-
A New Class of Algorithms for Finding Short Vectors in Lattices Lifted from Co-dimension $k$ Codes
Authors:
Robert Lin,
Peter W. Shor
Abstract:
We introduce a new class of algorithms for finding a short vector in lattices defined by codes of co-dimension $k$ over $\mathbb{Z}_P^d$, where $P$ is prime. The co-dimension $1$ case is solved by exploiting the packing properties of the projections mod $P$ of an initial set of non-lattice vectors onto a single dual codeword. The technical tools we introduce are sorting of the projections followed…
▽ More
We introduce a new class of algorithms for finding a short vector in lattices defined by codes of co-dimension $k$ over $\mathbb{Z}_P^d$, where $P$ is prime. The co-dimension $1$ case is solved by exploiting the packing properties of the projections mod $P$ of an initial set of non-lattice vectors onto a single dual codeword. The technical tools we introduce are sorting of the projections followed by single-step pairwise Euclidean reduction of the projections, resulting in monotonic convergence of the positive-valued projections to zero. The length of vectors grows by a geometric factor each iteration. For fixed $P$ and $d$, and large enough user-defined input sets, we show that it is possible to minimize the number of iterations, and thus the overall length expansion factor, to obtain a short lattice vector. Thus we obtain a novel approach for controlling the output length, which resolves an open problem posed by Noah Stephens-Davidowitz (the possibility of an approximation scheme for the shortest-vector problem (SVP) which does not reduce to near-exact SVP). In our approach, one may obtain short vectors even when the lattice dimension is quite large, e.g., 8000. For fixed $P$, the algorithm yields shorter vectors for larger $d$. We additionally present a number of extensions and generalizations of our fundamental co-dimension $1$ method. These include a method for obtaining many different lattice vectors by multiplying the dual codeword by an integer and then modding by $P$; a co-dimension $k$ generalization; a large input set generalization; and finally, a "block" generalization, which involves the replacement of pairwise (Euclidean) reduction by a $k$-party (non-Euclidean) reduction. The $k$-block generalization of our algorithm constitutes a class of polynomial-time algorithms indexed by $k\geq 2$, which yield successively improved approximations for the short vector problem.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Graphical quantum Clifford-encoder compilers from the ZX calculus
Authors:
Andrey Boris Khesin,
Jonathan Z. Lu,
Peter W. Shor
Abstract:
We present a quantum compilation algorithm that maps Clifford encoders, encoding maps for stabilizer quantum codes, to a unique graphical representation in the ZX calculus. Specifically, we develop a canonical form in the ZX calculus and prove canonicity as well as efficient reducibility of any Clifford encoder into the canonical form. The diagrams produced by our compiler visualize information pr…
▽ More
We present a quantum compilation algorithm that maps Clifford encoders, encoding maps for stabilizer quantum codes, to a unique graphical representation in the ZX calculus. Specifically, we develop a canonical form in the ZX calculus and prove canonicity as well as efficient reducibility of any Clifford encoder into the canonical form. The diagrams produced by our compiler visualize information propagation and entanglement structure of the encoder, revealing properties that may be obscured in the circuit or stabilizer-tableau representation. Consequently, our canonical representation may be an informative technique for the design of new stabilizer quantum codes via graph theory analysis.
△ Less
Submitted 4 January, 2024; v1 submitted 5 January, 2023;
originally announced January 2023.
-
The Early Days of Quantum Computation
Authors:
Peter W. Shor
Abstract:
I recount some of my memories of the early development of quantum computation, including the discovery of the factoring algorithm, of error correcting codes, and of fault tolerance.
I recount some of my memories of the early development of quantum computation, including the discovery of the factoring algorithm, of error correcting codes, and of fault tolerance.
△ Less
Submitted 26 October, 2022; v1 submitted 21 August, 2022;
originally announced August 2022.
-
Publicly verifiable quantum money from random lattices
Authors:
Andrey Boris Khesin,
Jonathan Z. Lu,
Peter W. Shor
Abstract:
Publicly verifiable quantum money is a protocol for the preparation of quantum states that can be efficiently verified by any party for authenticity but is computationally infeasible to counterfeit. We develop a cryptographic scheme for publicly verifiable quantum money based on Gaussian superpositions over random lattices. We introduce a verification-of-authenticity procedure based on the lattice…
▽ More
Publicly verifiable quantum money is a protocol for the preparation of quantum states that can be efficiently verified by any party for authenticity but is computationally infeasible to counterfeit. We develop a cryptographic scheme for publicly verifiable quantum money based on Gaussian superpositions over random lattices. We introduce a verification-of-authenticity procedure based on the lattice discrete Fourier transform, and subsequently prove the unforgeability of our quantum money under the hardness of the short vector problem from lattice-based cryptography.
△ Less
Submitted 30 August, 2022; v1 submitted 26 July, 2022;
originally announced July 2022.
-
Bounding the forward classical capacity of bipartite quantum channels
Authors:
Dawei Ding,
Sumeet Khatri,
Yihui Quek,
Peter W. Shor,
Xin Wang,
Mark M. Wilde
Abstract:
We introduce various measures of forward classical communication for bipartite quantum channels. Since a point-to-point channel is a special case of a bipartite channel, the measures reduce to measures of classical communication for point-to-point channels. As it turns out, these reduced measures have been reported in prior work of Wang et al. on bounding the classical capacity of a quantum channe…
▽ More
We introduce various measures of forward classical communication for bipartite quantum channels. Since a point-to-point channel is a special case of a bipartite channel, the measures reduce to measures of classical communication for point-to-point channels. As it turns out, these reduced measures have been reported in prior work of Wang et al. on bounding the classical capacity of a quantum channel. As applications, we show that the measures are upper bounds on the forward classical capacity of a bipartite channel. The reduced measures are upper bounds on the classical capacity of a point-to-point quantum channel assisted by a classical feedback channel. Some of the various measures can be computed by semi-definite programming.
△ Less
Submitted 6 January, 2023; v1 submitted 2 October, 2020;
originally announced October 2020.
-
A Separation of Out-of-time-ordered Correlation and Entanglement
Authors:
Aram W. Harrow,
Linghang Kong,
Zi-Wen Liu,
Saeed Mehraban,
Peter W. Shor
Abstract:
The out-of-time-ordered correlation (OTOC) and entanglement are two physically motivated and widely used probes of the "scrambling" of quantum information, a phenomenon that has drawn great interest recently in quantum gravity and many-body physics. We argue that the corresponding notions of scrambling can be fundamentally different, by proving an asymptotic separation between the time scales of t…
▽ More
The out-of-time-ordered correlation (OTOC) and entanglement are two physically motivated and widely used probes of the "scrambling" of quantum information, a phenomenon that has drawn great interest recently in quantum gravity and many-body physics. We argue that the corresponding notions of scrambling can be fundamentally different, by proving an asymptotic separation between the time scales of the saturation of OTOC and that of entanglement entropy in a random quantum circuit model defined on graphs with a tight bottleneck, such as tree graphs. Our result counters the intuition that a random quantum circuit mixes in time proportional to the diameter of the underlying graph of interactions. It also provides a more rigorous justification for an argument in our previous work arXiv:1807.04363, that black holes may be slow information scramblers, which in turn relates to the black hole information problem. The bounds we obtained for OTOC are interesting in their own right in that they generalize previous studies of OTOC on lattices to the geometries on graphs in a rigorous and general fashion.
△ Less
Submitted 16 August, 2020; v1 submitted 5 June, 2019;
originally announced June 2019.
-
Entropy Bound for the Classical Capacity of a Quantum Channel Assisted by Classical Feedback
Authors:
Dawei Ding,
Yihui Quek,
Peter W. Shor,
Mark M. Wilde
Abstract:
We prove that the classical capacity of an arbitrary quantum channel assisted by a free classical feedback channel is bounded from above by the maximum average output entropy of the quantum channel. As a consequence of this bound, we conclude that a classical feedback channel does not improve the classical capacity of a quantum erasure channel, and by taking into account energy constraints, we con…
▽ More
We prove that the classical capacity of an arbitrary quantum channel assisted by a free classical feedback channel is bounded from above by the maximum average output entropy of the quantum channel. As a consequence of this bound, we conclude that a classical feedback channel does not improve the classical capacity of a quantum erasure channel, and by taking into account energy constraints, we conclude the same for a pure-loss bosonic channel. The method for establishing the aforementioned entropy bound involves identifying an information measure having two key properties: 1) it does not increase under a one-way local operations and classical communication channel from the receiver to the sender and 2) a quantum channel from sender to receiver cannot increase the information measure by more than the maximum output entropy of the channel. This information measure can be understood as the sum of two terms, with one corresponding to classical correlation and the other to entanglement.
△ Less
Submitted 14 July, 2019; v1 submitted 7 February, 2019;
originally announced February 2019.
-
Scrambling Time and Causal Structure of the Photon Sphere of a Schwarzschild Black Hole
Authors:
Peter W. Shor
Abstract:
Recently, physicists have started applying quantum information theory to black holes. This led to the conjecture that black holes are the fastest scramblers of information, and that they scramble it in time order M log M, where M is the mass of the black hole in natural units. As stated above, the conjecture is not completely defined, as there are several possible definitions of scrambling times.…
▽ More
Recently, physicists have started applying quantum information theory to black holes. This led to the conjecture that black holes are the fastest scramblers of information, and that they scramble it in time order M log M, where M is the mass of the black hole in natural units. As stated above, the conjecture is not completely defined, as there are several possible definitions of scrambling times. It appears that not all papers that refer to this conjecture interpret it the same way. We consider a definition of scrambling time stronger than the one given in the paper that first proposed this conjecture [Sekino and Susskind, JHEP 0810:065 (2008)], and show that this stronger version of the conjecture appears to be incompatible with a number of other widely-believed and reasonable-sounding properties of black holes.
We argue that for the scrambling time of a black hole to be this fast, either relativity is violated or non-standard physics must be occurring outside the stretched event horizon of a black hole. More specifically, either information is being transferred faster than relativity would permit, the information is not carried by the Hawking radiation and thus must be carried by unknown physics, or the Hawking radiation carries much more information than standard thermodynamics would permit.
△ Less
Submitted 17 July, 2018; v1 submitted 11 July, 2018;
originally announced July 2018.
-
Resource theory of non-Gaussian operations
Authors:
Quntao Zhuang,
Peter W. Shor,
Jeffrey H. Shapiro
Abstract:
Non-Gaussian states and operations are crucial for various continuous-variable quantum information processing tasks. To quantitatively understand non-Gaussianity beyond states, we establish a resource theory for non-Gaussian operations. In our framework, we consider Gaussian operations as free operations, and non-Gaussian operations as resources. We define entanglement-assisted non-Gaussianity gen…
▽ More
Non-Gaussian states and operations are crucial for various continuous-variable quantum information processing tasks. To quantitatively understand non-Gaussianity beyond states, we establish a resource theory for non-Gaussian operations. In our framework, we consider Gaussian operations as free operations, and non-Gaussian operations as resources. We define entanglement-assisted non-Gaussianity generating power and show that it is a monotone that is non-increasing under the set of free super-operations, i.e., concatenation and tensoring with Gaussian channels. For conditional unitary maps, this monotone can be analytically calculated. As examples, we show that the non-Gaussianity of ideal photon-number subtraction and photon-number addition equal the non-Gaussianity of the single-photon Fock state. Based on our non-Gaussianity monotone, we divide non-Gaussian operations into two classes: (1) the finite non-Gaussianity class, e.g., photon-number subtraction, photon-number addition and all Gaussian-dilatable non-Gaussian channels; and (2) the diverging non-Gaussianity class, e.g., the binary phase-shift channel and the Kerr nonlinearity. This classification also implies that not all non-Gaussian channels are exactly Gaussian-dilatable. Our resource theory enables a quantitative characterization and a first classification of non-Gaussian operations, paving the way towards the full understanding of non-Gaussianity.
△ Less
Submitted 26 April, 2018; v1 submitted 20 March, 2018;
originally announced March 2018.
-
Superadditivity in trade-off capacities of quantum channels
Authors:
Elton Yechao Zhu,
Quntao Zhuang,
Min-Hsiu Hsieh,
Peter W. Shor
Abstract:
In this article, we investigate the additivity phenomenon in the dynamic capacity of a quantum channel for trading classical communication, quantum communication and entanglement. Understanding such additivity property is important if we want to optimally use a quantum channel for general communication purpose. However, in a lot of cases, the channel one will be using only has an additive single o…
▽ More
In this article, we investigate the additivity phenomenon in the dynamic capacity of a quantum channel for trading classical communication, quantum communication and entanglement. Understanding such additivity property is important if we want to optimally use a quantum channel for general communication purpose. However, in a lot of cases, the channel one will be using only has an additive single or double resource capacity, and it is largely unknown if this could lead to an superadditive double or triple resource capacity. For example, if a channel has an additive classical and quantum capacity, can the classical-quantum capacity be superadditive? In this work, we answer such questions affirmatively.
We give proof-of-principle requirements for these channels to exist. In most cases, we can provide an explicit construction of these quantum channels. The existence of these superadditive phenomena is surprising in contrast to the result that the additivity of both classical-entanglement and classical-quantum capacity regions imply the additivity of the triple capacity region.
△ Less
Submitted 15 August, 2017; v1 submitted 14 August, 2017;
originally announced August 2017.
-
Superadditivity of the Classical Capacity with Limited Entanglement Assistance
Authors:
Elton Yechao Zhu,
Quntao Zhuang,
Peter W. Shor
Abstract:
Finding the optimal encoding strategies can be challenging for communication using quantum channels, as classical and quantum capacities may be superadditive. Entanglement assistance can often simplify this task, as the entanglement-assisted classical capacity for any channel is additive, making entanglement across channel uses unnecessary. If the entanglement assistance is limited, the picture is…
▽ More
Finding the optimal encoding strategies can be challenging for communication using quantum channels, as classical and quantum capacities may be superadditive. Entanglement assistance can often simplify this task, as the entanglement-assisted classical capacity for any channel is additive, making entanglement across channel uses unnecessary. If the entanglement assistance is limited, the picture is much more unclear. Suppose the classical capacity is superadditive, then the classical capacity with limited entanglement assistance could retain superadditivity by continuity arguments. If the classical capacity is additive, it is unknown if superadditivity can still be developed with limited entanglement assistance. We show this is possible, by providing an example. We construct a channel for which, the classical capacity is additive, but that with limited entanglement assistance can be superadditive. This shows entanglement plays a weird role in communication and we still understand very little about it.
△ Less
Submitted 28 July, 2017; v1 submitted 23 April, 2017;
originally announced April 2017.
-
An Efficient Quantum Algorithm for a Variant of the Closest Lattice-Vector Problem
Authors:
Lior Eldar,
Peter W. Shor
Abstract:
The Systematic Normal Form (SysNF) is a canonical form of lattices introduced in [Eldar,Shor '16], in which the basis entries satisfy a certain co-primality condition. Using a "smooth" analysis of lattices by SysNF lattices we design a quantum algorithm that can efficiently solve the following variant of the bounded-distance-decoding problem: given a lattice L, a vector v, and numbers b = λ_1(L)/n…
▽ More
The Systematic Normal Form (SysNF) is a canonical form of lattices introduced in [Eldar,Shor '16], in which the basis entries satisfy a certain co-primality condition. Using a "smooth" analysis of lattices by SysNF lattices we design a quantum algorithm that can efficiently solve the following variant of the bounded-distance-decoding problem: given a lattice L, a vector v, and numbers b = λ_1(L)/n^{17}, a = λ_1(L)/n^{13} decide if v's distance from L is in the range [a/2, a] or at most b, where λ_1(L) is the length of L's shortest non-zero vector. Improving these parameters to a = b = λ_1(L)/\sqrt{n} would invalidate one of the security assumptions of the Learning-with-Errors (LWE) cryptosystem against quantum attacks.
△ Less
Submitted 24 November, 2016; v1 submitted 21 November, 2016;
originally announced November 2016.
-
Additive Classical Capacity of Quantum Channels Assisted by Noisy Entanglement
Authors:
Quntao Zhuang,
Elton Yechao Zhu,
Peter W. Shor
Abstract:
We give a capacity formula for the classical information transmission over a noisy quantum channel, with separable encoding by the sender and limited resources provided by the receiver's pre-shared ancilla. Instead of a pure state, we consider the signal-ancilla pair in a mixed state, purified by a "witness". Thus, the signal-witness correlation limits the resource available from the signal-ancill…
▽ More
We give a capacity formula for the classical information transmission over a noisy quantum channel, with separable encoding by the sender and limited resources provided by the receiver's pre-shared ancilla. Instead of a pure state, we consider the signal-ancilla pair in a mixed state, purified by a "witness". Thus, the signal-witness correlation limits the resource available from the signal-ancilla correlation. Our formula characterizes the utility of different forms of resources, including noisy or limited entanglement assistance, for classical communication. With separable encoding, the sender's signals across multiple channel uses are still allowed to be entangled, yet our capacity formula is additive. In particular, for generalized covariant channels our capacity formula has a simple closed-form. Moreover, our additive capacity formula upper bounds the general coherent attack's information gain in various two-way quantum key distribution protocols. For Gaussian protocols, the additivity of the formula indicates that the collective Gaussian attack is the most powerful.
△ Less
Submitted 19 May, 2017; v1 submitted 27 September, 2016;
originally announced September 2016.
-
The Systematic Normal Form of Lattices
Authors:
Lior Eldar,
Peter W. Shor
Abstract:
We introduce a new canonical form of lattices called the systematic normal form (SNF). We show that for every lattice there is an efficiently computable "nearby" SNF lattice, such that for any lattice one can solve lattice problems on its "nearby" SNF lattice, and translate the solutions back efficiently to the original lattice. The SNF provides direct connections between arbitrary lattices, and v…
▽ More
We introduce a new canonical form of lattices called the systematic normal form (SNF). We show that for every lattice there is an efficiently computable "nearby" SNF lattice, such that for any lattice one can solve lattice problems on its "nearby" SNF lattice, and translate the solutions back efficiently to the original lattice. The SNF provides direct connections between arbitrary lattices, and various lattice related problems like the Shortest-Integer-Solution, Approximate Greatest Common Divisor. As our main application of SNF we derive a new set of worst-to-average case lattice reductions that deviate significantly from the template of Ajtai and improve upon previous reductions in terms of simplicity.
△ Less
Submitted 26 April, 2016;
originally announced April 2016.
-
Power law violation of the area law in quantum spin chains
Authors:
Ramis Movassagh,
Peter W. Shor
Abstract:
The sub-volume scaling of the entanglement entropy with the system's size, $n$, has been a subject of vigorous study in the last decade [1]. The area law provably holds for gapped one dimensional systems [2] and it was believed to be violated by at most a factor of $\log\left(n\right)$ in physically reasonable models such as critical systems.
In this paper, we generalize the spin$-1$ model of Br…
▽ More
The sub-volume scaling of the entanglement entropy with the system's size, $n$, has been a subject of vigorous study in the last decade [1]. The area law provably holds for gapped one dimensional systems [2] and it was believed to be violated by at most a factor of $\log\left(n\right)$ in physically reasonable models such as critical systems.
In this paper, we generalize the spin$-1$ model of Bravyi et al [3] to all integer spin-$s$ chains, whereby we introduce a class of exactly solvable models that are physical and exhibit signatures of criticality, yet violate the area law by a power law. The proposed Hamiltonian is local and translationally invariant in the bulk. We prove that it is frustration free and has a unique ground state. Moreover, we prove that the energy gap scales as $n^{-c}$, where using the theory of Brownian excursions, we prove $c\ge2$. This rules out the possibility of these models being described by a conformal field theory. We analytically show that the Schmidt rank grows exponentially with $n$ and that the half-chain entanglement entropy to the leading order scales as $\sqrt{n}$ (Eq. 16). Geometrically, the ground state is seen as a uniform superposition of all $s-$colored Motzkin walks. Lastly, we introduce an external field which allows us to remove the boundary terms yet retain the desired properties of the model. Our techniques for obtaining the asymptotic form of the entanglement entropy, the gap upper bound and the self-contained expositions of the combinatorial techniques, more akin to lattice paths, may be of independent interest.
△ Less
Submitted 9 November, 2016; v1 submitted 7 August, 2014;
originally announced August 2014.
-
A New Relativistic Orthogonal States Quantum Key Distribution Protocol
Authors:
Jordan S. Cotler,
Peter W. Shor
Abstract:
We introduce a new relativistic orthogonal states quantum key distribution protocol which leverages the properties of both quantum mechanics and special relativity to securely encode multiple bits onto the spatio-temporal modes of a single photon. If the protocol is implemented using a single photon source, it can have a key generation rate faster than the repetition rate of the source, enabling f…
▽ More
We introduce a new relativistic orthogonal states quantum key distribution protocol which leverages the properties of both quantum mechanics and special relativity to securely encode multiple bits onto the spatio-temporal modes of a single photon. If the protocol is implemented using a single photon source, it can have a key generation rate faster than the repetition rate of the source, enabling faster secure communication than is possible with existing protocols. Further, we provide a proof that the protocol is secure and give a method of implementing the protocol using line-of-sight and fiber optic channels.
△ Less
Submitted 11 June, 2014; v1 submitted 21 January, 2014;
originally announced January 2014.
-
Information Causality, Szemerédi-Trotter and Algebraic Variants of CHSH
Authors:
Mohammad Bavarian,
Peter W. Shor
Abstract:
In this work, we consider the following family of two prover one-round games. In the CHSH_q game, two parties are given x,y in F_q uniformly at random, and each must produce an output a,b in F_q without communicating with the other. The players' objective is to maximize the probability that their outputs satisfy a+b=xy in F_q. This game was introduced by Buhrman and Massar (PRA 2005) as a large al…
▽ More
In this work, we consider the following family of two prover one-round games. In the CHSH_q game, two parties are given x,y in F_q uniformly at random, and each must produce an output a,b in F_q without communicating with the other. The players' objective is to maximize the probability that their outputs satisfy a+b=xy in F_q. This game was introduced by Buhrman and Massar (PRA 2005) as a large alphabet generalization of the celebrated CHSH game---which is one of the most well-studied two-prover games in quantum information theory, and which has a large number of applications to quantum cryptography and quantum complexity.
Our main contributions in this paper are the first asymptotic and explicit bounds on the entangled and classical values of CHSH_q, and the realization of a rather surprising connection between CHSH_q and geometric incidence theory. On the way to these results, we also resolve a problem of Pawlowski and Winter about pairwise independent Information Causality, which, beside being interesting on its own, gives as an application a short proof of our upper bound for the entangled value of CHSH_q.
△ Less
Submitted 16 November, 2014; v1 submitted 20 November, 2013;
originally announced November 2013.
-
The Quantum Double Model with Boundary: Condensations and Symmetries
Authors:
Salman Beigi,
Peter W. Shor,
Daniel Whalen
Abstract:
Associated to every finite group, Kitaev has defined the quantum double model for every orientable surface without boundary. In this paper, we define boundaries for this model and characterize condensations; that is, we find all quasi-particle excitations (anyons) which disappear when they move to the boundary. We then consider two phases of the quantum double model corresponding to two groups wit…
▽ More
Associated to every finite group, Kitaev has defined the quantum double model for every orientable surface without boundary. In this paper, we define boundaries for this model and characterize condensations; that is, we find all quasi-particle excitations (anyons) which disappear when they move to the boundary. We then consider two phases of the quantum double model corresponding to two groups with a domain wall between them, and study the tunneling of anyons from one phase to the other. Using this framework we discuss the necessary and sufficient conditions when two different groups give the same anyon types. As an application we show that in the quantum double model for S_3 (the permutation group over three letters) there is a chargeon and a fluxion which are not distinguishable. This group is indeed a special case of groups of the form of the semidirect product of the additive and multiplicative groups of a finite field, for all of which we prove a similar symmetry.
△ Less
Submitted 4 June, 2019; v1 submitted 28 June, 2010;
originally announced June 2010.
-
Quantum interactive proofs with short messages
Authors:
Salman Beigi,
Peter W. Shor,
John Watrous
Abstract:
This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The first variant is one in which the verifier sends a short message to the prover, and the prover responds with an ordinary, or polynomial-length, message; the second variant is one in which any number of messages can be excha…
▽ More
This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The first variant is one in which the verifier sends a short message to the prover, and the prover responds with an ordinary, or polynomial-length, message; the second variant is one in which any number of messages can be exchanged, but where the combined length of all the messages is logarithmic; and the third variant is one in which the verifier sends polynomially many random bits to the prover, who responds with a short quantum message. We prove that in all of these cases the short messages can be eliminated without changing the power of the model, so the first variant has the expressive power of QMA and the second and third variants have the expressive power of BQP. These facts are proved through the use of quantum state tomography, along with the finite quantum de Finetti theorem for the first variant.
△ Less
Submitted 21 June, 2011; v1 submitted 2 April, 2010;
originally announced April 2010.
-
Indistinguishable Chargeon-Fluxion Pairs in the Quantum Double of Finite Groups
Authors:
Salman Beigi,
Peter W. Shor,
Daniel Whalen
Abstract:
We consider the category of finite dimensional representations of the quantum double of a finite group as a modular tensor category. We study auto-equivalences of this category whose induced permutations on the set of simple objects (particles) are of the special form of PJ, where J sends every particle to its charge conjugation and P is a transposition of a chargeon-fluxion pair. We prove that if…
▽ More
We consider the category of finite dimensional representations of the quantum double of a finite group as a modular tensor category. We study auto-equivalences of this category whose induced permutations on the set of simple objects (particles) are of the special form of PJ, where J sends every particle to its charge conjugation and P is a transposition of a chargeon-fluxion pair. We prove that if the underlying group is the semidirect product of the additive and multiplicative groups of a finite field, then such an auto-equivalence exists. In particular, we show that for S_3 (the permutation group over three letters) there is a chargeon and a fluxion which are not distinguishable. Conversely, by considering such permutations as modular invariants, we show that a transposition of a chargeon-fluxion pair forms a modular invariant if and only if the corresponding group is isomorphic to the semidirect product of the additive and multiplicative groups of a finite near-field.
△ Less
Submitted 2 December, 2012; v1 submitted 26 February, 2010;
originally announced February 2010.
-
Unfrustrated Qudit Chains and their Ground States
Authors:
Ramis Movassagh,
Edward Farhi,
Jeffrey Goldstone,
Daniel Nagaj,
Tobias J. Osborne,
Peter W. Shor
Abstract:
We investigate chains of 'd' dimensional quantum spins (qudits) on a line with generic nearest neighbor interactions without translational invariance. We find the conditions under which these systems are not frustrated, i.e. when the ground states are also the common ground states of all the local terms in the Hamiltonians. The states of a quantum spin chain are naturally represented in the Matrix…
▽ More
We investigate chains of 'd' dimensional quantum spins (qudits) on a line with generic nearest neighbor interactions without translational invariance. We find the conditions under which these systems are not frustrated, i.e. when the ground states are also the common ground states of all the local terms in the Hamiltonians. The states of a quantum spin chain are naturally represented in the Matrix Product States (MPS) framework. Using imaginary time evolution in the MPS ansatz, we numerically investigate the range of parameters in which we expect the ground states to be highly entangled and find them hard to approximate using our MPS method.
△ Less
Submitted 28 June, 2011; v1 submitted 6 January, 2010;
originally announced January 2010.
-
Quantum Reverse Shannon Theorem
Authors:
Charles H. Bennett,
Igor Devetak,
Aram W. Harrow,
Peter W. Shor,
Andreas Winter
Abstract:
Dual to the usual noisy channel coding problem, where a noisy (classical or quantum) channel is used to simulate a noiseless one, reverse Shannon theorems concern the use of noiseless channels to simulate noisy ones, and more generally the use of one noisy channel to simulate another. For channels of nonzero capacity, this simulation is always possible, but for it to be efficient, auxiliary resour…
▽ More
Dual to the usual noisy channel coding problem, where a noisy (classical or quantum) channel is used to simulate a noiseless one, reverse Shannon theorems concern the use of noiseless channels to simulate noisy ones, and more generally the use of one noisy channel to simulate another. For channels of nonzero capacity, this simulation is always possible, but for it to be efficient, auxiliary resources of the proper kind and amount are generally required. In the classical case, shared randomness between sender and receiver is a sufficient auxiliary resource, regardless of the nature of the source, but in the quantum case the requisite auxiliary resources for efficient simulation depend on both the channel being simulated, and the source from which the channel inputs are coming. For tensor power sources (the quantum generalization of classical IID sources), entanglement in the form of standard ebits (maximally entangled pairs of qubits) is sufficient, but for general sources, which may be arbitrarily correlated or entangled across channel inputs, additional resources, such as entanglement-embezzling states or backward communication, are generally needed. Combining existing and new results, we establish the amounts of communication and auxiliary resources needed in both the classical and quantum cases, the tradeoffs among them, and the loss of simulation efficiency when auxiliary resources are absent or insufficient. In particular we find a new single-letter expression for the excess forward communication cost of coherent feedback simulations of quantum channels (i.e. simulations in which the sender retains what would escape into the environment in an ordinary simulation), on non-tensor-power sources in the presence of unlimited ebits but no other auxiliary resource. Our results on tensor power sources establish a strong converse to the entanglement-assisted capacity theorem.
△ Less
Submitted 4 March, 2014; v1 submitted 30 December, 2009;
originally announced December 2009.
-
High performance single-error-correcting quantum codes for amplitude dam**
Authors:
Peter W. Shor,
Graeme Smith,
John A. Smolin,
Bei Zeng
Abstract:
We construct families of high performance quantum amplitude dam** codes. All of our codes are nonadditive and most modestly outperform the best possible additive codes in terms of encoded dimension. One family is built from nonlinear error-correcting codes for classical asymmetric channels, with which we systematically construct quantum amplitude dam** codes with parameters better than any p…
▽ More
We construct families of high performance quantum amplitude dam** codes. All of our codes are nonadditive and most modestly outperform the best possible additive codes in terms of encoded dimension. One family is built from nonlinear error-correcting codes for classical asymmetric channels, with which we systematically construct quantum amplitude dam** codes with parameters better than any prior construction known for any block length n > 7 except n=2^r-1. We generalize this construction to employ classical codes over GF(3) with which we numerically obtain better performing codes up to length 14. Because the resulting codes are of the codeword stabilized (CWS) type, easy encoding and decoding circuits are available.
△ Less
Submitted 29 July, 2009;
originally announced July 2009.
-
Generalized Concatenation for Quantum Codes
Authors:
Markus Grassl,
Peter W. Shor,
Bei Zeng
Abstract:
We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.
We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.
△ Less
Submitted 4 May, 2009;
originally announced May 2009.
-
Approximating the Set of Separable States Using the Positive Partial Transpose Test
Authors:
Salman Beigi,
Peter W. Shor
Abstract:
The positive partial transpose test is one of the main criteria for detecting entanglement, and the set of states with positive partial transpose is considered as an approximation of the set of separable states. However, we do not know to what extent this criterion, as well as the approximation, are efficient. In this paper, we show that the positive partial transpose test gives no bound on the di…
▽ More
The positive partial transpose test is one of the main criteria for detecting entanglement, and the set of states with positive partial transpose is considered as an approximation of the set of separable states. However, we do not know to what extent this criterion, as well as the approximation, are efficient. In this paper, we show that the positive partial transpose test gives no bound on the distance of a density matrix from separable states. More precisely, we prove that, as the dimension of the space tends to infinity, the maximum trace distance of a positive partial transpose state from separable states tends to 1. Using similar techniques, we show that the same result holds for other well-known separability criteria such as reduction criterion, majorization criterion and symmetric extension criterion. We also bring an evidence that the sets of positive partial transpose states and separable states have totally different shapes.
△ Less
Submitted 21 June, 2011; v1 submitted 11 February, 2009;
originally announced February 2009.
-
C3, Semi-Clifford and Generalized Semi-Clifford Operations
Authors:
Salman Beigi,
Peter W. Shor
Abstract:
Fault-tolerant quantum computation is a basic problem in quantum computation, and teleportation is one of the main techniques in this theory. Using teleportation on stabilizer codes, the most well-known quantum codes, Pauli gates and Clifford operators can be applied fault-tolerantly. Indeed, this technique can be generalized for an extended set of gates, the so called ${\mathcal{C}}_k$ hierarch…
▽ More
Fault-tolerant quantum computation is a basic problem in quantum computation, and teleportation is one of the main techniques in this theory. Using teleportation on stabilizer codes, the most well-known quantum codes, Pauli gates and Clifford operators can be applied fault-tolerantly. Indeed, this technique can be generalized for an extended set of gates, the so called ${\mathcal{C}}_k$ hierarchy gates, introduced by Gottesman and Chuang (Nature, 402, 390-392). ${\mathcal{C}}_k$ gates are a generalization of Clifford operators, but our knowledge of these sets is not as rich as our knowledge of Clifford gates. Zeng et al. in (Phys. Rev. A 77, 042313) raise the question of the relation between ${\mathcal{C}}_k$ hierarchy and the set of semi-Clifford and generalized semi-Clifford operators. They conjecture that any ${\mathcal{C}}_k$ gate is a generalized semi-Clifford operator. In this paper, we prove this conjecture for $k=3$. Using the techniques that we develop, we obtain more insight on how to characterize ${\mathcal{C}}_3$ gates. Indeed, the more we understand ${\mathcal{C}}_3$, the more intuition we have on ${\mathcal{C}}_k$, $k\geq 4$, and then we have a way of attacking the conjecture for larger $k$.
△ Less
Submitted 2 October, 2009; v1 submitted 28 October, 2008;
originally announced October 2008.
-
Nonadditive quantum error correcting codes adapted to the ampltitude dam** channel
Authors:
Ruitian Lang,
Peter W. Shor
Abstract:
A family of high rate quantum error correcting codes adapted to the amplitude dam** channel is presented. These codes are nonadditive and exploit self-complementarity structure to correct all first-order errors. Their rates can be higher than 1/2. The recovery operations of these codes can be generated by a simple algorithm and have a projection nature, which makes them potentially easy to imp…
▽ More
A family of high rate quantum error correcting codes adapted to the amplitude dam** channel is presented. These codes are nonadditive and exploit self-complementarity structure to correct all first-order errors. Their rates can be higher than 1/2. The recovery operations of these codes can be generated by a simple algorithm and have a projection nature, which makes them potentially easy to implement.
△ Less
Submitted 16 December, 2007;
originally announced December 2007.
-
Random quantum codes from Gaussian ensembles and an uncertainty relation
Authors:
Patrick Hayden,
Peter W. Shor,
Andreas Winter
Abstract:
Using random Gaussian vectors and an information-uncertainty relation, we give a proof that the coherent information is an achievable rate for entanglement transmission through a noisy quantum channel. The codes are random subspaces selected according to the Haar measure, but distorted as a function of the sender's input density operator. Using large deviations techniques, we show that classical…
▽ More
Using random Gaussian vectors and an information-uncertainty relation, we give a proof that the coherent information is an achievable rate for entanglement transmission through a noisy quantum channel. The codes are random subspaces selected according to the Haar measure, but distorted as a function of the sender's input density operator. Using large deviations techniques, we show that classical data transmitted in either of two Fourier-conjugate bases for the coding subspace can be decoded with low probability of error. A recently discovered information-uncertainty relation then implies that the quantum mutual information for entanglement encoded into the subspace and transmitted through the channel will be high. The monogamy of quantum correlations finally implies that the environment of the channel cannot be significantly coupled to the entanglement, and concluding, which ensures the existence of a decoding by the receiver.
△ Less
Submitted 6 December, 2007;
originally announced December 2007.
-
Channel-Adapted Quantum Error Correction for the Amplitude Dam** Channel
Authors:
Andrew S. Fletcher,
Peter W. Shor,
Moe Z. Win
Abstract:
We consider error correction procedures designed specifically for the amplitude dam** channel. We analyze amplitude dam** errors in the stabilizer formalism. This analysis allows a generalization of the [4,1] `approximate' amplitude dam** code of quant-ph/9704002. We present this generalization as a class of [2(M+1),M] codes and present quantum circuits for encoding and recovery operations…
▽ More
We consider error correction procedures designed specifically for the amplitude dam** channel. We analyze amplitude dam** errors in the stabilizer formalism. This analysis allows a generalization of the [4,1] `approximate' amplitude dam** code of quant-ph/9704002. We present this generalization as a class of [2(M+1),M] codes and present quantum circuits for encoding and recovery operations. We also present a [7,3] amplitude dam** code based on the classical Hamming code. All of these are stabilizer codes whose encoding and recovery operations can be completely described with Clifford group operations. Finally, we describe optimization options in which recovery operations may be further adapted according to the dam** probability gamma.
△ Less
Submitted 4 October, 2007;
originally announced October 2007.
-
On the Complexity of Computing Zero-Error and Holevo Capacity of Quantum Channels
Authors:
Salman Beigi,
Peter W. Shor
Abstract:
One of the main problems in quantum complexity theory is that our understanding of the theory of QMA-completeness is not as rich as its classical analogue, the NP- completeness. In this paper we consider the clique problem in graphs, which is NP- complete, and try to find its quantum analogue. We show that, quantum clique problem can be defined as follows; Given a quantum channel, decide whether…
▽ More
One of the main problems in quantum complexity theory is that our understanding of the theory of QMA-completeness is not as rich as its classical analogue, the NP- completeness. In this paper we consider the clique problem in graphs, which is NP- complete, and try to find its quantum analogue. We show that, quantum clique problem can be defined as follows; Given a quantum channel, decide whether there are k states that are distinguishable, with no error, after passing through channel. This definition comes from reconsidering the clique problem in terms of the zero-error capacity of graphs, and then redefining it in quantum information theory. We prove that, quantum clique problem is QMA-complete. In the second part of paper, we consider the same problem for the Holevo capacity. We prove that computing the Holevo capacity as well as the minimum entropy of a quantum channel is NP-complete. Also, we show these results hold even if the set of quantum channels is restricted to entanglement breaking ones.
△ Less
Submitted 13 October, 2008; v1 submitted 13 September, 2007;
originally announced September 2007.
-
Structured Near-Optimal Channel-Adapted Quantum Error Correction
Authors:
Andrew S. Fletcher,
Peter W. Shor,
Moe Z. Win
Abstract:
We present a class of numerical algorithms which adapt a quantum error correction scheme to a channel model. Given an encoding and a channel model, it was previously shown that the quantum operation that maximizes the average entanglement fidelity may be calculated by a semidefinite program (SDP), which is a convex optimization. While optimal, this recovery operation is computationally difficult…
▽ More
We present a class of numerical algorithms which adapt a quantum error correction scheme to a channel model. Given an encoding and a channel model, it was previously shown that the quantum operation that maximizes the average entanglement fidelity may be calculated by a semidefinite program (SDP), which is a convex optimization. While optimal, this recovery operation is computationally difficult for long codes. Furthermore, the optimal recovery operation has no structure beyond the completely positive trace preserving (CPTP) constraint. We derive methods to generate structured channel-adapted error recovery operations. Specifically, each recovery operation begins with a projective error syndrome measurement. The algorithms to compute the structured recovery operations are more scalable than the SDP and yield recovery operations with an intuitive physical form. Using Lagrange duality, we derive performance bounds to certify near-optimality.
△ Less
Submitted 29 August, 2007; v1 submitted 27 August, 2007;
originally announced August 2007.
-
Estimating Jones polynomials is a complete problem for one clean qubit
Authors:
Peter W. Shor,
Stephen P. Jordan
Abstract:
It is known that evaluating a certain approximation to the Jones polynomial for the plat closure of a braid is a BQP-complete problem. That is, this problem exactly captures the power of the quantum circuit model. The one clean qubit model is a model of quantum computation in which all but one qubit starts in the maximally mixed state. One clean qubit computers are believed to be strictly weaker…
▽ More
It is known that evaluating a certain approximation to the Jones polynomial for the plat closure of a braid is a BQP-complete problem. That is, this problem exactly captures the power of the quantum circuit model. The one clean qubit model is a model of quantum computation in which all but one qubit starts in the maximally mixed state. One clean qubit computers are believed to be strictly weaker than standard quantum computers, but still capable of solving some classically intractable problems. Here we show that evaluating a certain approximation to the Jones polynomial at a fifth root of unity for the trace closure of a braid is a complete problem for the one clean qubit complexity class. That is, a one clean qubit computer can approximate these Jones polynomials in time polynomial in both the number of strands and number of crossings, and the problem of simulating a one clean qubit computer is reducible to approximating the Jones polynomial of the trace closure of a braid.
△ Less
Submitted 1 February, 2008; v1 submitted 18 July, 2007;
originally announced July 2007.
-
Adaptive Entanglement Purification Protocols with Two-way Classical Communication
Authors:
Alan W. Leung,
Peter W. Shor
Abstract:
We present a family of entanglement purification protocols that generalize four previous methods, namely the recurrence method, the modified recurrence method, and the two methods proposed by Maneva-Smolin and Leung-Shor. We will show that this family of protocols have improved yields over a wide range of initial fidelities F, and hence imply new lower bounds on the quantum capacity assisted by…
▽ More
We present a family of entanglement purification protocols that generalize four previous methods, namely the recurrence method, the modified recurrence method, and the two methods proposed by Maneva-Smolin and Leung-Shor. We will show that this family of protocols have improved yields over a wide range of initial fidelities F, and hence imply new lower bounds on the quantum capacity assisted by two-way classical communication of the quantum depolarizing channel. In particular, the yields of these protocols are higher than the yield of universal hashing for F less than 0.993 and as F goes to 1.
△ Less
Submitted 28 February, 2007; v1 submitted 15 February, 2007;
originally announced February 2007.
-
Entanglement purification with two-way classical communication
Authors:
Alan W. Leung,
Peter W. Shor
Abstract:
We present an improved protocol for entanglement purification of bipartite mixed states. The protocol requires two-way classical communication and hence implies an improved lower bound on the quantum capacity with two-way classical communication of the quantum depolarizing channel.
We present an improved protocol for entanglement purification of bipartite mixed states. The protocol requires two-way classical communication and hence implies an improved lower bound on the quantum capacity with two-way classical communication of the quantum depolarizing channel.
△ Less
Submitted 21 February, 2007; v1 submitted 15 February, 2007;
originally announced February 2007.
-
Optimum Quantum Error Recovery using Semidefinite Programming
Authors:
Andrew S. Fletcher,
Peter W. Shor,
Moe Z. Win
Abstract:
Quantum error correction (QEC) is an essential element of physical quantum information processing systems. Most QEC efforts focus on extending classical error correction schemes to the quantum regime. The input to a noisy system is embedded in a coded subspace, and error recovery is performed via an operation designed to perfectly correct for a set of errors, presumably a large subset of the phy…
▽ More
Quantum error correction (QEC) is an essential element of physical quantum information processing systems. Most QEC efforts focus on extending classical error correction schemes to the quantum regime. The input to a noisy system is embedded in a coded subspace, and error recovery is performed via an operation designed to perfectly correct for a set of errors, presumably a large subset of the physical noise process. In this paper, we examine the choice of recovery operation. Rather than seeking perfect correction on a subset of errors, we seek a recovery operation to maximize the entanglement fidelity for a given input state and noise model. In this way, the recovery operation is optimum for the given encoding and noise process. This optimization is shown to be calculable via a semidefinite program (SDP), a well-established form of convex optimization with efficient algorithms for its solution. The error recovery operation may also be interpreted as a combining operation following a quantum spreading channel, thus providing a quantum analogy to the classical diversity combining operation.
△ Less
Submitted 5 June, 2006;
originally announced June 2006.
-
Error correcting codes for adiabatic quantum computation
Authors:
Stephen P. Jordan,
Edward Farhi,
Peter W. Shor
Abstract:
Recently, there has been growing interest in using adiabatic quantum computation as an architecture for experimentally realizable quantum computers. One of the reasons for this is the idea that the energy gap should provide some inherent resistance to noise. It is now known that universal quantum computation can be achieved adiabatically using 2-local Hamiltonians. The energy gap in these Hamilt…
▽ More
Recently, there has been growing interest in using adiabatic quantum computation as an architecture for experimentally realizable quantum computers. One of the reasons for this is the idea that the energy gap should provide some inherent resistance to noise. It is now known that universal quantum computation can be achieved adiabatically using 2-local Hamiltonians. The energy gap in these Hamiltonians scales as an inverse polynomial in the problem size. Here we present stabilizer codes which can be used to produce a constant energy gap against 1-local and 2-local noise. The corresponding fault-tolerant universal Hamiltonians are 4-local and 6-local respectively, which is the optimal result achievable within this framework.
△ Less
Submitted 10 October, 2006; v1 submitted 20 December, 2005;
originally announced December 2005.
-
Time reversal and exchange symmetries of unitary gate capacities
Authors:
Aram W. Harrow,
Peter W. Shor
Abstract:
Unitary gates are an interesting resource for quantum communication in part because they are always invertible and are intrinsically bidirectional. This paper explores these two symmetries: time-reversal and exchange of Alice and Bob. We will present examples of unitary gates that exhibit dramatic separations between forward and backward capacities (even when the back communication is assisted b…
▽ More
Unitary gates are an interesting resource for quantum communication in part because they are always invertible and are intrinsically bidirectional. This paper explores these two symmetries: time-reversal and exchange of Alice and Bob. We will present examples of unitary gates that exhibit dramatic separations between forward and backward capacities (even when the back communication is assisted by free entanglement) and between entanglement-assisted and unassisted capacities, among many others. Along the way, we will give a general time-reversal rule for relating the capacities of a unitary gate and its inverse that will explain why previous attempts at finding asymmetric capacities failed. Finally, we will see how the ability to erase quantum information and destroy entanglement can be a valuable resource for quantum communication.
△ Less
Submitted 28 July, 2009; v1 submitted 22 November, 2005;
originally announced November 2005.
-
Inequalities and separations among assisted capacities of quantum channels
Authors:
Charles H. Bennett,
Igor Devetak,
Peter W. Shor,
John A. Smolin
Abstract:
We exhibit discrete memoryless quantum channels whose quantum capacity assisted by two-way classical communication, $Q_2$, exceeds their unassisted one-shot Holevo capacity $C_H$. These channels may be thought of as having a data input and output, along with a control input that partly influences, and a control output that partly reveals, which of a set of unitary evolutions the data undergoes e…
▽ More
We exhibit discrete memoryless quantum channels whose quantum capacity assisted by two-way classical communication, $Q_2$, exceeds their unassisted one-shot Holevo capacity $C_H$. These channels may be thought of as having a data input and output, along with a control input that partly influences, and a control output that partly reveals, which of a set of unitary evolutions the data undergoes en route from input to output. The channel is designed so that the data's evolution can be exactly inferred by a classically coordinated processing of 1) the control output, and 2) a reference system entangled with the control input, but not from either of these resources alone. Thus a two-way classical side channel allows the otherwise noisy evolution of the data to be corrected, greatly increasing the capacity. The same family of channels provides examples where the classical capacity assisted by classical feedback, $C_B$, and the quantum capacity assisted by classical feedback $Q_B$, both exceed $C_H$. A related channel, whose data input undergoes dephasing before interacting with the control input, has a classical capacity $C=C_H$ strictly less than its $C_2$, the classical capacity assisted by independent classical communication.
△ Less
Submitted 14 June, 2004;
originally announced June 2004.
-
The classical capacity achievable by a quantum channel assisted by limited entanglement
Authors:
Peter W. Shor
Abstract:
We give the trade-off curve showing the capacity of a quantum channel as a function of the amount of entanglement used by the sender and receiver for transmitting information. The endpoints of this curve are given by the Holevo-Schumacher-Westmoreland capacity formula and the entanglement-assisted capacity, which is the maximum over all input density matrices of the quantum mutual information. T…
▽ More
We give the trade-off curve showing the capacity of a quantum channel as a function of the amount of entanglement used by the sender and receiver for transmitting information. The endpoints of this curve are given by the Holevo-Schumacher-Westmoreland capacity formula and the entanglement-assisted capacity, which is the maximum over all input density matrices of the quantum mutual information. The proof we give is based on the Holevo-Schumacher-Westmoreland formula, and also gives a new and simpler proof for the entanglement-assisted capacity formula.
△ Less
Submitted 18 February, 2004;
originally announced February 2004.
-
The capacity of a quantum channel for simultaneous transmission of classical and quantum information
Authors:
I. Devetak,
P. W. Shor
Abstract:
An expression is derived characterizing the set of admissible rate pairs for simultaneous transmission of classical and quantum information over a given quantum channel, generalizing both the classical and quantum capacities of the channel. Although our formula involves regularization, i.e. taking a limit over many copies of the channel, it reduces to a single-letter expression in the case of ge…
▽ More
An expression is derived characterizing the set of admissible rate pairs for simultaneous transmission of classical and quantum information over a given quantum channel, generalizing both the classical and quantum capacities of the channel. Although our formula involves regularization, i.e. taking a limit over many copies of the channel, it reduces to a single-letter expression in the case of generalized dephasing channels. Analogous formulae are conjectured for the simultaneous public-private capacity of a quantum channel and for the simultaneously 1-way distillable common randomness and entanglement of a bipartite quantum state.
△ Less
Submitted 21 October, 2004; v1 submitted 19 November, 2003;
originally announced November 2003.
-
Randomizing quantum states: Constructions and applications
Authors:
Patrick Hayden,
Debbie Leung,
Peter W. Shor,
Andreas Winter
Abstract:
The construction of a perfectly secure private quantum channel in dimension d is known to require 2 log d shared random key bits between the sender and receiver. We show that if only near-perfect security is required, the size of the key can be reduced by a factor of two. More specifically, we show that there exists a set of roughly d log d unitary operators whose average effect on every input p…
▽ More
The construction of a perfectly secure private quantum channel in dimension d is known to require 2 log d shared random key bits between the sender and receiver. We show that if only near-perfect security is required, the size of the key can be reduced by a factor of two. More specifically, we show that there exists a set of roughly d log d unitary operators whose average effect on every input pure state is almost perfectly randomizing, as compared to the d^2 operators required to randomize perfectly. Aside from the private quantum channel, variations of this construction can be applied to many other tasks in quantum information processing. We show, for instance, that it can be used to construct LOCC data hiding schemes for bits and qubits that are much more efficient than any others known, allowing roughly log d qubits to be hidden in 2 log d qubits. The method can also be used to exhibit the existence of quantum states with locked classical correlations, an arbitrarily large amplification of the correlation being accomplished by sending a negligibly small classical key. Our construction also provides the basic building block for a method of remotely preparing arbitrary d-dimensional pure quantum states using approximately log d bits of communication and log d ebits of entanglement.
△ Less
Submitted 14 June, 2004; v1 submitted 15 July, 2003;
originally announced July 2003.
-
Remote preparation of quantum states
Authors:
Charles H. Bennett,
Patrick Hayden,
Debbie W. Leung,
Peter W. Shor,
Andreas Winter
Abstract:
Remote state preparation is the variant of quantum state teleportation in which the sender knows the quantum state to be communicated. The original paper introducing teleportation established minimal requirements for classical communication and entanglement but the corresponding limits for remote state preparation have remained unknown until now: previous work has shown, however, that it not onl…
▽ More
Remote state preparation is the variant of quantum state teleportation in which the sender knows the quantum state to be communicated. The original paper introducing teleportation established minimal requirements for classical communication and entanglement but the corresponding limits for remote state preparation have remained unknown until now: previous work has shown, however, that it not only requires less classical communication but also gives rise to a trade-off between these two resources in the appropriate setting. We discuss this problem from first principles, including the various choices one may follow in the definitions of the actual resources. Our main result is a general method of remote state preparation for arbitrary states of many qubits, at a cost of 1 bit of classical communication and 1 bit of entanglement per qubit sent. In this "universal" formulation, these ebit and cbit requirements are shown to be simultaneously optimal by exhibiting a dichotomy. Our protocol then yields the exact trade-off curve for arbitrary ensembles of pure states and pure entangled states (including the case of incomplete knowledge of the ensemble probabilities), based on the recently established quantum-classical trade-off for quantum data compression. The paper includes an extensive discussion of our results, including the impact of the choice of model on the resources, the topic of obliviousness, and an application to private quantum channels and quantum data hiding.
△ Less
Submitted 2 June, 2004; v1 submitted 15 July, 2003;
originally announced July 2003.
-
Broadband channel capacities
Authors:
Vittorio Giovannetti,
Seth Lloyd,
Lorenzo Maccone,
Peter W. Shor
Abstract:
We study the communication capacities of bosonic broadband channels in the presence of different sources of noise. In particular we analyze lossy channels in presence of white noise and thermal bath. In this context, we provide a numerical solution for the entanglement assisted capacity and upper and lower bounds for the classical and quantum capacities.
We study the communication capacities of bosonic broadband channels in the presence of different sources of noise. In particular we analyze lossy channels in presence of white noise and thermal bath. In this context, we provide a numerical solution for the entanglement assisted capacity and upper and lower bounds for the classical and quantum capacities.
△ Less
Submitted 14 July, 2003;
originally announced July 2003.
-
Equivalence of Additivity Questions in Quantum Information Theory
Authors:
Peter W. Shor
Abstract:
We reduce the number of open additivity problems in quantum information theory by showing that four of them are equivalent. We show that the conjectures of additivity of the minimum output entropy of a quantum channel, additivity of the Holevo expression for the classical capacity of a quantum channel, additivity of the entanglement of formation, and strong superadditivity of the entanglement of…
▽ More
We reduce the number of open additivity problems in quantum information theory by showing that four of them are equivalent. We show that the conjectures of additivity of the minimum output entropy of a quantum channel, additivity of the Holevo expression for the classical capacity of a quantum channel, additivity of the entanglement of formation, and strong superadditivity of the entanglement of formation, are either all true or all false.
△ Less
Submitted 3 July, 2003; v1 submitted 7 May, 2003;
originally announced May 2003.
-
Capacities of Quantum Channels and How to Find Them
Authors:
P. W. Shor
Abstract:
We survey what is known about the information transmitting capacities of quantum channels, and give a proposal for how to calculate some of these capacities using linear programming.
We survey what is known about the information transmitting capacities of quantum channels, and give a proposal for how to calculate some of these capacities using linear programming.
△ Less
Submitted 14 April, 2003;
originally announced April 2003.
-
Entanglement assisted capacity of the broadband lossy channel
Authors:
Vittorio Giovannetti,
Seth Lloyd,
Lorenzo Maccone,
Peter W. Shor
Abstract:
We calculate the entanglement assisted capacity of a multimode bosonic channel with loss. As long as the efficiency of the channel is above 50%, the superdense coding effect can be used to transmit more bits than those that can be stored in the message sent down the channel. Bounds for the other capacities of the multimode channel are also provided.
We calculate the entanglement assisted capacity of a multimode bosonic channel with loss. As long as the efficiency of the channel is above 50%, the superdense coding effect can be used to transmit more bits than those that can be stored in the message sent down the channel. Bounds for the other capacities of the multimode channel are also provided.
△ Less
Submitted 15 July, 2003; v1 submitted 2 April, 2003;
originally announced April 2003.
-
General Entanglement Breaking Channels
Authors:
Michael Horodecki,
Peter W. Shor,
Mary Beth Ruskai
Abstract:
This paper studies the class of stochastic maps, or channels, whose action (when tensored with the identity) on an entangled state always yields a separable state. Such maps have a canonical form introduced by Holevo. Such maps are called entanglement breaking, and can always be written in a canonical form introduced by Holevo. Some special classes of these maps are considered and several equiva…
▽ More
This paper studies the class of stochastic maps, or channels, whose action (when tensored with the identity) on an entangled state always yields a separable state. Such maps have a canonical form introduced by Holevo. Such maps are called entanglement breaking, and can always be written in a canonical form introduced by Holevo. Some special classes of these maps are considered and several equivalent characterizations given.
Since the set of entanglement-breaking trace-preserving maps is convex, it can be described by its extreme points. The only extreme points of the set of completely positive trace preserving maps which are also entanglement breaking are those known as classical quantum or CQ. However, for d > 2 the set of entanglement breaking maps has additional extreme points which are not extreme CQ maps.
△ Less
Submitted 4 June, 2003; v1 submitted 4 February, 2003;
originally announced February 2003.
-
On the Sum-of-Squares Algorithm for Bin Packing
Authors:
Janos Csirik,
David S. Johnson,
Claire Kenyon,
James B. Orlin,
Peter W. Shor,
Richard R. Weber
Abstract:
In this paper we present a theoretical analysis of the deterministic on-line {\em Sum of Squares} algorithm ($SS$) for bin packing introduced and studied experimentally in \cite{CJK99}, along with several new variants. $SS$ is applicable to any instance of bin packing in which the bin capacity $B$ and item sizes $s(a)$ are integral (or can be scaled to be so), and runs in time $O(nB)$. It perfor…
▽ More
In this paper we present a theoretical analysis of the deterministic on-line {\em Sum of Squares} algorithm ($SS$) for bin packing introduced and studied experimentally in \cite{CJK99}, along with several new variants. $SS$ is applicable to any instance of bin packing in which the bin capacity $B$ and item sizes $s(a)$ are integral (or can be scaled to be so), and runs in time $O(nB)$. It performs remarkably well from an average case point of view: For any discrete distribution in which the optimal expected waste is sublinear, $SS$ also has sublinear expected waste. For any discrete distribution where the optimal expected waste is bounded, $SS$ has expected waste at most $O(\log n)$. In addition, we discuss several interesting variants on $SS$, including a randomized $O(nB\log B)$-time on-line algorithm $SS^*$, based on $SS$, whose expected behavior is essentially optimal for all discrete distributions. Algorithm $SS^*$ also depends on a new linear-programming-based pseudopolynomial-time algorithm for solving the NP-hard problem of determining, given a discrete distribution $F$, just what is the growth rate for the optimal expected waste. This article is a greatly expanded version of the conference paper \cite{sumsq2000}.
△ Less
Submitted 14 October, 2002; v1 submitted 14 October, 2002;
originally announced October 2002.
-
A Family of Optimal Packings in Grassmannian Manifolds
Authors:
P. W. Shor,
N. J. A. Sloane
Abstract:
A remarkable coincidence has led to the discovery of a family of packings of (m^2+m-2) m/2-dimensional subspaces of m-dimensional space, whenever m is a power of 2. These packings meet the ``orthoplex bound'' and are therefore optimal.
A remarkable coincidence has led to the discovery of a family of packings of (m^2+m-2) m/2-dimensional subspaces of m-dimensional space, whenever m is a power of 2. These packings meet the ``orthoplex bound'' and are therefore optimal.
△ Less
Submitted 31 July, 2002;
originally announced August 2002.
-
A Group-Theoretic Framework for the Construction of Packings in Grassmannian Spaces
Authors:
A. R. Calderbank,
R. H. Hardin,
E. M. Rains,
P. W. Shor,
N. J. A. Sloane
Abstract:
By using totally isotropic subspaces in an orthogonal space Omega^{+}(2i,2), several infinite families of packings of 2^k-dimensional subspaces of real 2^i-dimensional space are constructed, some of which are shown to be optimal packings. A certain Clifford group underlies the construction and links this problem with Barnes-Wall lattices, Kerdock sets and quantum-error-correcting codes.
By using totally isotropic subspaces in an orthogonal space Omega^{+}(2i,2), several infinite families of packings of 2^k-dimensional subspaces of real 2^i-dimensional space are constructed, some of which are shown to be optimal packings. A certain Clifford group underlies the construction and links this problem with Barnes-Wall lattices, Kerdock sets and quantum-error-correcting codes.
△ Less
Submitted 31 July, 2002;
originally announced August 2002.