Kammerlander,
Henrik Wilming,
Renato Renner
Abstract:
Optimal (reversible) processes in thermodynamics can be modelled as step-by-step processes, where the system is successively thermalized with respect to different Hamiltonians by an external thermal bath. However, in practice interactions between system and thermal bath will take finite time, and precise control of their interaction is usually out of reach. Motivated by this observation, we consid…
▽ More
Optimal (reversible) processes in thermodynamics can be modelled as step-by-step processes, where the system is successively thermalized with respect to different Hamiltonians by an external thermal bath. However, in practice interactions between system and thermal bath will take finite time, and precise control of their interaction is usually out of reach. Motivated by this observation, we consider finite-time and uncontrolled operations between system and bath, which result in thermalizations that are only partial in each step. We show that optimal processes can still be achieved for any non-trivial partial thermalizations at the price of increasing the number of operations, and characterise the corresponding tradeoff. We focus on work extraction protocols and show our results in two different frameworks: A collision model and a model where the Hamiltonian of the working system is controlled over time and the system can be brought into contact with a heat bath. Our results show that optimal processes are robust to noise and imperfections in small quantum systems, and can be achieved by a large set of interactions between system and bath.
△ Less
Submitted 20 June, 2019; v1 submitted 19 December, 2017;
originally announced December 2017.
-
A non-probabilistic substitute for the Born rule
Authors:
Daniela Frauchiger,
Renato Renner
Abstract:
The Born rule assigns a probability to any possible outcome of a quantum measurement, but leaves open the question how these probabilities are to be interpreted and, in particular, how they relate to the outcome observed in an actual experiment. We propose to avoid this question by replacing the Born rule with two non-probabilistic postulates: (i) the projector associated to the observed outcome m…
▽ More
The Born rule assigns a probability to any possible outcome of a quantum measurement, but leaves open the question how these probabilities are to be interpreted and, in particular, how they relate to the outcome observed in an actual experiment. We propose to avoid this question by replacing the Born rule with two non-probabilistic postulates: (i) the projector associated to the observed outcome must have a positive overlap with the state of the measured system; (ii) statements about observed outcomes are robust, that is, remain valid under small perturbations of the state. We show that the two postulates suffice to retrieve the interpretations of the Born rule that are commonly used for analysing experimental data.
△ Less
Submitted 13 October, 2017;
originally announced October 2017.
-
Fundamental work cost of quantum processes
Authors:
Philippe Faist,
Renato Renner
Abstract:
Information-theoretic approaches provide a promising avenue for extending the laws of thermodynamics to the nanoscale. Here, we provide a general fundamental lower limit, valid for systems with an arbitrary Hamiltonian and in contact with any thermodynamic bath, on the work cost for the implementation of any logical process. This limit is given by a new information measure---the coherent relative…
▽ More
Information-theoretic approaches provide a promising avenue for extending the laws of thermodynamics to the nanoscale. Here, we provide a general fundamental lower limit, valid for systems with an arbitrary Hamiltonian and in contact with any thermodynamic bath, on the work cost for the implementation of any logical process. This limit is given by a new information measure---the coherent relative entropy---which accounts for the Gibbs weight of each microstate. The coherent relative entropy enjoys a collection of natural properties justifying its interpretation as a measure of information, and can be understood as a generalization of a quantum relative entropy difference. As an application, we show that the standard first and second laws of thermodynamics emerge from our microscopic picture in the macroscopic limit. Finally, our results have an impact on understanding the role of the observer in thermodynamics: Our approach may be applied at any level of knowledge---for instance at the microscopic, mesoscopic or macroscopic scales---thus providing a formulation of thermodynamics that is inherently relative to the observer. We obtain a precise criterion for when the laws of thermodynamics can be applied, thus making a step forward in determining the exact extent of the universality of thermodynamics and enabling a systematic treatment of Maxwell-demon-like situations.
△ Less
Submitted 6 May, 2018; v1 submitted 1 September, 2017;
originally announced September 2017.
-
Necessary criterion for approximate recoverability
Authors:
David Sutter,
Renato Renner
Abstract:
A tripartite state $ρ_{ABC}$ forms a Markov chain if there exists a recovery map $\mathcal{R}_{B \to BC}$ acting only on the $B$-part that perfectly reconstructs $ρ_{ABC}$ from $ρ_{AB}$. To achieve an approximate reconstruction, it suffices that the conditional mutual information $I(A:C|B)_ρ$ is small, as shown recently. Here we ask what conditions are necessary for approximate state reconstructio…
▽ More
A tripartite state $ρ_{ABC}$ forms a Markov chain if there exists a recovery map $\mathcal{R}_{B \to BC}$ acting only on the $B$-part that perfectly reconstructs $ρ_{ABC}$ from $ρ_{AB}$. To achieve an approximate reconstruction, it suffices that the conditional mutual information $I(A:C|B)_ρ$ is small, as shown recently. Here we ask what conditions are necessary for approximate state reconstruction. This is answered by a lower bound on the relative entropy between $ρ_{ABC}$ and the recovered state $\mathcal{R}_{B\to BC}(ρ_{AB})$. The bound consists of the conditional mutual information and an entropic correction term that quantifies the disturbance of the $B$-part by the recovery map.
△ Less
Submitted 13 August, 2018; v1 submitted 18 May, 2017;
originally announced May 2017.
-
Space QUEST mission proposal: Experimentally testing decoherence due to gravity
Authors:
Siddarth Koduru Joshi,
Jacques Pienaar,
Timothy C. Ralph,
Luigi Cacciapuoti,
Will McCutcheon,
John Rarity,
Dirk Giggenbach,
** Gyu Lim,
Vadim Makarov,
Ivette Fuentes,
Thomas Scheidl,
Erik Beckert,
Mohamed Bourennane,
David Edward Bruschi,
Adan Cabello,
Jose Capmany,
Alberto Carrasco-Casado,
Eleni Diamanti,
Miloslav Duusek,
Dominique Elser,
Angelo Gulinatti,
Robert H. Hadfield,
Thomas Jennewein,
Rainer Kaltenbaek,
Michael A. Krainak
, et al. (20 additional authors not shown)
Abstract:
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph,…
▽ More
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to purely classical systems. By measuring this effect or lack thereof, we can test the hypotheses behind several such models. For instance, as predicted by Ralph and coworkers [T C Ralph, G J Milburn, and T Downes, Phys. Rev. A, 79(2):22121, 2009, T C Ralph and J Pienaar, New Journal of Physics, 16(8):85008, 2014], a bipartite entangled system could decohere if each particle traversed through a different gravitational field gradient. We propose to study this effect in a ground to space uplink scenario. We extend the above theoretical predictions of Ralph and coworkers and discuss the scientific consequences of detecting/failing to detect the predicted gravitational decoherence. We present a detailed mission design of the European Space Agency's (ESA) Space QUEST (Space - Quantum Entanglement Space Test) mission, and study the feasibility of the mission schema.
△ Less
Submitted 9 January, 2018; v1 submitted 23 March, 2017;
originally announced March 2017.
-
Toward an Algebraic Theory of Systems
Authors:
Christian Matt,
Ueli Maurer,
Christopher Portmann,
Renato Renner,
Björn Tackmann
Abstract:
We propose the concept of a system algebra with a parallel composition operation and an interface connection operation, and formalize composition-order invariance, which postulates that the order of composing and connecting systems is irrelevant, a generalized form of associativity. Composition-order invariance explicitly captures a common property that is implicit in any context where one can dra…
▽ More
We propose the concept of a system algebra with a parallel composition operation and an interface connection operation, and formalize composition-order invariance, which postulates that the order of composing and connecting systems is irrelevant, a generalized form of associativity. Composition-order invariance explicitly captures a common property that is implicit in any context where one can draw a figure (hiding the drawing order) of several connected systems, which appears in many scientific contexts. This abstract algebra captures settings where one is interested in the behavior of a composed system in an environment and wants to abstract away anything internal not relevant for the behavior. This may include physical systems, electronic circuits, or interacting distributed systems.
One specific such setting, of special interest in computer science, are functional system algebras, which capture, in the most general sense, any type of system that takes inputs and produces outputs depending on the inputs, and where the output of a system can be the input to another system. The behavior of such a system is uniquely determined by the function map** inputs to outputs. We consider several instantiations of this very general concept. In particular, we show that Kahn networks form a functional system algebra and prove their composition-order invariance.
Moreover, we define a functional system algebra of causal systems, characterized by the property that inputs can only influence future outputs, where an abstract partial order relation captures the notion of "later". This system algebra is also shown to be composition-order invariant and appropriate instantiations thereof allow to model and analyze systems that depend on time.
△ Less
Submitted 22 September, 2018; v1 submitted 13 September, 2016;
originally announced September 2016.
-
Simple and tight device-independent security proofs
Authors:
Rotem Arnon-Friedman,
Renato Renner,
Thomas Vidick
Abstract:
Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions on the quantum devices used in a protocol, making it particularly applicable in a quantum-wary environment. While the existence of device-independent protocols for tasks such as randomness expansion an…
▽ More
Device-independent security is the gold standard for quantum cryptography: not only is security based entirely on the laws of quantum mechanics, but it holds irrespective of any a priori assumptions on the quantum devices used in a protocol, making it particularly applicable in a quantum-wary environment. While the existence of device-independent protocols for tasks such as randomness expansion and quantum key distribution has recently been established, the underlying proofs of security remain very challenging, yield rather poor key rates, and demand very high-quality quantum devices, thus making them all but impossible to implement in practice.
We introduce a technique for the analysis of device-independent cryptographic protocols. We provide a flexible protocol and give a security proof that provides quantitative bounds that are asymptotically tight, even in the presence of general quantum adversaries. At a high level our approach amounts to establishing a reduction to the scenario in which the untrusted device operates in an identical and independent way in each round of the protocol. This is achieved by leveraging the sequential nature of the protocol, and makes use of a newly developed tool, the "entropy accumulation theorem" of Dupuis et al.
As concrete applications we give simple and modular security proofs for device-independent quantum key distribution and randomness expansion protocols based on the CHSH inequality. For both tasks we establish essentially optimal asymptotic key rates and noise tolerance. In view of recent experimental progress, which has culminated in loophole-free Bell tests, it is likely that these protocols can be practically implemented in the near future.
△ Less
Submitted 26 March, 2019; v1 submitted 6 July, 2016;
originally announced July 2016.
-
Entropy accumulation
Authors:
Frederic Dupuis,
Omar Fawzi,
Renato Renner
Abstract:
We ask the question whether entropy accumulates, in the sense that the operationally relevant total uncertainty about an $n$-partite system $A = (A_1, \ldots A_n)$ corresponds to the sum of the entropies of its parts $A_i$. The Asymptotic Equipartition Property implies that this is indeed the case to first order in $n$, under the assumption that the parts $A_i$ are identical and independent of eac…
▽ More
We ask the question whether entropy accumulates, in the sense that the operationally relevant total uncertainty about an $n$-partite system $A = (A_1, \ldots A_n)$ corresponds to the sum of the entropies of its parts $A_i$. The Asymptotic Equipartition Property implies that this is indeed the case to first order in $n$, under the assumption that the parts $A_i$ are identical and independent of each other. Here we show that entropy accumulation occurs more generally, i.e., without an independence assumption, provided one quantifies the uncertainty about the individual systems $A_i$ by the von Neumann entropy of suitably chosen conditional states. The analysis of a large system can hence be reduced to the study of its parts. This is relevant for applications. In device-independent cryptography, for instance, the approach yields essentially optimal security bounds valid for general attacks, as shown by Arnon-Friedman et al.
△ Less
Submitted 24 September, 2020; v1 submitted 6 July, 2016;
originally announced July 2016.
-
Catalytic Decoupling of Quantum Information
Authors:
Christian Majenz,
Mario Berta,
Frédéric Dupuis,
Renato Renner,
Matthias Christandl
Abstract:
The decoupling technique is a fundamental tool in quantum information theory with applications ranging from quantum thermodynamics to quantum many body physics to the study of black hole radiation. In this work we introduce the notion of catalytic decoupling, that is, decoupling in the presence of an uncorrelated ancilla system. This removes a restriction on the standard notion of decoupling, whic…
▽ More
The decoupling technique is a fundamental tool in quantum information theory with applications ranging from quantum thermodynamics to quantum many body physics to the study of black hole radiation. In this work we introduce the notion of catalytic decoupling, that is, decoupling in the presence of an uncorrelated ancilla system. This removes a restriction on the standard notion of decoupling, which becomes important for structureless resources, and yields a tight characterization in terms of the max-mutual information. Catalytic decoupling naturally unifies various tasks like the erasure of correlations and quantum state merging, and leads to a resource theory of decoupling.
△ Less
Submitted 2 May, 2016;
originally announced May 2016.
-
Quantum theory cannot consistently describe the use of itself
Authors:
Daniela Frauchiger,
Renato Renner
Abstract:
Quantum theory provides an extremely accurate description of fundamental processes in physics. It thus seems likely that the theory is applicable beyond the, mostly microscopic, domain in which it has been tested experimentally. Here we propose a Gedankenexperiment to investigate the question whether quantum theory can, in principle, have universal validity. The idea is that, if the answer was yes…
▽ More
Quantum theory provides an extremely accurate description of fundamental processes in physics. It thus seems likely that the theory is applicable beyond the, mostly microscopic, domain in which it has been tested experimentally. Here we propose a Gedankenexperiment to investigate the question whether quantum theory can, in principle, have universal validity. The idea is that, if the answer was yes, it must be possible to employ quantum theory to model complex systems that include agents who are themselves using quantum theory. Analysing the experiment under this presumption, we find that one agent, upon observing a particular measurement outcome, must conclude that another agent has predicted the opposite outcome with certainty. The agents' conclusions, although all derived within quantum theory, are thus inconsistent. This indicates that quantum theory cannot be extrapolated to complex systems, at least not in a straightforward manner.
△ Less
Submitted 5 October, 2018; v1 submitted 25 April, 2016;
originally announced April 2016.
-
Causal Boxes: Quantum Information-Processing Systems Closed under Composition
Authors:
Christopher Portmann,
Christian Matt,
Ueli Maurer,
Renato Renner,
Björn Tackmann
Abstract:
Complex information-processing systems, for example quantum circuits, cryptographic protocols, or multi-player games, are naturally described as networks composed of more basic information-processing systems. A modular analysis of such systems requires a mathematical model of systems that is closed under composition, i.e., a network of these objects is again an object of the same type. We propose…
▽ More
Complex information-processing systems, for example quantum circuits, cryptographic protocols, or multi-player games, are naturally described as networks composed of more basic information-processing systems. A modular analysis of such systems requires a mathematical model of systems that is closed under composition, i.e., a network of these objects is again an object of the same type. We propose such a model and call the corresponding systems causal boxes.
Causal boxes capture superpositions of causal structures, e.g., messages sent by a causal box A can be in a superposition of different orders or in a superposition of being sent to box B and box C. Furthermore, causal boxes can model systems whose behavior depends on time. By instantiating the Abstract Cryptography framework with causal boxes, we obtain the first composable security framework that can handle arbitrary quantum protocols and relativistic protocols.
△ Less
Submitted 21 March, 2017; v1 submitted 7 December, 2015;
originally announced December 2015.
-
Resource theories of knowledge
Authors:
Lidia del Rio,
Lea Kraemer,
Renato Renner
Abstract:
How far can we take the resource theoretic approach to explore physics? Resource theories like LOCC, reference frames and quantum thermodynamics have proven a powerful tool to study how agents who are subject to certain constraints can act on physical systems. This approach has advanced our understanding of fundamental physical principles, such as the second law of thermodynamics, and provided ope…
▽ More
How far can we take the resource theoretic approach to explore physics? Resource theories like LOCC, reference frames and quantum thermodynamics have proven a powerful tool to study how agents who are subject to certain constraints can act on physical systems. This approach has advanced our understanding of fundamental physical principles, such as the second law of thermodynamics, and provided operational measures to quantify resources such as entanglement or information content. In this work, we significantly extend the approach and range of applicability of resource theories. Firstly we generalize the notion of resource theories to include any description or knowledge that agents may have of a physical state, beyond the density operator formalism. We show how to relate theories that differ in the language used to describe resources, like micro and macroscopic thermodynamics. Finally, we take a top-down approach to locality, in which a subsystem structure is derived from a global theory rather than assumed. The extended framework introduced here enables us to formalize new tasks in the language of resource theories, ranging from tomography, cryptography, thermodynamics and foundational questions, both within and beyond quantum theory.
△ Less
Submitted 27 November, 2015;
originally announced November 2015.
-
Universal recovery maps and approximate sufficiency of quantum relative entropy
Authors:
Marius Junge,
Renato Renner,
David Sutter,
Mark M. Wilde,
Andreas Winter
Abstract:
The data processing inequality states that the quantum relative entropy between two states $ρ$ and $σ$ can never increase by applying the same quantum channel $\mathcal{N}$ to both states. This inequality can be strengthened with a remainder term in the form of a distance between $ρ$ and the closest recovered state $(\mathcal{R} \circ \mathcal{N})(ρ)$, where $\mathcal{R}$ is a recovery map with th…
▽ More
The data processing inequality states that the quantum relative entropy between two states $ρ$ and $σ$ can never increase by applying the same quantum channel $\mathcal{N}$ to both states. This inequality can be strengthened with a remainder term in the form of a distance between $ρ$ and the closest recovered state $(\mathcal{R} \circ \mathcal{N})(ρ)$, where $\mathcal{R}$ is a recovery map with the property that $σ= (\mathcal{R} \circ \mathcal{N})(σ)$. We show the existence of an explicit recovery map that is universal in the sense that it depends only on $σ$ and the quantum channel $\mathcal{N}$ to be reversed. This result gives an alternate, information-theoretic characterization of the conditions for approximate quantum error correction.
△ Less
Submitted 7 August, 2018; v1 submitted 23 September, 2015;
originally announced September 2015.