-
Steady-state charging of quantum batteries via dissipative ancillas
Authors:
F. H. Kamin,
S. Salimi,
M. B. Arjmandi
Abstract:
We investigate the steady-state charging process of a single-cell quantum battery embedded in an N-cell star network of qubits, each interacting with a fermion reservoir, collectively and individually in equilibrium and non-equilibrium scenarios, respectively. We find an optimal steady-state charging in both scenarios, which grows monotonically with the reservoirs' chemical potential and chemical…
▽ More
We investigate the steady-state charging process of a single-cell quantum battery embedded in an N-cell star network of qubits, each interacting with a fermion reservoir, collectively and individually in equilibrium and non-equilibrium scenarios, respectively. We find an optimal steady-state charging in both scenarios, which grows monotonically with the reservoirs' chemical potential and chemical potential difference. Where the high base temperature of the reservoirs has a destructive role in all parameter regimes. We indicate that regardless of the strength of the non-equilibrium condition, the high base chemical potential of the battery's corresponding reservoir can significantly enhance the charging process. On the other hand, a weak coupling strength can strongly suppress the charging. Consequently, our results could counteract the detrimental effects of self-discharging and provide valuable guidelines for enhancing the stable charging of open quantum batteries in the absence of an external charging field.
△ Less
Submitted 23 February, 2024; v1 submitted 26 October, 2023;
originally announced October 2023.
-
A Customizable Conflict Resolution and Attribute-Based Access Control Framework for Multi-Robot Systems
Authors:
Salma Salimi,
Farhad Keramat,
Tomi Westerlund,
Jorge Peña Queralta
Abstract:
As multi-robot systems continue to advance and become integral to various applications, managing conflicts and ensuring secure access control are critical challenges that need to be addressed. Access control is essential in multi-robot systems to ensure secure and authorized interactions among robots, protect sensitive data, and prevent unauthorized access to resources. This paper presents a novel…
▽ More
As multi-robot systems continue to advance and become integral to various applications, managing conflicts and ensuring secure access control are critical challenges that need to be addressed. Access control is essential in multi-robot systems to ensure secure and authorized interactions among robots, protect sensitive data, and prevent unauthorized access to resources. This paper presents a novel framework for customizable conflict resolution and attribute-based access control in multi-robot systems for ROS 2 leveraging the Hyperledger Fabric blockchain. We introduce an attribute-based access control (ABAC) Fabric-ROS 2 bridge to enable secure communication and control between users and robots. By defining conflict resolution policies based on task priorities, robot capabilities, and user-defined constraints, our framework offers a flexible way to resolve conflicts. Additionally, it incorporates attribute-based access control, granting access rights based on user and robot attributes. ABAC offers a modular approach to control access compared to existing access control approaches in ROS 2, such as SROS2. Through this framework, multi-robot systems can be managed efficiently, securely, and adaptably, ensuring controlled access to resources and managing conflicts. Our experimental evaluation shows that our framework marginally improves latency and throughput over exiting Fabric and ROS 2 integration solutions. At higher network load, it is the only solution to operate reliably without a diverging transaction commitment latency. We also demonstrate how conflicts arising from simultaneous control or a robot by two users are resolved in real-time and motion distortion is effectively eliminated.
△ Less
Submitted 31 August, 2023;
originally announced August 2023.
-
Event-driven Fabric Blockchain -- ROS 2 Interface: Towards Secure and Auditable Teleoperation of Mobile Robots
Authors:
Lei Fu,
Salma Salimi,
Jorge Peña Queralta,
Tomi Westerlund
Abstract:
The integration of blockchain technology in robotic systems has been met by the community with a combination of hype and skepticism. The current literature shows that there is indeed potential for more secure and trustable distributed robotic systems. However, it is still unclear in what aspects of robotics beyond high-level decision making can blockchain technology be indeed usable. This paper ex…
▽ More
The integration of blockchain technology in robotic systems has been met by the community with a combination of hype and skepticism. The current literature shows that there is indeed potential for more secure and trustable distributed robotic systems. However, it is still unclear in what aspects of robotics beyond high-level decision making can blockchain technology be indeed usable. This paper explores the limits of a permissioned blockchain framework, Hyperledger Fabric, for teleoperation. Remote operation of mobile robots can benefit from the auditability and security properties of a blockchain. We study the potential benefits and the main limitations of such an approach. We introduce a new design and implementation for a event-driven Fabric-ROS 2 bridge that is able to maintain lower latencies at higher network loads than previous solutions. We also show this opens the door to more realistic use cases and applications. Our experiments with small aerial robots show latencies in the hundreds of milliseconds and simultaneous control of both a single and multi-robot system. We analyze the main trade-offs and limitations for real-world near real-time remote teleoperation.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Quantum battery charging by non-equilibrium steady-state currents
Authors:
F. H. Kamin,
Z. Abuali,
H. Ness,
S. Salimi
Abstract:
We present an analysis of the availability and maximum extractable work of quantum batteries in the presence of charge and/or heat steady-state currents. Quantum batteries are modelled as non-interacting open quantum systems (mesoscopic systems) strongly coupled to two thermal and particle reservoirs within the framework of non-equilibrium Green's function theory in a steady-state regime. We found…
▽ More
We present an analysis of the availability and maximum extractable work of quantum batteries in the presence of charge and/or heat steady-state currents. Quantum batteries are modelled as non-interacting open quantum systems (mesoscopic systems) strongly coupled to two thermal and particle reservoirs within the framework of non-equilibrium Green's function theory in a steady-state regime. We found that the battery can be charged manifestly by a steady-state charge current compared to heat one, especially, in an off-resonant transport regime. It allows us to reliably access the performance of the quantum batteries in the high bias-charging regime.
△ Less
Submitted 8 March, 2023; v1 submitted 28 February, 2023;
originally announced February 2023.
-
The role of wetting on the flow of two immiscible fluids in porous media
Authors:
Armin Shahmardi,
Salar Zamani Salimi,
Outi Tammisola,
Luca Brandt,
Marco Edoardo Rosti
Abstract:
We study the role of the capillary number, $Ca$ and of the surface wettability on the dynamics of the interface between an invading and a defending phase in a porous medium by means of numerical simulations. We employ a hybrid phase field-immersed boundary approach to successfully model the contact line dynamics over the solid objects. Using a phase-field method which naturally incorporates dynami…
▽ More
We study the role of the capillary number, $Ca$ and of the surface wettability on the dynamics of the interface between an invading and a defending phase in a porous medium by means of numerical simulations. We employ a hybrid phase field-immersed boundary approach to successfully model the contact line dynamics over the solid objects. Using a phase-field method which naturally incorporates dynamic wetting we eliminate the need for empirical contact line models to address contact line singularity. We map the two dominant modes governing the motion of the interface, namely, capillary fingering, and stable penetration, in the ($Ca$-$θ$) plane, with $θ$ the static contact angle prescribed at the solid pores. Capillary fingering dominates at lower values of $Ca$ and pores hydrophobic to the invading phase, while a stable penetration is observed on hydrophillic surfaces. We present new measurements and analyses, including curvature probability density functions (pdf) and average curvature. We also show that the pressure needed for the invading phase to advance at constant flow rate decreases with the capillary number, and increases with the contact angle at the capillary numbers considered. The latter is due to a significant increase of the length of the interface in the case of capillary fingering. Finally, we show that it is possible to identify the different interfacial modes by measuring the penetration length and velocity during the medium filling.
△ Less
Submitted 30 May, 2024; v1 submitted 22 October, 2022;
originally announced October 2022.
-
UWB Role Allocation with Distributed Ledger Technologies for Scalable Relative Localization in Multi-Robot Systems
Authors:
Paola Torrico Morón,
Salma Salimi,
Jorge Peña Queralta,
Tomi Westerlund
Abstract:
Systems for relative localization in multi-robot systems based on ultra-wideband (UWB) ranging have recently emerged as robust solutions for GNSS-denied environments. Scalability remains one of the key challenges, particularly in ad-hoc deployments. Recent solutions include dynamic allocation of active and passive localization modes for different robots or nodes in the system. With larger-scale sy…
▽ More
Systems for relative localization in multi-robot systems based on ultra-wideband (UWB) ranging have recently emerged as robust solutions for GNSS-denied environments. Scalability remains one of the key challenges, particularly in ad-hoc deployments. Recent solutions include dynamic allocation of active and passive localization modes for different robots or nodes in the system. With larger-scale systems becoming more distributed, key research questions arise in the areas of security and trustability of such localization systems. This paper studies the potential integration of collaborative-decision making processes with distributed ledger technologies. Specifically, we investigate the design and implementation of a methodology for running an UWB role allocation algorithm within smart contracts in a blockchain. In previous works, we have separately studied the integration of ROS2 with the Hyperledger Fabric blockchain, and introduced a new algorithm for scalable UWB-based localization. In this paper, we extend these works by (i) running experiments with larger number of mobile robots switching between different spatial configurations and (ii) integrating the dynamic UWB role allocation algorithm into Fabric smart contracts for distributed decision-making in a system of multiple mobile robots. This enables us to deliver the same functionality within a secure and trustable process, with enhanced identity and data access management. Our results show the effectiveness of the UWB role allocation for continuously varying spatial formations of six autonomous mobile robots, while demonstrating a low impact on latency and computational resources of adding the blockchain layer that does not affect the localization process.
△ Less
Submitted 29 August, 2022;
originally announced August 2022.
-
Secure Heterogeneous Multi-Robot Collaboration and Docking with Hyperledger Fabric Blockchain
Authors:
Salma Salimi,
Paola Torrico Morón,
Jorge Peña Queralta,
Tomi Westerlund
Abstract:
In recent years, multi-robot systems have received increasing attention from both industry and academia. Besides the need of accurate and robust estimation of relative localization, security and trust in the system are essential to enable wider adoption. In this paper, we propose a framework using Hyperledger Fabric for multi-robot collaboration in industrial applications. We rely on blockchain id…
▽ More
In recent years, multi-robot systems have received increasing attention from both industry and academia. Besides the need of accurate and robust estimation of relative localization, security and trust in the system are essential to enable wider adoption. In this paper, we propose a framework using Hyperledger Fabric for multi-robot collaboration in industrial applications. We rely on blockchain identities for the interaction of ground and aerial robots, and use smart contracts for collaborative decision making. The use of ultra-wideband (UWB) localization for both autonomous navigation and robot collaboration extends our previous work in Fabric-based fleet management. We focus on an inventory management application which uses a ground robot and an aerial robot to inspect a warehouse-like environment and store information about the found objects in the blockchain. We measure the impact of adding the blockchain layer, analyze the transaction commit latency and compare the resource utilization of blockchain-related processes to the already running data processing modules.
△ Less
Submitted 30 June, 2022;
originally announced June 2022.
-
Hyperledger Fabric Blockchain and ROS 2 Integration for Autonomous Mobile Robots
Authors:
Salma Salimi,
Jorge Peña Queralta,
Tomi Westerlund
Abstract:
In industrial applications, security and trust in the system are requirements for widespread adoption. Blockchain technologies have emerged as a potential solution to address identity management and secure data aggregation and control. However, the vast majority of works to date utilize Ethereum and smart contracts that are not scalable or well suited for industrial applications. This paper presen…
▽ More
In industrial applications, security and trust in the system are requirements for widespread adoption. Blockchain technologies have emerged as a potential solution to address identity management and secure data aggregation and control. However, the vast majority of works to date utilize Ethereum and smart contracts that are not scalable or well suited for industrial applications. This paper presents what is, to the best of our knowledge, the first integration of ROS 2 with the Hyperledger Fabric blockchain. With a framework that leverages Fabric smart contracts and ROS 2 through a Go application, we delve into the potential of using blockchain for controlling robots, and gathering and processing their data. We demonstrate the applicability of the proposed framework to an inventory management use-case where different robots are used to detect objects of interest in a given area. Designed to meet the requirements of distributed robotic systems, we show that the performance of the robots is not impacted significantly by the blockchain layer. At the same time, we provide examples for develo** other applications that integrate Fabric smart contracts with ROS 2. Our results pave the way for further adoption of blockchain technologies in autonomous robotic systems for building trustable data sharing.
△ Less
Submitted 25 August, 2022; v1 submitted 7 March, 2022;
originally announced March 2022.
-
Generalized uncertainty relation between thermodynamic variables in quantum thermodynamics
Authors:
Z. Abuali,
F. H. Kamin,
R. J. S. Afonso,
D. O. Soares-Pinto,
S. Salimi
Abstract:
Macroscopic thermodynamics, via the weak coupling approximation, assumes that the equi?librium properties of a system are not affected by interactions with its environment. However, this assumption may not hold for quantum systems, where the strength of interaction between the system and the environment may become non-negligible in a strong coupling regime. In such a regime, the equilibrium proper…
▽ More
Macroscopic thermodynamics, via the weak coupling approximation, assumes that the equi?librium properties of a system are not affected by interactions with its environment. However, this assumption may not hold for quantum systems, where the strength of interaction between the system and the environment may become non-negligible in a strong coupling regime. In such a regime, the equilibrium properties of the system depend on the interaction energy and the system state is no longer of the Gibbs form. Regarding such interactions, using tools from the quantum estimation theory, we derive the thermodynamic uncertainty relation between intensive and exten?sive variables valid at all coupling regimes through the generalized Gibbs ensemble (GGE). Where we demonstrate the lower bound on the uncertainty of intensive variables increases in presence of quantum fluctuations. Also, we calculate the general uncertainty relations for several ensembles to corroborate the literature results, thus showing the versatility of our method.
△ Less
Submitted 20 May, 2023; v1 submitted 30 July, 2021;
originally announced July 2021.
-
Exergy of passive states: Waste energy after ergotropy extraction
Authors:
F. H. Kamin,
S. Salimi,
Alan C. Santos
Abstract:
Work extraction protocol is always a significant issue in the context of quantum batteries, in which the notion of ergotropy is used to quantify a particular amount of energy that can be extracted through unitary processes. Given the total amount of energy stored in a quantum system, quantifying wasted energy after the ergotropy extraction is a question to be considered when undesired coupling wit…
▽ More
Work extraction protocol is always a significant issue in the context of quantum batteries, in which the notion of ergotropy is used to quantify a particular amount of energy that can be extracted through unitary processes. Given the total amount of energy stored in a quantum system, quantifying wasted energy after the ergotropy extraction is a question to be considered when undesired coupling with thermal reservoirs is taken into account. In this paper, we show that some amount of energy can be lost when we extract ergotropy from a quantum system and quantified by the exergy of passive states. Through a particular example, one shows that ergotropy extraction can be done by preserving the quantum correlations of a quantum system. Our study opens the perspective for new advances in open system quantum batteries able to explore exergy stored as quantum correlations.
△ Less
Submitted 15 September, 2021; v1 submitted 5 July, 2021;
originally announced July 2021.
-
Quantum speed limit time for topological qubit influenced by fermionic and bosonic environment
Authors:
Soroush Haseli,
Hazhir Dolatkhah,
Shahriar Salimi
Abstract:
Quantum theory sets a limit on the minimum time required to transform from an initial state to a target state. It is known as quantum speed limit time. quantum speed limit time can be used to determine the rate of quantum evolution for closed and open quantum systems. Given that in the real world we are dealing with open quantum systems, the study of quantum speed limit time for such systems has p…
▽ More
Quantum theory sets a limit on the minimum time required to transform from an initial state to a target state. It is known as quantum speed limit time. quantum speed limit time can be used to determine the rate of quantum evolution for closed and open quantum systems. Given that in the real world we are dealing with open quantum systems, the study of quantum speed limit time for such systems has particular importance. In this work we consider the topological qubit realized by two Majorana modes. We consider the case in which the topological qubit is influenced by fermionic and bosonic environment. Fermionic and bosonic environments are assumed to have Ohmic-like spectral density. The quantum speed limit time is investigated for various environment with different Ohmic parameter. It is observed that for super-Ohmic environment with increasing Ohmic parameter the quantum speed limit time gradually reaches to a constant value and thus the speed of evolution reaches to a uniform value. The effects of external magnetic field on the evolution rate are also studied. It is observed that with increasing magnitude of magnetic field, the quantum speed limit time decreases
△ Less
Submitted 28 November, 2020;
originally announced November 2020.
-
The resource theory of coherence for quantum channels
Authors:
F. H. Kamin,
F. T. Tabesh,
S. Salimi,
F. Kheirandish
Abstract:
We define the quantum-incoherent relative entropy of coherence ($\mathcal{QI}$ REC) of quantum channels in the framework of the resource theory by using the Choi-Jamiolkowsky isomorphism. Coherence-breaking channels are introduced as free operations and their corresponding Choi states as free states. We also show the relationship between the coherence of channel and the quantum discord and find th…
▽ More
We define the quantum-incoherent relative entropy of coherence ($\mathcal{QI}$ REC) of quantum channels in the framework of the resource theory by using the Choi-Jamiolkowsky isomorphism. Coherence-breaking channels are introduced as free operations and their corresponding Choi states as free states. We also show the relationship between the coherence of channel and the quantum discord and find that basis-dependent quantum asymmetric discord can never be more than the $\mathcal{QI}$ REC for any quantum channels. {Also}, we prove the $\mathcal{QI}$ REC is decreasing for any divisible quantum incoherent channel and we also claim it can be considered as the quantumness of quantum channels. Moreover, we demonstrate that for qubit channels, the relative entropy of coherence (REC) can be equivalent to the REC of their corresponding Choi states and the basis-dependent quantum symmetric discord can never exceed the coherence.
△ Less
Submitted 27 June, 2020;
originally announced June 2020.
-
Entanglement, coherence and charging process of quantum batteries
Authors:
F. H. Kamin,
F. T. Tabesh,
S. Salimi,
Alan C. Santos
Abstract:
Quantum devices are systems that can explore quantum phenomena, like entanglement or coherence, for example, to provide some enhancement performance concerning their classical counterparts. In particular, quantum batteries are devices that use entanglement as main element in its high performance in the charging powerful. In this paper, we explore the quantum battery performance and its relationshi…
▽ More
Quantum devices are systems that can explore quantum phenomena, like entanglement or coherence, for example, to provide some enhancement performance concerning their classical counterparts. In particular, quantum batteries are devices that use entanglement as main element in its high performance in the charging powerful. In this paper, we explore the quantum battery performance and its relationship with the amount of entanglement that arises during the charging process. By using a general approach to a two and three-cell battery, our results suggest that entanglement is not the main resource to quantum batteries, where there is a non-trivial correlation-coherence trade-off as resource for the high efficiency of such quantum devices.
△ Less
Submitted 31 October, 2020; v1 submitted 18 June, 2020;
originally announced June 2020.
-
Entropic uncertainty relation in Garfinkle-Horowitz-Strominger dilation black hole
Authors:
Fariba Shahbazi,
Soroush Haseli,
Hazhir Dolatkhah,
Shahriar Salimi
Abstract:
Heisenberg's uncertainty principle is a fundamental element in quantum mechanics. It sets a bound on our ability to predict the measurement outcomes of two incompatible observables simultaneously. In quantum information theory, the uncertainty principle can be expressed using entropic measures. The entropic uncertainty relation can be improved by considering an additional particle as a memory part…
▽ More
Heisenberg's uncertainty principle is a fundamental element in quantum mechanics. It sets a bound on our ability to predict the measurement outcomes of two incompatible observables simultaneously. In quantum information theory, the uncertainty principle can be expressed using entropic measures. The entropic uncertainty relation can be improved by considering an additional particle as a memory particle. The presence of quantum correlation between the memory particle and the measured particle reduces the uncertainty. In a curved space-time, the presence of the Hawking radiation can reduce quantum correlation. Therefore, concerning the relationship between the quantum correlation and entropic uncertainty lower bound, we expect that the Hawking radiation increases the entropic uncertainty lower bound. In this work, we investigate the entropic uncertainty relation in Garfinkle-Horowitz-Strominger (GHS) dilation black hole. We consider a model in which the memory particle is located near the event horizon outside the black hole, while the measured particle is free falling. To study the proposed model, we will consider examples with Dirac fields. We also explore the effect of the Hawking radiation on the quantum secret key rate.
△ Less
Submitted 24 August, 2020; v1 submitted 5 June, 2020;
originally announced June 2020.
-
Environment-mediated charging process of quantum batteries
Authors:
F. T. Tabesh,
F. H. Kamin,
S. Salimi
Abstract:
We study the charging process of open quantum batteries mediated by a common dissipative environment in two different scenarios. In the first case, we consider a quantum charger-battery model in the presence of a non-Markovian environment. Where the battery can be properly charged in a strong coupling regime, without any external power and any direct interaction with the charger, i.e., a wireless-…
▽ More
We study the charging process of open quantum batteries mediated by a common dissipative environment in two different scenarios. In the first case, we consider a quantum charger-battery model in the presence of a non-Markovian environment. Where the battery can be properly charged in a strong coupling regime, without any external power and any direct interaction with the charger, i.e., a wireless-like charging happens. The environment plays a major role in the charging of the battery, while this does not happen in a weak coupling regime. In the second scenario, we show the effect of individual and collective spontaneous emission rates on the charging process of quantum batteries by considering a two-qubit system in the presence of Markovian dynamics. Our results demonstrate that open batteries can be satisfactorily charged in Markovian dynamics by employing an underdamped regime and/or strong external fields. We also present a robust battery by taking into account subradiant states and an intermediate regime. Moreover, we propose an experimental setup to explore the ergotropy in the first scenario.
△ Less
Submitted 27 November, 2020; v1 submitted 26 May, 2020;
originally announced May 2020.
-
Tightening the tripartite quantum memory assisted entropic uncertainty relation
Authors:
H. Dolatkhah,
S. Haseli,
S. Salimi,
A. S. Khorashad
Abstract:
The uncertainty principle determines the distinction between the classical and quantum worlds. This principle states that it is not possible to measure two incompatible observables with the desired accuracy simultaneously. In quantum information theory, Shannon entropy has been used as an appropriate measure to express the uncertainty relation. According to the applications of entropic uncertainty…
▽ More
The uncertainty principle determines the distinction between the classical and quantum worlds. This principle states that it is not possible to measure two incompatible observables with the desired accuracy simultaneously. In quantum information theory, Shannon entropy has been used as an appropriate measure to express the uncertainty relation. According to the applications of entropic uncertainty relation, studying and trying to improve the bound of this relation is of great importance. Uncertainty bound can be altered by considering an extra quantum system as the quantum memory $B$ which is correlated with the measured quantum system $A$. One can extend the bipartite quantum memory assisted entropic uncertainty relation to tripartite quantum memory assisted entropic uncertainty relation in which the memory is split into two parts. In this work, we obtain a lower bound for the tripartite quantum memory assisted entropic uncertainty relation. Our lower bound has two additional terms compared to the lower bound in [Phys. Rev. Lett. 103, 020402 (2009)] which depending on the conditional von Neumann entropy, the Holevo quantity and mutual information. It is shown that the bound obtained in this work is more tighter than other bounds. In addition, using our lower bound, a lower bound for the quantum secret key rate has been obtained. The lower bound is also used to obtain the states for which the strong subadditivity inequality and Koashi-Winter inequality is satisfied with equality.
△ Less
Submitted 14 June, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
Towards Scalable Security in Interference Channels With Arbitrary Number of Users
Authors:
Parisa Babaheidarian,
Somayeh Salimi,
Panos Papadimitratos
Abstract:
In this paper, we present an achievable security scheme for an interference channel with arbitrary number of users. In this model, each receiver should be able to decode its intended message while it cannot decode any meaningful information regarding messages intended for other receivers. Our scheme achieves individual secure rates which scale linearly with log(SNR) and achieves sum secure rates w…
▽ More
In this paper, we present an achievable security scheme for an interference channel with arbitrary number of users. In this model, each receiver should be able to decode its intended message while it cannot decode any meaningful information regarding messages intended for other receivers. Our scheme achieves individual secure rates which scale linearly with log(SNR) and achieves sum secure rates which is within constant gap of sum secure capacity. To design the encoders at the transmitters side, we combine nested lattice coding, random i.i.d. codes, and cooperative jamming techniques. Asymmetric compute-and-forward framework is used to perform the decoding operation at the receivers. The novelty of our scheme is that it is the first asymptotically optimal achievable scheme for this security scenario which scales to arbitrary number of users and works for any finite-valued SNR. Also, our scheme achieves the upper bound sum secure degrees of freedom of $1$ without using external helpers.
△ Less
Submitted 17 April, 2020; v1 submitted 14 April, 2020;
originally announced April 2020.
-
Bounds on charging power of open quantum batteries
Authors:
S. Zakavati,
F. T. Tabesh,
S. Salimi
Abstract:
In general, quantum systems most likely undergo open system dynamics due to their smallness and sensitivity. Energy storage devices, so-called quantum batteries, are not excluded from this phenomenon. Here, we study fundamental bounds on the power of open quantum batteries from the geometric point of view. By defining an \emph{activity operator}, a tight upper bound on the charging power is derive…
▽ More
In general, quantum systems most likely undergo open system dynamics due to their smallness and sensitivity. Energy storage devices, so-called quantum batteries, are not excluded from this phenomenon. Here, we study fundamental bounds on the power of open quantum batteries from the geometric point of view. By defining an \emph{activity operator}, a tight upper bound on the charging power is derived for the open quantum batteries in terms of the fluctuations of the activity operator and the quantum Fisher information. The variance of the activity operator may be interpreted as a generalized thermodynamic force, while the quantum Fisher information describes the speed of evolution in the state space of the battery. The thermodynamic interpretation of the upper bound is discussed in detail. As an example, a model for the battery, taking into account the environmental effects, is proposed, and the effect of dissipation and decoherence during the charging process on both the stored work and the charging power is investigated. Our results show that the upper bound is saturated in some time intervals. Also, the maximum value of both the stored work and the corresponding power is achieved in the non-Markovian underdamped regime.
△ Less
Submitted 21 October, 2021; v1 submitted 22 March, 2020;
originally announced March 2020.
-
No Entropy Production in Quantum Thermodynamics
Authors:
B. Ahmadi,
S. Salimi,
A. S. Khorashad
Abstract:
In this work we will show that there exists a fundamental difference between microscopic quantum thermodynamics and macroscopic classical thermodynamics. It will be proved that the entropy production in quantum thermodynamics always vanishes for both closed and open quantum thermodynamic systems. This novel and very surprising result is derived based on the genuine reasoning Clausius used to estab…
▽ More
In this work we will show that there exists a fundamental difference between microscopic quantum thermodynamics and macroscopic classical thermodynamics. It will be proved that the entropy production in quantum thermodynamics always vanishes for both closed and open quantum thermodynamic systems. This novel and very surprising result is derived based on the genuine reasoning Clausius used to establish the science of thermodynamics in the first place. This result will interestingly lead to define the generalized temperature for any non-equilibrium quantum system.
△ Less
Submitted 25 February, 2020;
originally announced February 2020.
-
On the contribution of work or heat in exchanged energy via interaction in open bipartite quantum systems
Authors:
B. Ahmadi,
S. Salimi,
A. S. Khorashad
Abstract:
In this paper, unambiguous redefinitions of heat and work are presented for quantum thermodynamic systems. We will use genuine reasoning based on which Clausius originally defined work and heat in establishing thermodynamics. The change in the energy which is accompanied by a change in the entropy is identified as heat, while any change in the energy which does not lead to a change in the entropy…
▽ More
In this paper, unambiguous redefinitions of heat and work are presented for quantum thermodynamic systems. We will use genuine reasoning based on which Clausius originally defined work and heat in establishing thermodynamics. The change in the energy which is accompanied by a change in the entropy is identified as heat, while any change in the energy which does not lead to a change in the entropy is known as work. It will be seen that quantum coherence does not allow all the energy exchanged between two quantum systems to be only of the heat form. Several examples will also be discussed. Finally, it will be shown that these refined definitions will strongly affect the entropy production of quantum thermodynamic processes giving new insight into the irreversibility of quantum processes.
△ Less
Submitted 14 March, 2023; v1 submitted 4 December, 2019;
originally announced December 2019.
-
Lower and upper bounds for unilateral coherence and applying them to the entropic uncertainty relations
Authors:
H. Dolatkhah,
S. Haseli,
S. Salimi,
A. s. Khorashad
Abstract:
The uncertainty principle sets a bound on our ability to predict the measurement outcomes of two incompatible observables which are measured on a quantum particle simultaneously. In quantum information theory, the uncertainty principle can be formulated in terms of the Shannon entropy. Entropic uncertainty bound can be improved by adding a particle which correlates with the measured particle. The…
▽ More
The uncertainty principle sets a bound on our ability to predict the measurement outcomes of two incompatible observables which are measured on a quantum particle simultaneously. In quantum information theory, the uncertainty principle can be formulated in terms of the Shannon entropy. Entropic uncertainty bound can be improved by adding a particle which correlates with the measured particle. The added particle acts as a quantum memory. In this work, a method is provided for obtaining the entropic uncertainty relations in the presence of a quantum memory by using quantum coherence. In the method, firstly, one can use the quantum relative entropy of quantum coherence to obtain the uncertainty relations. Secondly, these relations are applied to obtain the entropic uncertainty relations in the presence of a quantum memory. In comparison with other methods this approach is much simpler. Also, for a given state, the upper bounds on the sum of the relative entropies of unilateral coherences are provided, and it is shown which one is tighter. In addition, using the upper bound obtained for unilateral coherence, the nontrivial upper bound on the sum of the entropies for different observables is derived in the presence of a quantum memory.
△ Less
Submitted 1 December, 2019;
originally announced December 2019.
-
Non-Markovian effects on charging and self-discharging processes of quantum batteries
Authors:
F. H. Kamin,
F. T. Tabesh,
S. Salimi,
F. Kheirandish,
Alan C. Santos
Abstract:
The performance of quantum technologies that use entanglement and coherence as resource is highly limited by decohering effects due to their interaction with some environment. Particularly, it is important to take into account situations where such devices unavoidably interact with a surrounding. Here, we study memory effects on energy and ergotropy of quantum batteries in the framework of open sy…
▽ More
The performance of quantum technologies that use entanglement and coherence as resource is highly limited by decohering effects due to their interaction with some environment. Particularly, it is important to take into account situations where such devices unavoidably interact with a surrounding. Here, we study memory effects on energy and ergotropy of quantum batteries in the framework of open system dynamics, where the battery and charger are individually allowed to access a bosonic environment. Our investigation shows that the battery can be fully charged and its energy can be preserved for long times in non-Markovian dynamics compared with Markovian dynamics. In addition, the total stored energy can be completely extracted as work and discharge time becomes more longer as non-Markovianity increases. Our results indicate that memory effects can play a significant role in improving the performance of quantum batteries.
△ Less
Submitted 25 March, 2020; v1 submitted 17 October, 2019;
originally announced October 2019.
-
Control of quantum memory assisted entropic uncertainty lower bound for topological qubits in open quantum system through environment
Authors:
S. Haseli,
H. Dolatkhah,
H. Rangani Jahromi,
S. Salimi,
A. S. Khorashad
Abstract:
The uncertainty principle is one of the most important issues that clarify the distinction between classical and quantum theory. This principle sets a bound on our ability to predict the measurement outcome of two incompatible observables precisely. Uncertainty principle can be formulated via Shannon entropies of the probability distributions of measurement outcome of the two observables. It has s…
▽ More
The uncertainty principle is one of the most important issues that clarify the distinction between classical and quantum theory. This principle sets a bound on our ability to predict the measurement outcome of two incompatible observables precisely. Uncertainty principle can be formulated via Shannon entropies of the probability distributions of measurement outcome of the two observables. It has shown that the entopic uncertainty bound can be improved by considering an additional particle as the quantum memory $B$ which has correlation with the measured particle $A$. In this work we consider the memory assisted entropic uncertainty for the case in which the quantum memory and measured particle are topological qubits. In our scenario the topological quantum memory $B$, is considered as an open quantum system which interacts with its surrounding. The motivation for this model is associated with the fact that the basis of the memory-assisted entropic uncertainty relation is constructed on the correlation between quantum memory $B$ and measured particle $A$. In the sense that, Bob who holds the quantum memory $B$ can predict Alice's measurement results on particle $A$ more accurately, when the amount of correlation between $A$ and $B$ is great. Here, we want to find the influence of environmental effects on uncertainty bound while the quantum memory interacts with its surrounding. In this work we will consider Ohmic-like Fermionic and Bosonic environment. We have also investigate the effect of the Fermionic and Bosonic environment on the lower bounds of the amount of the key that can be extracted per state by Alice and Bob for quantum key distribution protocols.
△ Less
Submitted 23 July, 2019; v1 submitted 13 June, 2019;
originally announced June 2019.
-
Investigate the effects of the existence of correlation between two consecutive use of the quantum channel on quantum speed limit time
Authors:
N. Awasthi,
S. Haseli,
U. C Johri,
S. Salimi,
H. Dolatkhah,
A. S. Khorashad
Abstract:
Memory effects play an important role in the theory of open quantum systems. There are two completely independent insights about memory for quantum channels. In quantum information theory, the memory of the quantum channel is depicted by the correlations between consecutive uses of the channel on a set of quantum systems. In the theory of open quantum systems memory effects result from correlation…
▽ More
Memory effects play an important role in the theory of open quantum systems. There are two completely independent insights about memory for quantum channels. In quantum information theory, the memory of the quantum channel is depicted by the correlations between consecutive uses of the channel on a set of quantum systems. In the theory of open quantum systems memory effects result from correlations which are created during the quantum evolution. Here, we study the quantum speed limit time for correlated quantum channel i.e. when there exist correlation between consecutive uses of quantum channel . Quantum speed limit time is the bound on the minimal time evolution between initial and target states. It is apply for quantifying the maximum speed of quantum evolution. In this work, we will consider correlated pure dephasing colored noise as an example of unital quantum channels and correlated squeezed generalized amplitude dam** channel as an example of non-unital quantum channels. We evaluate the quantum speed limit time for these two channel. We find that regardless of whether the channel is unital or not, the quantum speed limit time is increased by increasing correlation between two consecutive uses of the channel.
△ Less
Submitted 29 May, 2019; v1 submitted 26 May, 2019;
originally announced May 2019.
-
Quantum speed limit time in the presence of disturbance
Authors:
S. Haseli,
S. Salimi,
H. Dolatkhah,
A. S. Khorashad
Abstract:
Quantum theory sets a bound on the minimal time evolution between initial and target states. This bound is called as quantum speed limit time. It is used to quantify maximal speed of quantum evolution. The quantum evolution will be faster, if quantum speed limit time decreases. In this work, we study the quantum speed limit time of a quantum state in the presence of disturbance effects in an envir…
▽ More
Quantum theory sets a bound on the minimal time evolution between initial and target states. This bound is called as quantum speed limit time. It is used to quantify maximal speed of quantum evolution. The quantum evolution will be faster, if quantum speed limit time decreases. In this work, we study the quantum speed limit time of a quantum state in the presence of disturbance effects in an environment. We use the model which is provided by Masashi Ban in \href{https://doi.org/10.1103/PhysRevA.99.012116}{Phys. Rev. A 99, 012116 (2019)}. In this model two quantum systems $\mathcal{A}$ and $\mathcal{S}$ interact with environment sequentially. At first, quantum system $\mathcal{A}$ interacts with the environment $\mathcal{E}$ as an auxiliary system then quantum system $\mathcal{S}$ interacts with disturbed environment immediately. In this work, we consider dephasing coupling with two types of environment with different spectral density: Ohmic and Lorentzian. We observe that, non-Markovian effects will be appear in the dynamics of quantum system $\mathcal{S}$ by the interaction of quantum system $\mathcal{A}$ with the environment. Given the fact that quantum speed limit time reduces due to non-Markovian effects, we show that disturbance effects will reduce the quantum speed limit time.
△ Less
Submitted 19 July, 2019; v1 submitted 25 April, 2019;
originally announced April 2019.
-
Quantum speed limit time for correlated quantum channel
Authors:
N. Awasthi,
S. Haseli,
U. C. Johri,
S. Salimi,
H. Dolatkhah,
A. S. Khorashad
Abstract:
Memory effects play a fundamental role in the dynamics of open quantum systems. There exist two different views on memory for quantum noises. In the first view, the quantum channel has memory when there exist correlations between successive uses of the channels on a sequence of quantum systems. These types of channels are also known as correlated quantum channels. In the second view, memory effect…
▽ More
Memory effects play a fundamental role in the dynamics of open quantum systems. There exist two different views on memory for quantum noises. In the first view, the quantum channel has memory when there exist correlations between successive uses of the channels on a sequence of quantum systems. These types of channels are also known as correlated quantum channels. In the second view, memory effects result from correlations which are created during the quantum evolution. In this work we will consider the first view and study the quantum speed limit time for a correlated quantum channel. Quantum speed limit time is the bound on the minimal time which is needed for a quantum system to evolve from an initial state to desired states. The quantum evolution is fast if the quantum speed limit time is short. In this work, we will study the quantum speed limit time for some correlated unital and correlated non-unital channels. As an example for unital channels we choose correlated dephasing colored noise. We also consider the correlated amplitude dam** and correlated squeezed generalized amplitude dam** channels as the examples for non-unital channels. It will be shown that the quantum speed limit time for correlated pure dephasing colored noise is increased by increasing correlation strength, while for correlated amplitude dam** and correlated squeezed generalized amplitude dam** channels quantum speed limit time is decreased by increasing correlation strength.
△ Less
Submitted 13 October, 2019; v1 submitted 25 January, 2019;
originally announced January 2019.
-
The entropy production of thermal operations
Authors:
H. Dolatkhah,
S. Salimi,
A. S. Khorashad,
S. Haseli
Abstract:
According to the first and second laws of thermodynamics and the definitions of work and heat, microscopic expressions for the non-equilibrium entropy production have been achieved. Recently, a redefinition of heat has been presented in [\href{Nature Communicationsvolume 8, Article number: 2180 (2017)}{Nat. Commun. 8, 2180 (2017)}]. We are going to determine how this redefinition of heat could aff…
▽ More
According to the first and second laws of thermodynamics and the definitions of work and heat, microscopic expressions for the non-equilibrium entropy production have been achieved. Recently, a redefinition of heat has been presented in [\href{Nature Communicationsvolume 8, Article number: 2180 (2017)}{Nat. Commun. 8, 2180 (2017)}]. We are going to determine how this redefinition of heat could affect the expression of the entropy production. Utilizing this new definition of heat, it could be found out that there is a new expression for the entropy production for thermal operations. It could be derived if the initial state of the system and the bath is factorized, and if the total entropy of composite system is preserved, then the new entropy production will be equal to mutual information between the system and the bath. It is shown that if the initial state of the system is diagonal in energy bases, then the thermal operations cannot create a quantum correlation between the system and the bath.
△ Less
Submitted 9 October, 2018;
originally announced October 2018.
-
Information and the second law of thermodynamics
Authors:
B. Ahmadi,
S. Salimi,
A. S. Khorashad
Abstract:
The second law of classical thermodynamics, based on the positivity of the entropy production, only holds for deterministic processes. Therefore the Second Law in stochastic quantum thermodynamics may not hold. By making a fundamental connection between thermodynamics and information theory we will introduce a new way of defining the Second Law which holds for both deterministic classical and stoc…
▽ More
The second law of classical thermodynamics, based on the positivity of the entropy production, only holds for deterministic processes. Therefore the Second Law in stochastic quantum thermodynamics may not hold. By making a fundamental connection between thermodynamics and information theory we will introduce a new way of defining the Second Law which holds for both deterministic classical and stochastic quantum thermodynamics. Our work incorporates information well into the Second Law and also provides a thermodynamic operational meaning for negative and positive entropy production.
△ Less
Submitted 13 November, 2019; v1 submitted 3 September, 2018;
originally announced September 2018.
-
Controlling the entropic uncertainty lower bound in two-qubit systems under the decoherence
Authors:
S. Haseli,
H. Dolatkhah,
S. Salimi,
A. S. Khorashad
Abstract:
The uncertainty principle is an inherent characteristic of quantum mechanics. This principle can be formulated in various form. Fundamentally, this principle can be expressed in terms of the standard deviation of the measured observables. In quantum information theory the preferred mathematical quantity to express the entropic uncertainty relation is the Shannon's entropy. In this work, we conside…
▽ More
The uncertainty principle is an inherent characteristic of quantum mechanics. This principle can be formulated in various form. Fundamentally, this principle can be expressed in terms of the standard deviation of the measured observables. In quantum information theory the preferred mathematical quantity to express the entropic uncertainty relation is the Shannon's entropy. In this work, we consider the generalized entropic uncertainty relation in which there is an additional particle as a quantum memory. Alice measures on her particle $A$ and Bob, with memory particle $B$, predicts the Alice's measurement outcomes. We study the effects of the environment on the entropic uncertainty lower bound in the presence of weak measurement and measurement reversal. The dynamical model that is intended in this work is as follows: First the weak measurement is performed, Second the decoherence affects on the system and at last the measurement reversal is performed on quantum system . Here we consider the generalized amplitude dam** channel and depolarizing channel as environmental noises. We will show that in the presence of weak measurement and measurement reversal, despite the presence of environmental factors, the entropic uncertainty lower bound dropped to an optimal minimum value. In fact, weak measurement and measurement reversal enhance the quantum correlation between the subsystems $A$ and $B$ thus the uncertainty of Bob about Alice's measurement outcomes reduces.
△ Less
Submitted 23 December, 2018; v1 submitted 5 August, 2018;
originally announced August 2018.
-
Tightening the entropic uncertainty relations for multiple measurements and applying it to quantum coherence
Authors:
H. Dolatkhah,
S. Haseli,
S. Salimi,
S. A. Khorashad
Abstract:
The uncertainty principle sets limit on our ability to predict the values of two incompatible observables measured on a quantum particle simultaneously. This principle can be stated in various forms. In quantum information theory, it is expressed in terms of the entropic measures. Uncertainty bound can be altered by considering a particle as a quantum memory correlating with the primary particle.…
▽ More
The uncertainty principle sets limit on our ability to predict the values of two incompatible observables measured on a quantum particle simultaneously. This principle can be stated in various forms. In quantum information theory, it is expressed in terms of the entropic measures. Uncertainty bound can be altered by considering a particle as a quantum memory correlating with the primary particle. In this work, we provide a method for converting the entropic uncertainty relation in the absence of quantum memory to that in its presence. It is shown that the lower bounds obtained through the method are tighter than those having been achieved so far. The method is also used to obtain the uncertainty relations for multiple measurements in the presence of quantum memory. Also for a given state, the lower bounds on the sum of the relative entropies of unilateral coherences are provided using the uncertainty relations in the presence of quantum memory, and it is shown which one is tighter.
△ Less
Submitted 26 September, 2018; v1 submitted 17 May, 2018;
originally announced May 2018.
-
Sequential Detection of Deception Attacks in Networked Control Systems with Watermarking
Authors:
Somayeh Salimi,
Subhrakanti Dey,
Anders Ahlen
Abstract:
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a deception attack in a scalar linear control system where the sensor measurements can be replaced by an arbitrary stationary signal generated by an attacker. By adding a random watermarking signal to the control action, the controller designs a sequential test based on a Cumulative Sum (CUSUM) method…
▽ More
In this paper, we investigate the role of a physical watermarking signal in quickest detection of a deception attack in a scalar linear control system where the sensor measurements can be replaced by an arbitrary stationary signal generated by an attacker. By adding a random watermarking signal to the control action, the controller designs a sequential test based on a Cumulative Sum (CUSUM) method that accumulates the log-likelihood ratio of the joint distribution of the residue and the watermarking signal (under attack) and the joint distribution of the innovations and the watermarking signal under no attack. As the average detection delay in such tests is asymptotically (as the false alarm rate goes to zero) upper bounded by a quantity inversely proportional to the Kullback-Leibler divergence(KLD) measure between the two joint distributions mentioned above, we analyze the effect of the watermarking signal variance on the above KLD. We also analyze the increase in the LQG control cost due to the watermarking signal, and show that there is a tradeoff between quick detection of attacks and the penalty in the control cost. It is shown that by considering a sequential detection test based on the joint distributions of residue/innovations and the watermarking signal, as opposed to the distributions of the residue/innovations only, we can achieve a higher KLD, thus resulting in a reduced average detection delay. Numerical results are provided to support our claims.
△ Less
Submitted 28 February, 2018;
originally announced March 2018.
-
Quantum Thermodynamic Force and Flow
Authors:
B. Ahmadi,
S. Salimi,
F. Kheirandish,
A. S. Khorashad
Abstract:
Why do quantum evolutions occur and why do they stop at certain points? In classical thermodynamics affinity was introduced to predict in which direction an irreversible process proceeds. In this paper the quantum mechanical counterpart of classical affinity is found. It is shown that the quantum version of affinity can predict in which direction a process evolves. A new version of the second law…
▽ More
Why do quantum evolutions occur and why do they stop at certain points? In classical thermodynamics affinity was introduced to predict in which direction an irreversible process proceeds. In this paper the quantum mechanical counterpart of classical affinity is found. It is shown that the quantum version of affinity can predict in which direction a process evolves. A new version of the second law of thermodynamics is derived through quantum affinity for energy-incoherent state interconversion under thermal operations. we will also see that the quantum affinity can be a good candidate to be responsible, as a force, for driving the flow and backflow of information in Markovian and non-Markovian evolutions. Finally we show that the rate of quantum coherence can be interpreted as the pure quantum mechanical contribution of the total thermodynamic force and flow. Thus It is seen that, from a thermodynamic point of view, any interaction from the outside with the system or any measurement on the system may be represented by a quantum affinity.
△ Less
Submitted 9 December, 2018; v1 submitted 27 February, 2018;
originally announced February 2018.
-
Estimating phase with a random generator: Strategies and resources in multiparameter quantum metrology
Authors:
Rozhin Yousefjani,
Rosanna Nichols,
Shahriar Salimi,
Gerardo Adesso
Abstract:
Quantum metrology aims to exploit quantum phenomena to overcome classical limitations in the estimation of relevant parameters. We consider a probe undergoing a phase shift $\varphi$ whose generator is randomly sampled according to a distribution with unknown concentration $κ$, which introduces a physical source of noise. We then investigate strategies for the joint estimation of the two parameter…
▽ More
Quantum metrology aims to exploit quantum phenomena to overcome classical limitations in the estimation of relevant parameters. We consider a probe undergoing a phase shift $\varphi$ whose generator is randomly sampled according to a distribution with unknown concentration $κ$, which introduces a physical source of noise. We then investigate strategies for the joint estimation of the two parameters $\varphi$ and $κ$ given a finite number $N$ of interactions with the phase imprinting channel. We consider both single qubit and multipartite entangled probes, and identify regions of the parameters where simultaneous estimation is advantageous, resulting in up to a twofold reduction in resources. Quantum enhanced precision is achievable at moderate $N$, while for sufficiently large $N$ classical strategies take over and the precision follows the standard quantum limit. We show that full-scale entanglement is not needed to reach such an enhancement, as efficient strategies using significantly fewer qubits in a scheme interpolating between the conventional sequential and parallel metrological schemes yield the same effective performance. These results may have relevant applications in optimization of sensing technologies.
△ Less
Submitted 17 May, 2017; v1 submitted 3 April, 2017;
originally announced April 2017.
-
Time-invariant Discord: High Temperature Limit and Initial Environmental Correlations
Authors:
F. T. Tabesh,
G. Karpat,
S. Maniscalco,
S. Salimi,
A. S. Khorashad
Abstract:
We present a thorough investigation of the phenomena of frozen and time-invariant quantum discord for two-qubit systems independently interacting with local reservoirs. Our work takes into account several significant effects present in decoherence models, which have not been yet explored in the context of time-invariant quantum discord, but which in fact must be typically considered in almost all…
▽ More
We present a thorough investigation of the phenomena of frozen and time-invariant quantum discord for two-qubit systems independently interacting with local reservoirs. Our work takes into account several significant effects present in decoherence models, which have not been yet explored in the context of time-invariant quantum discord, but which in fact must be typically considered in almost all realistic models. Firstly, we study the combined influence of dephasing, dissipation and heating reservoirs at finite temperature. Contrarily to previous claims in the literature, we show the existence of time-invariant discord at high temperature limit in the weak coupling regime, and also examine the effect of thermal photons on the dynamical behaviour of frozen discord. Secondly, we explore the consequences of having initial correlations between the dephasing reservoirs. We demonstrate in detail how the time-invariant discord is modified depending on the relevant system parameters such as the strength of the initial amount of entanglement between the reservoirs.
△ Less
Submitted 28 March, 2017;
originally announced March 2017.
-
Preserving Confidentiality in The Gaussian Broadcast Channel Using Compute-and-Forward
Authors:
Parisa Babaheidarian,
Somayeh Salimi,
Panos Papadimitratos
Abstract:
We study the transmission of confidential messages across a wireless broadcast channel with K>2 receivers and K helpers. The goal is to transmit all messages reliably to their intended receivers while kee** them confidential from the unintended receivers. We design a codebook based on nested lattice structure, cooperative jamming, lattice alignment, and i.i.d. coding. Moreover, we exploit the as…
▽ More
We study the transmission of confidential messages across a wireless broadcast channel with K>2 receivers and K helpers. The goal is to transmit all messages reliably to their intended receivers while kee** them confidential from the unintended receivers. We design a codebook based on nested lattice structure, cooperative jamming, lattice alignment, and i.i.d. coding. Moreover, we exploit the asymmetric compute-and-forward decoding strategy to handle finite SNR regimes. Unlike previous alignment schemes, our achievable rates are attainable at any finite SNR value. Also, we show that our scheme achieves the optimal sum secure degrees of freedom of 1 for the K-receiver Gaussian broadcast channel with K confidential messages and K helpers.
△ Less
Submitted 3 March, 2017;
originally announced March 2017.
-
Witness for initial correlations among environments
Authors:
F. T. Tabesh,
S. Salimi,
A. S. Khorashad
Abstract:
A quantum system inevitably interacts with its surroundings. In general, one does not have detailed information on an environment. Identifying the environmental features can help us to control the environment and its effects on the dynamics of an open system. Here, we consider a tripartite system and introduce a witness for the initial correlations among environments by means of the concept of the…
▽ More
A quantum system inevitably interacts with its surroundings. In general, one does not have detailed information on an environment. Identifying the environmental features can help us to control the environment and its effects on the dynamics of an open system. Here, we consider a tripartite system and introduce a witness for the initial correlations among environments by means of the concept of the trace distance. Due to the existence of the initial environmental correlations, a tight upper bound is obtained for the growth of the trace distance of open quantum system states. Therefore, the initial correlations among the environments subject to particular conditions can be detected by measurements on the open system.
△ Less
Submitted 13 May, 2017; v1 submitted 7 November, 2016;
originally announced November 2016.
-
Reducing the entropic uncertainty lower bound in the presence of quantum memory via local operation and classical communication
Authors:
F. Adabi,
S. Haseli,
S. Salimi
Abstract:
The uncertainty principle sets lower bound on the uncertainties of two incompatible observables measured on a particle. The uncertainty lower bound can be reduced by considering a particle as a quantum memory entangled with the measured particle. In this paper, we consider a tripartite scenario in which a quantum state has been shared between Alice, Bob, and Charlie. The aim of Bob and Charlie is…
▽ More
The uncertainty principle sets lower bound on the uncertainties of two incompatible observables measured on a particle. The uncertainty lower bound can be reduced by considering a particle as a quantum memory entangled with the measured particle. In this paper, we consider a tripartite scenario in which a quantum state has been shared between Alice, Bob, and Charlie. The aim of Bob and Charlie is to minimize Charlie's lower bound about Alice's measurement outcomes. To this aim, they concentrate their correlation with Alice in Charlie's side via a cooperative strategy based on local operations and classical communication. We obtain lower bound for Charlie's uncertainty about Alice's measurement outcomes after concentrating information and compare it with the lower bound without concentrating information in some examples. We also provide a physical interpretation of the entropic uncertainty lower bound based on the dense coding capacity.
△ Less
Submitted 20 June, 2016;
originally announced June 2016.
-
Security in The Gaussian Interference Channel: Weak and Moderately Weak Interference Regimes
Authors:
Parisa Babaheidarian,
Somayeh Salimi,
Panos Papadimitratos
Abstract:
We consider a secure communication scenario through the two-user Gaussian interference channel: each transmitter (user) has a confidential message to send reliably to its intended receiver while kee** it secret from the other receiver. Prior work investigated the performance of two different approaches for this scenario; i.i.d. Gaussian random codes and real alignment of structured codes. While…
▽ More
We consider a secure communication scenario through the two-user Gaussian interference channel: each transmitter (user) has a confidential message to send reliably to its intended receiver while kee** it secret from the other receiver. Prior work investigated the performance of two different approaches for this scenario; i.i.d. Gaussian random codes and real alignment of structured codes. While the latter achieves the optimal sum secure degrees of freedom (s.d.o.f.), its extension to finite SNR regimes is challenging. In this paper, we propose a new achievability scheme for the weak and the moderately weak interference regimes, in which the reliability as well as the confidentiality of the transmitted messages are maintained at any finite SNR value. Our scheme uses lattice structure, structured jamming codewords, and lattice alignment in the encoding and the asymmetric compute-and-forward strategy in the decoding. We show that our lower bound on the sum secure rates scales linearly with log(SNR) and hence, it outperforms i.i.d. Gaussian random codes. Furthermore, we show that our achievable result is asymptotically optimal. Finally, we provide a discussion on an extension of our scheme to K>2 users.
△ Less
Submitted 25 April, 2016;
originally announced April 2016.
-
Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel
Authors:
Somayeh Salimi,
Matthieu Bloch,
Frederic Gabry,
Mikael Skoglund,
Panos Papadimitratos
Abstract:
This paper considers the problem of pairwise key agreement without public communication between three users connected through a generalized multiple access channel (MAC). While two users control the channel inputs, all three users observe noisy outputs from the channel and each pair of users wishes to agree on a secret key hidden from the remaining user. We first develop a "pre-generated" key-agre…
▽ More
This paper considers the problem of pairwise key agreement without public communication between three users connected through a generalized multiple access channel (MAC). While two users control the channel inputs, all three users observe noisy outputs from the channel and each pair of users wishes to agree on a secret key hidden from the remaining user. We first develop a "pre-generated" key-agreement scheme based on secrecy codes for the generalized MAC, in which the channel is only used to distribute pre-generated secret keys. We then extend this scheme to include an additional layer of rate-limited secret-key generation by treating the observed channel outputs as induced sources. We characterize inner and outer bounds on the strong secret-key capacity region for both schemes. For a special case of the "pre-generated" scheme, we obtain an exact characterization. We also illustrate with some binary examples that exploiting the generalized nature of the generalized MAC may lead to significantly larger key-agreement rates.
△ Less
Submitted 17 March, 2016;
originally announced March 2016.
-
Tightening the entropic uncertainty bound in the presence of quantum memory
Authors:
F. Adabi,
S. Salimi,
S. Haseli
Abstract:
The uncertainty principle is a fundamental principle in quantum physics. It implies that the measurement outcomes of two incompatible observables can not be predicted simultaneously. In quantum information theory, this principle can be expressed in terms of entropic measures. Berta \emph{et al}. [\href{http://www.nature.com/doifinder/10.1038/nphys1734}{ Nature Phys. 6, 659 (2010) }] have indicated…
▽ More
The uncertainty principle is a fundamental principle in quantum physics. It implies that the measurement outcomes of two incompatible observables can not be predicted simultaneously. In quantum information theory, this principle can be expressed in terms of entropic measures. Berta \emph{et al}. [\href{http://www.nature.com/doifinder/10.1038/nphys1734}{ Nature Phys. 6, 659 (2010) }] have indicated that uncertainty bound can be altered by considering a particle as a quantum memory correlating with the primary particle. In this article, we obtain a lower bound for entropic uncertainty in the presence of a quantum memory by adding an additional term depending on Holevo quantity and mutual information. We conclude that our lower bound will be tighten with respect to that of Berta \emph{et al.}, when the accessible information about measurements outcomes is less than the mutual information of the joint state. Some examples have been investigated for which our lower bound is tighter than the Berta's \emph{et al.} lower bound. Using our lower bound, a lower bound for the entanglement of formation of bipartite quantum states has obtained, as well as an upper bound for the regularized distillable common randomness.
△ Less
Submitted 20 June, 2016; v1 submitted 13 February, 2016;
originally announced February 2016.
-
Noisy Metrology: A saturable lower bound on quantum Fisher information
Authors:
R. Yousefjani,
S. Salimi,
A. S. Khorashad
Abstract:
In order to provide a guaranteed precision and a more accurate judgement about the true value of the Cramér-Rao bound and its scaling behavior, an upper bound (equivalently a lower bound on the quantum Fisher information) for precision of estimation is introduced. Unlike the bounds previously introduced in the literature, the upper bound is saturable and yields a practical instruction to estimate…
▽ More
In order to provide a guaranteed precision and a more accurate judgement about the true value of the Cramér-Rao bound and its scaling behavior, an upper bound (equivalently a lower bound on the quantum Fisher information) for precision of estimation is introduced. Unlike the bounds previously introduced in the literature, the upper bound is saturable and yields a practical instruction to estimate the parameter through preparing the optimal initial state and optimal measurement. The bound is based on the underling dynamics and its calculation is straightforward and requires only the matrix representation of the quantum maps responsible for encoding the parameter. This allows us to apply the bound to open quantum systems whose dynamics are described by either semigroup or non-semigroup maps. Reliability and efficiency of the method to predict the ultimate precision limit are demonstrated by {three} main examples.
△ Less
Submitted 18 April, 2017; v1 submitted 4 February, 2016;
originally announced February 2016.
-
Key Agreement over an Interference Channel with Noiseless Feedback: Achievable Region & Distributed Allocation
Authors:
Somayeh Salimi,
Eduard A. Jorswieck,
Mikael Skoglund,
Panos Papadimitratos
Abstract:
Secret key establishment leveraging the physical layer as a source of common randomness has been investigated in a range of settings. We investigate the problem of establishing, in an information-theoretic sense, a secret key between a user and a base-station (BS) (more generally, part of a wireless infrastructure), but for two such user-BS pairs attempting the key establishment simultaneously. Th…
▽ More
Secret key establishment leveraging the physical layer as a source of common randomness has been investigated in a range of settings. We investigate the problem of establishing, in an information-theoretic sense, a secret key between a user and a base-station (BS) (more generally, part of a wireless infrastructure), but for two such user-BS pairs attempting the key establishment simultaneously. The challenge in this novel setting lies in that a user can eavesdrop another BS-user communications. It is thus paramount to ensure the two keys are established with no leakage to the other user, in spite the interference across neighboring cells. We model the system with BS-user communication through an interference channel and user-BS communication through a public channel. We find the region including achievable secret key rates for the general case that the interference channel (IC) is discrete and memoryless. Our results are examined for a Gaussian IC. In this setup, we investigate the performance of different transmission schemes for power allocation. The chosen transmission scheme by each BS essentially affects the secret key rate of the other BS-user. Assuming base stations are trustworthy but that they seek to maximize the corresponding secret key rate, a game-theoretic setting arises to analyze the interaction between the base stations.We model our key agreement scenario in normal form for different power allocation schemes to understand performance without cooperation. Numerical simulations illustrate the inefficiency of the Nash equilibrium outcome and motivate further research on cooperative or coordinated schemes.
△ Less
Submitted 29 December, 2015;
originally announced December 2015.
-
Pairwise Secret Key Agreement based on Location-derived Common Randomness
Authors:
Somayeh Salimi,
Panos Papadimitratos
Abstract:
A source model of key sharing between three users is considered in which each pair of them wishes to agree on a secret key hidden from the remaining user. There are rate-limited public channels for communications between the users. We give an inner bound on the secret key capacity region in this framework. Moreover, we investigate a practical setup in which localization information of the users as…
▽ More
A source model of key sharing between three users is considered in which each pair of them wishes to agree on a secret key hidden from the remaining user. There are rate-limited public channels for communications between the users. We give an inner bound on the secret key capacity region in this framework. Moreover, we investigate a practical setup in which localization information of the users as the correlated observations are exploited to share pairwise keys between the users. The inner and outer bounds of the key capacity region are analyzed in this setup for the case of i.i.d. Gaussian observations.
△ Less
Submitted 29 December, 2015;
originally announced December 2015.
-
Finite-SNR Regime Analysis of The Gaussian Wiretap Multiple-Access Channel
Authors:
Parisa Babaheidarian,
Somayeh Salimi,
Panos Papadimitratos
Abstract:
In this work, we consider a K-user Gaussian wiretap multiple-access channel (GW-MAC) in which each transmitter has an independent confidential message for the receiver. There is also an external eavesdropper who intercepts the communications. The goal is to transmit the messages reliably while kee** them confidential from the eavesdropper. To accomplish this goal, two different approaches have b…
▽ More
In this work, we consider a K-user Gaussian wiretap multiple-access channel (GW-MAC) in which each transmitter has an independent confidential message for the receiver. There is also an external eavesdropper who intercepts the communications. The goal is to transmit the messages reliably while kee** them confidential from the eavesdropper. To accomplish this goal, two different approaches have been proposed in prior works, namely, i.i.d. Gaussian random coding and real alignment. However, the former approach fails at moderate and high SNR regimes as its achievable result does not grow with SNR. On the other hand, while the latter approach gives a promising result at the infinite SNR regime, its extension to the finite-SNR regime is a challenging task. To fill the gap between the performance of the existing approaches, in this work, we establish a new scheme in which, at the receiver's side, it utilizes an extension of the compute-and-forward decoding strategy and at the transmitters' side it exploits lattice alignment, cooperative jamming, and i.i.d. random codes. For the proposed scheme, we derive a new achievable bound on sum secure rate which scales with log(SNR) and hence it outperforms the i.i.d. Gaussian codes in moderate and high SNR regimes. We evaluate the performance of our scheme, both theoretically and numerically. Furthermore, we show that our sum secure rate achieves the optimal sum secure degrees of freedom in the infinite-SNR regime.
△ Less
Submitted 5 October, 2015;
originally announced October 2015.
-
Dynamics of Entanglement and Nonclassical Correlation for Four-Qubit GHZ State
Authors:
P. Espoukeh,
R. Rahimi,
S. Salimi,
P. Pedram
Abstract:
Many-qubit entanglement is crucial for quantum information processing although its exploitation is hindered by the detrimental effects of the environment surrounding the many-qubit system. It is thus of importance to study the dynamics of general multipartite nonclassical correlation, including but not restricted to entanglement, under noise. We did this study for four-qubit GHZ state under most c…
▽ More
Many-qubit entanglement is crucial for quantum information processing although its exploitation is hindered by the detrimental effects of the environment surrounding the many-qubit system. It is thus of importance to study the dynamics of general multipartite nonclassical correlation, including but not restricted to entanglement, under noise. We did this study for four-qubit GHZ state under most common noises in an experiment and found that nonclassical correlation is more robust than entanglement except when it is imposed to dephasing channel. Quantum discord presents a sudden transition in its dynamics for Pauli-X and Pauli-Y noises as well as Bell-diagonal states interacting with dephasing reservoirs and it decays monotonically for Pauli-Z and isotropic noises.
△ Less
Submitted 21 September, 2015;
originally announced September 2015.
-
Enhancement of Frequency Estimation by Spatially Correlated Environments
Authors:
R. Yousefjani,
S. Salimi,
A. S. Khorashad
Abstract:
In metrological tasks, employing entanglement can quantitatively improve the precision of parameter estimation. However, susceptibility of the entanglement to decoherence fades this capability in the realistic metrology and limits ultimate quantum improvement. One of the most destructive decoherence-type noise is uncorrelated Markovian noise which commutes with the parameter-encoding Hamiltonian a…
▽ More
In metrological tasks, employing entanglement can quantitatively improve the precision of parameter estimation. However, susceptibility of the entanglement to decoherence fades this capability in the realistic metrology and limits ultimate quantum improvement. One of the most destructive decoherence-type noise is uncorrelated Markovian noise which commutes with the parameter-encoding Hamiltonian and is modelled as a semigroup dynamics, for which the quantum improvement is constrained to a constant factor. It has been shown [Phys. Rev. Lett. \textbf{109}, 233601 (2012)] that when the noisy time evolution is governed by a local and non-semigroup dynamics (e.g., induced by an uncorrelated non-Markovian dephasing), emerging the Zeno regime at short times can result in the Zeno scaling in the precision. Here, by considering the impact of the correlated noise in metrology, we show that spatially correlated environments which lead to a nonlocal and non-semigroup dynamics can improve the precision of a noisy frequency measurement beyond the Zeno scaling. In particular, it is demonstrated that one can find decoherence-free subspaces and subsequently achieve the Heisenberg precision scaling for an approximated dynamics induced by spatially correlated environments.
△ Less
Submitted 18 April, 2017; v1 submitted 9 August, 2015;
originally announced August 2015.
-
Secure Partial Repair in Wireless Caching Networks with Broadcast Channels
Authors:
Majid Gerami,
Ming Xiao,
Somayeh Salimi,
Mikael Skoglund
Abstract:
We study security in partial repair in wireless caching networks where parts of the stored packets in the caching nodes are susceptible to be erased. Let us denote a caching node that has lost parts of its stored packets as a sick caching node and a caching node that has not lost any packet as a healthy caching node. In partial repair, a set of caching nodes (among sick and healthy caching nodes)…
▽ More
We study security in partial repair in wireless caching networks where parts of the stored packets in the caching nodes are susceptible to be erased. Let us denote a caching node that has lost parts of its stored packets as a sick caching node and a caching node that has not lost any packet as a healthy caching node. In partial repair, a set of caching nodes (among sick and healthy caching nodes) broadcast information to other sick caching nodes to recover the erased packets. The broadcast information from a caching node is assumed to be received without any error by all other caching nodes. All the sick caching nodes then are able to recover their erased packets, while using the broadcast information and the nonerased packets in their storage as side information. In this setting, if an eavesdropper overhears the broadcast channels, it might obtain some information about the stored file. We thus study secure partial repair in the senses of information-theoretically strong and weak security. In both senses, we investigate the secrecy caching capacity, namely, the maximum amount of information which can be stored in the caching network such that there is no leakage of information during a partial repair process. We then deduce the strong and weak secrecy caching capacities, and also derive the sufficient finite field sizes for achieving the capacities. Finally, we propose optimal secure codes for exact partial repair, in which the recovered packets are exactly the same as erased packets.
△ Less
Submitted 20 July, 2015;
originally announced July 2015.
-
Compute-and-Forward Can Buy Secrecy Cheap
Authors:
Parisa Babaheidarian,
Somayeh Salimi
Abstract:
We consider a Gaussian multiple access channel with $K$ transmitters, a (intended) receiver and an external eavesdropper. The transmitters wish to reliably communicate with the receiver while concealing their messages from the eavesdropper. This scenario has been investigated in prior works using two different coding techniques; the random i.i.d. Gaussian coding and the signal alignment coding. Al…
▽ More
We consider a Gaussian multiple access channel with $K$ transmitters, a (intended) receiver and an external eavesdropper. The transmitters wish to reliably communicate with the receiver while concealing their messages from the eavesdropper. This scenario has been investigated in prior works using two different coding techniques; the random i.i.d. Gaussian coding and the signal alignment coding. Although, the latter offers promising results in a very high SNR regime, extending these results to the finite SNR regime is a challenging task. In this paper, we propose a new lattice alignment scheme based on the compute-and-forward framework which works at any finite SNR. We show that our achievable secure sum rate scales with $\log(\mathrm{SNR})$ and hence, in most SNR regimes, our scheme outperforms the random coding scheme in which the secure sum rate does not grow with power. Furthermore, we show that our result matches the prior work in the infinite SNR regime. Additionally, we analyze our result numerically.
△ Less
Submitted 22 April, 2015;
originally announced April 2015.
-
The role of the total entropy production in dynamics of open quantum systems in detection of non-Markovianity
Authors:
S. Salimi,
S. Haseli,
A. S. Khorashad
Abstract:
In the theory of open quantum systems interaction is a fundamental concepts in the review of the dynamics of open quantum systems. Correlation, both classical and quantum one, is generated due to interaction between system and environment. Here, we recall the quantity which well known as total entropy production. Appearance of total entropy production is due to the entanglement production between…
▽ More
In the theory of open quantum systems interaction is a fundamental concepts in the review of the dynamics of open quantum systems. Correlation, both classical and quantum one, is generated due to interaction between system and environment. Here, we recall the quantity which well known as total entropy production. Appearance of total entropy production is due to the entanglement production between system an environment. In this work, we discuss about the role of the total entropy production for detecting non-Markovianity. By utilizing the relation between total entropy production and total correlation between subsystems, one can see a temporary decrease of total entropy production is a signature of non-Markovianity.
△ Less
Submitted 19 April, 2015;
originally announced April 2015.
-
The CEO Problem with Secrecy Constraints
Authors:
Farshad Naghibi,
Somayeh Salimi,
Mikael Skoglund
Abstract:
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to the destination via noiseless rate-limited links. The destination should estimate…
▽ More
We study a lossy source coding problem with secrecy constraints in which a remote information source should be transmitted to a single destination via multiple agents in the presence of a passive eavesdropper. The agents observe noisy versions of the source and independently encode and transmit their observations to the destination via noiseless rate-limited links. The destination should estimate the remote source based on the information received from the agents within a certain mean distortion threshold. The eavesdropper, with access to side information correlated to the source, is able to listen in on one of the links from the agents to the destination in order to obtain as much information as possible about the source. This problem can be viewed as the so-called CEO problem with additional secrecy constraints. We establish inner and outer bounds on the rate-distortion-equivocation region of this problem. We also obtain the region in special cases where the bounds are tight. Furthermore, we study the quadratic Gaussian case and provide the optimal rate-distortion-equivocation region when the eavesdropper has no side information and an achievable region for a more general setup with side information at the eavesdropper.
△ Less
Submitted 11 February, 2015;
originally announced February 2015.