-
Quantum Lazy Training
Authors:
Erfan Abedi,
Salman Beigi,
Leila Taghavi
Abstract:
In the training of over-parameterized model functions via gradient descent, sometimes the parameters do not change significantly and remain close to their initial values. This phenomenon is called lazy training, and motivates consideration of the linear approximation of the model function around the initial parameters. In the lazy regime, this linear approximation imitates the behavior of the para…
▽ More
In the training of over-parameterized model functions via gradient descent, sometimes the parameters do not change significantly and remain close to their initial values. This phenomenon is called lazy training, and motivates consideration of the linear approximation of the model function around the initial parameters. In the lazy regime, this linear approximation imitates the behavior of the parameterized function whose associated kernel, called the tangent kernel, specifies the training performance of the model. Lazy training is known to occur in the case of (classical) neural networks with large widths. In this paper, we show that the training of geometrically local parameterized quantum circuits enters the lazy regime for large numbers of qubits. More precisely, we prove bounds on the rate of changes of the parameters of such a geometrically local parameterized quantum circuit in the training process, and on the precision of the linear approximation of the associated quantum model function; both of these bounds tend to zero as the number of qubits grows. We support our analytic results with numerical simulations.
△ Less
Submitted 20 April, 2023; v1 submitted 16 February, 2022;
originally announced February 2022.
-
Time and Query Optimal Quantum Algorithms Based on Decision Trees
Authors:
Salman Beigi,
Leila Taghavi,
Artin Tajdini
Abstract:
It has recently been shown that starting with a classical query algorithm (decision tree) and a guessing algorithm that tries to predict the query answers, we can design a quantum algorithm with query complexity $O(\sqrt{GT})$ where $T$ is the query complexity of the classical algorithm (depth of the decision tree) and $G$ is the maximum number of wrong answers by the guessing algorithm [arXiv:141…
▽ More
It has recently been shown that starting with a classical query algorithm (decision tree) and a guessing algorithm that tries to predict the query answers, we can design a quantum algorithm with query complexity $O(\sqrt{GT})$ where $T$ is the query complexity of the classical algorithm (depth of the decision tree) and $G$ is the maximum number of wrong answers by the guessing algorithm [arXiv:1410.0932, arXiv:1905.13095]. In this paper we show that, given some constraints on the classical algorithms, this quantum algorithm can be implemented in time $\tilde O(\sqrt{GT})$. Our algorithm is based on non-binary span programs and their efficient implementation. We conclude that various graph theoretic problems including bipartiteness, cycle detection and topological sort can be solved in time $O(n^{3/2}\log n)$ and with $O(n^{3/2})$ quantum queries. Moreover, finding a maximal matching can be solved with $O(n^{3/2})$ quantum queries in time $O(n^{3/2}\log n)$, and maximum bipartite matching can be solved in time $O(n^2\log n)$.
△ Less
Submitted 16 October, 2022; v1 submitted 18 May, 2021;
originally announced May 2021.
-
Quantum Speedup Based on Classical Decision Trees
Authors:
Salman Beigi,
Leila Taghavi
Abstract:
Lin and Lin have recently shown how starting with a classical query algorithm (decision tree) for a function, we may find upper bounds on its quantum query complexity. More precisely, they have shown that given a decision tree for a function $f:\{0,1\}^n\to[m]$ whose input can be accessed via queries to its bits, and a guessing algorithm that predicts answers to the queries, there is a quantum que…
▽ More
Lin and Lin have recently shown how starting with a classical query algorithm (decision tree) for a function, we may find upper bounds on its quantum query complexity. More precisely, they have shown that given a decision tree for a function $f:\{0,1\}^n\to[m]$ whose input can be accessed via queries to its bits, and a guessing algorithm that predicts answers to the queries, there is a quantum query algorithm for $f$ which makes at most $O(\sqrt{GT})$ quantum queries where $T$ is the depth of the decision tree and $G$ is the maximum number of mistakes of the guessing algorithm. In this paper we give a simple proof of and generalize this result for functions $f:[\ell]^n \to [m]$ with non-binary input as well as output alphabets. Our main tool for this generalization is non-binary span program which has recently been developed for non-binary functions, and the dual adversary bound. As applications of our main result we present several quantum query upper bounds, some of which are new. In particular, we show that topological sorting of vertices of a directed graph $\mathcal{G}$ can be done with $O(n^{3/2})$ quantum queries in the adjacency matrix model. Also, we show that the quantum query complexity of the maximum bipartite matching is upper bounded by $O(n^{3/4}\sqrt m + n)$ in the adjacency list model.
△ Less
Submitted 28 February, 2020; v1 submitted 30 May, 2019;
originally announced May 2019.
-
A Correlation Measure Based on Vector-Valued $L_p$-Norms
Authors:
Mohammad Mahdi Mojahedian,
Salman Beigi,
Amin Gohari,
Mohammad Hossein Yassaee,
Mohammad Reza Aref
Abstract:
In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter $α$, and is defined in terms of vector-valued $L_p$-norms. The measure is within a constant of the exponential of $α$-Rényi mutual information, and reduces to the trace norm (total variation distance) for $α=1$. We will prove some decoupling type theorems in terms of this meas…
▽ More
In this paper, we introduce a new measure of correlation for bipartite quantum states. This measure depends on a parameter $α$, and is defined in terms of vector-valued $L_p$-norms. The measure is within a constant of the exponential of $α$-Rényi mutual information, and reduces to the trace norm (total variation distance) for $α=1$. We will prove some decoupling type theorems in terms of this measure of correlation, and present some applications in privacy amplification as well as in bounding the random coding exponents. In particular, we establish a bound on the secrecy exponent of the wiretap channel (under the total variation metric) in terms of the $α$-Rényi mutual information according to \emph{Csiszár's proposal}.
△ Less
Submitted 21 May, 2018;
originally announced May 2018.
-
Span Program for Non-binary Functions
Authors:
Salman Beigi,
Leila Taghavi
Abstract:
Span programs characterize the quantum query complexity of binary functions $f:\{0,\ldots,\ell\}^n \to \{0,1\}$ up to a constant factor. In this paper we generalize the notion of span programs for functions with non-binary input/output alphabets $f: [\ell]^n \to [m]$. We show that non-binary span program characterizes the quantum query complexity of any such function up to a constant factor. We ar…
▽ More
Span programs characterize the quantum query complexity of binary functions $f:\{0,\ldots,\ell\}^n \to \{0,1\}$ up to a constant factor. In this paper we generalize the notion of span programs for functions with non-binary input/output alphabets $f: [\ell]^n \to [m]$. We show that non-binary span program characterizes the quantum query complexity of any such function up to a constant factor. We argue that this non-binary span program is indeed the generalization of its binary counterpart.
We also generalize the notion of span programs for a special class of relations.
Learning graphs provide another tool for designing quantum query algorithms for binary functions. In this paper, we also generalize this tool for non-binary functions, and as an application of our non-binary span program show that any non-binary learning graph gives an upper bound on the quantum query complexity.
△ Less
Submitted 30 May, 2019; v1 submitted 7 May, 2018;
originally announced May 2018.
-
Quantum reverse hypercontractivity: its tensorization and application to strong converses
Authors:
Salman Beigi,
Nilanjana Datta,
Cambyse Rouzé
Abstract:
In this paper we develop the theory of quantum reverse hypercontractivity inequalities and show how they can be derived from log-Sobolev inequalities. Next we prove a generalization of the Stroock-Varopoulos inequality in the non-commutative setting which allows us to derive quantum hypercontractivity and reverse hypercontractivity inequalities solely from $2$-log-Sobolev and $1$-log-Sobolev inequ…
▽ More
In this paper we develop the theory of quantum reverse hypercontractivity inequalities and show how they can be derived from log-Sobolev inequalities. Next we prove a generalization of the Stroock-Varopoulos inequality in the non-commutative setting which allows us to derive quantum hypercontractivity and reverse hypercontractivity inequalities solely from $2$-log-Sobolev and $1$-log-Sobolev inequalities respectively. We then prove some tensorization-type results providing us with tools to prove hypercontractivity and reverse hypercontractivity not only for certain quantum superoperators but also for their tensor powers. Finally as an application of these results, we generalize a recent technique for proving strong converse bounds in information theory via reverse hypercontractivity inequalities to the quantum setting. We prove strong converse bounds for the problems of quantum hypothesis testing and classical-quantum channel coding based on the quantum reverse hypercontractivity inequalities that we derive.
△ Less
Submitted 1 June, 2020; v1 submitted 26 April, 2018;
originally announced April 2018.
-
Complete Classification of Generalized Santha-Vazirani Sources
Authors:
Salman Beigi,
Andrej Bogdanov,
Omid Etesami,
Siyao Guo
Abstract:
Let $\mathcal{F}$ be a finite alphabet and $\mathcal{D}$ be a finite set of distributions over $\mathcal{F}$. A Generalized Santha-Vazirani (GSV) source of type $(\mathcal{F}, \mathcal{D})$, introduced by Beigi, Etesami and Gohari (ICALP 2015, SICOMP 2017), is a random sequence $(F_1, \dots, F_n)$ in $\mathcal{F}^n$, where $F_i$ is a sample from some distribution $d \in \mathcal{D}$ whose choice m…
▽ More
Let $\mathcal{F}$ be a finite alphabet and $\mathcal{D}$ be a finite set of distributions over $\mathcal{F}$. A Generalized Santha-Vazirani (GSV) source of type $(\mathcal{F}, \mathcal{D})$, introduced by Beigi, Etesami and Gohari (ICALP 2015, SICOMP 2017), is a random sequence $(F_1, \dots, F_n)$ in $\mathcal{F}^n$, where $F_i$ is a sample from some distribution $d \in \mathcal{D}$ whose choice may depend on $F_1, \dots, F_{i-1}$.
We show that all GSV source types $(\mathcal{F}, \mathcal{D})$ fall into one of three categories: (1) non-extractable; (2) extractable with error $n^{-Θ(1)}$; (3) extractable with error $2^{-Ω(n)}$. This rules out other error rates like $1/\log n$ or $2^{-\sqrt{n}}$.
We provide essentially randomness-optimal extraction algorithms for extractable sources. Our algorithm for category (2) sources extracts with error $\varepsilon$ from $n = \mathrm{poly}(1/\varepsilon)$ samples in time linear in $n$. Our algorithm for category (3) sources extracts $m$ bits with error $\varepsilon$ from $n = O(m + \log 1/\varepsilon)$ samples in time $\min\{O(nm2^m),n^{O(\lvert\mathcal{F}\rvert)}\}$.
We also give algorithms for classifying a GSV source type $(\mathcal{F}, \mathcal{D})$: Membership in category (1) can be decided in $\mathrm{NP}$, while membership in category (3) is polynomial-time decidable.
△ Less
Submitted 10 September, 2017;
originally announced September 2017.
-
Phi-Entropic Measures of Correlation
Authors:
Salman Beigi,
Amin Gohari
Abstract:
A measure of correlation is said to have the tensorization property if it is unchanged when computed for i.i.d.\ copies. More precisely, a measure of correlation between two random variables $(X, Y)$ denoted by $ρ(X, Y)$, has the tensorization property if $ρ(X^n, Y^n)=ρ(X, Y)$ where $(X^n, Y^n)$ is $n$ i.i.d.\ copies of $(X, Y)$.Two well-known examples of such measures are the maximal correlation…
▽ More
A measure of correlation is said to have the tensorization property if it is unchanged when computed for i.i.d.\ copies. More precisely, a measure of correlation between two random variables $(X, Y)$ denoted by $ρ(X, Y)$, has the tensorization property if $ρ(X^n, Y^n)=ρ(X, Y)$ where $(X^n, Y^n)$ is $n$ i.i.d.\ copies of $(X, Y)$.Two well-known examples of such measures are the maximal correlation and the hypercontractivity ribbon (HC~ribbon). We show that the maximal correlation and HC ribbons are special cases of $Φ$-ribbon, defined in this paper for any function $Φ$ from a class of convex functions ($Φ$-ribbon reduces to HC~ribbon and the maximal correlation for special choices of $Φ$). Any $Φ$-ribbon is shown to be a measures of correlation with the tensorization property. We show that the $Φ$-ribbon also characterizes the $Φ$-strong data processing inequality constant introduced by Raginsky. We further study the $Φ$-ribbon for the choice of $Φ(t)=t^2$ and introduce an equivalent characterization of this ribbon.
△ Less
Submitted 4 November, 2016;
originally announced November 2016.
-
On the Optimality of Time Division for Broadcast Channels
Authors:
Salman Beigi
Abstract:
We provide a necessary and sufficient condition that under some technical assumption characterizes all two-receiver broadcast channels for which time division is optimal for transmission of private messages.
We provide a necessary and sufficient condition that under some technical assumption characterizes all two-receiver broadcast channels for which time division is optimal for transmission of private messages.
△ Less
Submitted 28 May, 2016;
originally announced May 2016.
-
Decoding quantum information via the Petz recovery map
Authors:
Salman Beigi,
Nilanjana Datta,
Felix Leditzky
Abstract:
We obtain a lower bound on the maximum number of qubits, $Q^{n, \varepsilon}({\mathcal{N}})$, which can be transmitted over $n$ uses of a quantum channel $\mathcal{N}$, for a given non-zero error threshold $\varepsilon$. To obtain our result, we first derive a bound on the one-shot entanglement transmission capacity of the channel, and then compute its asymptotic expansion up to the second order.…
▽ More
We obtain a lower bound on the maximum number of qubits, $Q^{n, \varepsilon}({\mathcal{N}})$, which can be transmitted over $n$ uses of a quantum channel $\mathcal{N}$, for a given non-zero error threshold $\varepsilon$. To obtain our result, we first derive a bound on the one-shot entanglement transmission capacity of the channel, and then compute its asymptotic expansion up to the second order. In our method to prove this achievability bound, the decoding map, used by the receiver on the output of the channel, is chosen to be the {\em{Petz recovery map}} (also known as the {\em{transpose channel}}). Our result, in particular, shows that this choice of the decoder can be used to establish the coherent information as an achievable rate for quantum information transmission. Applying our achievability bound to the 50-50 erasure channel (which has zero quantum capacity), we find that there is a sharp error threshold above which $Q^{n, \varepsilon}({\mathcal{N}})$ scales as $\sqrt{n}$.
△ Less
Submitted 9 January, 2017; v1 submitted 17 April, 2015;
originally announced April 2015.
-
On the Duality of Additivity and Tensorization
Authors:
Salman Beigi,
Amin Gohari
Abstract:
A function is said to be additive if, similar to mutual information, expands by a factor of $n$, when evaluated on $n$ i.i.d. repetitions of a source or channel. On the other hand, a function is said to satisfy the tensorization property if it remains unchanged when evaluated on i.i.d. repetitions. Additive rate regions are of fundamental importance in network information theory, serving as capaci…
▽ More
A function is said to be additive if, similar to mutual information, expands by a factor of $n$, when evaluated on $n$ i.i.d. repetitions of a source or channel. On the other hand, a function is said to satisfy the tensorization property if it remains unchanged when evaluated on i.i.d. repetitions. Additive rate regions are of fundamental importance in network information theory, serving as capacity regions or upper bounds thereof. Tensorizing measures of correlation have also found applications in distributed source and channel coding problems as well as the distribution simulation problem. Prior to our work only two measures of correlation, namely the hypercontractivity ribbon and maximal correlation (and their derivatives), were known to have the tensorization property. In this paper, we provide a general framework to obtain a region with the tensorization property from any additive rate region. We observe that hypercontractivity ribbon indeed comes from the dual of the rate region of the Gray-Wyner source coding problem, and generalize it to the multipartite case. Then we define other measures of correlation with similar properties from other source coding problems. We also present some applications of our results.
△ Less
Submitted 4 November, 2016; v1 submitted 3 February, 2015;
originally announced February 2015.
-
Deterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani Sources
Authors:
Salman Beigi,
Omid Etesami,
Amin Gohari
Abstract:
A Santha-Vazirani (SV) source is a sequence of random bits where the conditional distribution of each bit, given the previous bits, can be partially controlled by an adversary. Santha and Vazirani show that deterministic randomness extraction from these sources is impossible. In this paper, we study the generalization of SV sources for non-binary sequences. We show that unlike the binary case, det…
▽ More
A Santha-Vazirani (SV) source is a sequence of random bits where the conditional distribution of each bit, given the previous bits, can be partially controlled by an adversary. Santha and Vazirani show that deterministic randomness extraction from these sources is impossible. In this paper, we study the generalization of SV sources for non-binary sequences. We show that unlike the binary case, deterministic randomness extraction in the generalized case is sometimes possible. We present a necessary condition and a sufficient condition for the possibility of deterministic randomness extraction. These two conditions coincide in "non-degenerate" cases.
Next, we turn to a distributed setting. In this setting the SV source consists of a random sequence of pairs $(a_1, b_1), (a_2, b_2), \ldots$ distributed between two parties, where the first party receives $a_i$'s and the second one receives $b_i$'s. The goal of the two parties is to extract common randomness without communication. Using the notion of maximal correlation, we prove a necessary condition and a sufficient condition for the possibility of common randomness extraction from these sources. Based on these two conditions, the problem of common randomness extraction essentially reduces to the problem of randomness extraction from (non-distributed) SV sources. This result generalizes results of Gács and Körner, and Witsenhausen about common randomness extraction from i.i.d. sources to adversarial sources.
△ Less
Submitted 20 December, 2014;
originally announced December 2014.
-
Monotone Measures for Non-Local Correlations
Authors:
Salman Beigi,
Amin Gohari
Abstract:
Non-locality is the phenomenon of observing strong correlations among the outcomes of local measurements of a multipartite physical system. No-signaling boxes are the abstract objects for studying non-locality, and wirings are local operations on the space of no-signaling boxes. This means that, no matter how non-local the nature is, the set of physical non-local correlations must be closed under…
▽ More
Non-locality is the phenomenon of observing strong correlations among the outcomes of local measurements of a multipartite physical system. No-signaling boxes are the abstract objects for studying non-locality, and wirings are local operations on the space of no-signaling boxes. This means that, no matter how non-local the nature is, the set of physical non-local correlations must be closed under wirings. Then, one approach to identify the non-locality of nature is to characterize closed sets of non-local correlations. Although non-trivial examples of wirings of no-signaling boxes are known, there is no systematic way to study wirings. In particular, given a set of no-signaling boxes, we do not know a general method to prove that it is closed under wirings. In this paper, we propose the first general method to construct such closed sets of non-local correlations. We show that a well-known measure of correlation, called maximal correlation, when appropriately defined for non-local correlations, is monotonically decreasing under wirings.
This establishes a conjecture about the impossibility of simulating isotropic boxes from each other, implying the existence of a continuum of closed sets of non-local boxes under wirings. To prove our main result, we introduce some mathematical tools that may be of independent interest: we define a notion of maximal correlation ribbon as a generalization of maximal correlation, and provide a connection between it and a known object called hypercontractivity ribbon; we show that these two ribbons are monotone under wirings too.
△ Less
Submitted 11 January, 2017; v1 submitted 12 September, 2014;
originally announced September 2014.
-
The Value of Help Bits in Randomized and Average-Case Complexity
Authors:
Salman Beigi,
Omid Etesami,
Amin Gohari
Abstract:
"Help bits" are some limited trusted information about an instance or instances of a computational problem that may reduce the computational complexity of solving that instance or instances. In this paper, we study the value of help bits in the settings of randomized and average-case complexity.
Amir, Beigel, and Gasarch (1990) show that for constant $k$, if $k$ instances of a decision problem c…
▽ More
"Help bits" are some limited trusted information about an instance or instances of a computational problem that may reduce the computational complexity of solving that instance or instances. In this paper, we study the value of help bits in the settings of randomized and average-case complexity.
Amir, Beigel, and Gasarch (1990) show that for constant $k$, if $k$ instances of a decision problem can be efficiently solved using less than $k$ bits of help, then the problem is in P/poly. We extend this result to the setting of randomized computation: We show that the decision problem is in P/poly if using $\ell$ help bits, $k$ instances of the problem can be efficiently solved with probability greater than $2^{\ell-k}$. The same result holds if using less than $k(1 - h(α))$ help bits (where $h(\cdot)$ is the binary entropy function), we can efficiently solve $(1-α)$ fraction of the instances correctly with non-vanishing probability. We also extend these two results to non-constant but logarithmic $k$. In this case however, instead of showing that the problem is in P/poly we show that it satisfies "$k$-membership comparability," a notion known to be related to solving $k$ instances using less than $k$ bits of help.
Next we consider the setting of average-case complexity: Assume that we can solve $k$ instances of a decision problem using some help bits whose entropy is less than $k$ when the $k$ instances are drawn independently from a particular distribution. Then we can efficiently solve an instance drawn from that distribution with probability better than $1/2$.
Finally, we show that in the case where $k$ is super-logarithmic, assuming $k$-membership comparability of a decision problem, one cannot prove that the problem is in P/poly by a "black-box proof."
△ Less
Submitted 3 August, 2014;
originally announced August 2014.
-
Maximal Entanglement - A New Measure of Entanglement
Authors:
Salman Beigi
Abstract:
Maximal correlation is a measure of correlation for bipartite distributions. This measure has two intriguing features: (1) it is monotone under local stochastic maps; (2) it gives the same number when computed on i.i.d. copies of a pair of random variables. This measure of correlation has recently been generalized for bipartite quantum states, for which the same properties have been proved. In thi…
▽ More
Maximal correlation is a measure of correlation for bipartite distributions. This measure has two intriguing features: (1) it is monotone under local stochastic maps; (2) it gives the same number when computed on i.i.d. copies of a pair of random variables. This measure of correlation has recently been generalized for bipartite quantum states, for which the same properties have been proved. In this paper, based on maximal correlation, we define a new measure of entanglement which we call maximal entanglement. We show that this measure of entanglement is faithful (is zero on separable states and positive on entangled states), is monotone under local quantum operations, and gives the same number when computed on tensor powers of a bipartite state.
△ Less
Submitted 11 May, 2014;
originally announced May 2014.
-
Quantum Achievability Proof via Collision Relative Entropy
Authors:
Salman Beigi,
Amin Gohari
Abstract:
In this paper, we provide a simple framework for deriving one-shot achievable bounds for some problems in quantum information theory. Our framework is based on the joint convexity of the exponential of the collision relative entropy, and is a (partial) quantum generalization of the technique of Yassaee et al. (2013) from classical information theory. Based on this framework, we derive one-shot ach…
▽ More
In this paper, we provide a simple framework for deriving one-shot achievable bounds for some problems in quantum information theory. Our framework is based on the joint convexity of the exponential of the collision relative entropy, and is a (partial) quantum generalization of the technique of Yassaee et al. (2013) from classical information theory. Based on this framework, we derive one-shot achievable bounds for the problems of communication over classical-quantum channels, quantum hypothesis testing, and classical data compression with quantum side information. We argue that our one-shot achievable bounds are strong enough to give the asymptotic achievable rates of these problems even up to the second order.
△ Less
Submitted 11 January, 2017; v1 submitted 13 December, 2013;
originally announced December 2013.
-
Impossibility of Local State Transformation via Hypercontractivity
Authors:
Payam Delgosha,
Salman Beigi
Abstract:
Local state transformation is the problem of transforming an arbitrary number of copies of a bipartite resource state to a bipartite target state under local operations. That is, given two bipartite states, is it possible to transform an arbitrary number of copies of one of them to one copy of the other state under local operations only? This problem is a hard one in general since we assume that t…
▽ More
Local state transformation is the problem of transforming an arbitrary number of copies of a bipartite resource state to a bipartite target state under local operations. That is, given two bipartite states, is it possible to transform an arbitrary number of copies of one of them to one copy of the other state under local operations only? This problem is a hard one in general since we assume that the number of copies of the resource state is arbitrarily large. In this paper we prove some bounds on this problem using the hypercontractivity properties of some super-operators corresponding to bipartite states. We measure hypercontractivity in terms of both the usual super-operator norms as well as completely bounded norms.
△ Less
Submitted 24 July, 2013; v1 submitted 10 July, 2013;
originally announced July 2013.
-
Sandwiched Rényi Divergence Satisfies Data Processing Inequality
Authors:
Salman Beigi
Abstract:
Sandwiched (quantum) $α$-Rényi divergence has been recently defined in the independent works of Wilde et al. (arXiv:1306.1586) and Müller-Lennert et al (arXiv:1306.3142v1). This new quantum divergence has already found applications in quantum information theory. Here we further investigate properties of this new quantum divergence. In particular we show that sandwiched $α$-Rényi divergence satisfi…
▽ More
Sandwiched (quantum) $α$-Rényi divergence has been recently defined in the independent works of Wilde et al. (arXiv:1306.1586) and Müller-Lennert et al (arXiv:1306.3142v1). This new quantum divergence has already found applications in quantum information theory. Here we further investigate properties of this new quantum divergence. In particular we show that sandwiched $α$-Rényi divergence satisfies the data processing inequality for all values of $α> 1$. Moreover we prove that $α$-Holevo information, a variant of Holevo information defined in terms of sandwiched $α$-Rényi divergence, is super-additive. Our results are based on Hölder's inequality, the Riesz-Thorin theorem and ideas from the theory of complex interpolation. We also employ Sion's minimax theorem.
△ Less
Submitted 22 November, 2013; v1 submitted 25 June, 2013;
originally announced June 2013.
-
Simulation of a Channel with Another Channel
Authors:
Farzin Haddadpour,
Mohammad Hossein Yassaee,
Salman Beigi,
Amin Gohari,
Mohammad Reza Aref
Abstract:
In this paper, we study the problem of simulating a DMC channel from another DMC channel under an average-case and an exact model. We present several achievability and infeasibility results, with tight characterizations in special cases. In particular for the exact model, we fully characterize when a BSC channel can be simulated from a BEC channel when there is no shared randomness. We also provid…
▽ More
In this paper, we study the problem of simulating a DMC channel from another DMC channel under an average-case and an exact model. We present several achievability and infeasibility results, with tight characterizations in special cases. In particular for the exact model, we fully characterize when a BSC channel can be simulated from a BEC channel when there is no shared randomness. We also provide infeasibility and achievability results for simulation of a binary channel from another binary channel in the case of no shared randomness. To do this, we use properties of Rényi capacity of a given order. We also introduce a notion of "channel diameter" which is shown to be additive and satisfy a data processing inequality.
△ Less
Submitted 1 December, 2016; v1 submitted 25 May, 2013;
originally announced May 2013.
-
Symmetries of Codeword Stabilized Quantum Codes
Authors:
Salman Beigi,
Jianxin Chen,
Markus Grassl,
Zhengfeng Ji,
Qiang Wang,
Bei Zeng
Abstract:
Symmetry is at the heart of coding theory. Codes with symmetry, especially cyclic codes, play an essential role in both theory and practical applications of classical error-correcting codes. Here we examine symmetry properties for codeword stabilized (CWS) quantum codes, which is the most general framework for constructing quantum error-correcting codes known to date. A CWS code Q can be represent…
▽ More
Symmetry is at the heart of coding theory. Codes with symmetry, especially cyclic codes, play an essential role in both theory and practical applications of classical error-correcting codes. Here we examine symmetry properties for codeword stabilized (CWS) quantum codes, which is the most general framework for constructing quantum error-correcting codes known to date. A CWS code Q can be represented by a self-dual additive code S and a classical code C, i.,e., Q=(S,C), however this representation is in general not unique. We show that for any CWS code Q with certain permutation symmetry, one can always find a self-dual additive code S with the same permutation symmetry as Q such that Q=(S,C). As many good CWS codes have been found by starting from a chosen S, this ensures that when trying to find CWS codes with certain permutation symmetry, the choice of S with the same symmetry will suffice. A key step for this result is a new canonical representation for CWS codes, which is given in terms of a unique decomposition as union stabilizer codes. For CWS codes, so far mainly the standard form (G,C) has been considered, where G is a graph state. We analyze the symmetry of the corresponding graph of G, which in general cannot possess the same permutation symmetry as Q. We show that it is indeed the case for the toric code on a square lattice with translational symmetry, even if its encoding graph can be chosen to be translational invariant.
△ Less
Submitted 8 April, 2013; v1 submitted 27 March, 2013;
originally announced March 2013.
-
A New Quantum Data Processing Inequality
Authors:
Salman Beigi
Abstract:
Quantum data processing inequality bounds the set of bipartite states that can be generated by two far apart parties under local operations; Having access to a bipartite state as a resource, two parties cannot locally transform it to another bipartite state with a mutual information greater than that of the resource state. But due to the additivity of quantum mutual information under tensor produc…
▽ More
Quantum data processing inequality bounds the set of bipartite states that can be generated by two far apart parties under local operations; Having access to a bipartite state as a resource, two parties cannot locally transform it to another bipartite state with a mutual information greater than that of the resource state. But due to the additivity of quantum mutual information under tensor product, the data processing inequality gives no bound when the parties are provided with arbitrary number of copies of the resource state. In this paper we introduce a measure of correlation on bipartite quantum states, called maximal correlation, that is not additive and gives the same number when computed for multiple copies. Then by proving a data processing inequality for this measure, we find a bound on the set of states that can be generated under local operations even when an arbitrary number of copies of the resource state is available.
△ Less
Submitted 11 March, 2023; v1 submitted 5 October, 2012;
originally announced October 2012.
-
On Dimension Bounds for Auxiliary Quantum Systems
Authors:
Salman Beigi,
Amin Gohari
Abstract:
Expressions of several capacity regions in quantum information theory involve an optimization over auxiliary quantum registers. Evaluating such expressions requires bounds on the dimension of the Hilbert space of these auxiliary registers, for which no non-trivial technique is known; we lack a quantum analog of the Carathéodory theorem. In this paper, we develop a new non-Carathéodory-type tool fo…
▽ More
Expressions of several capacity regions in quantum information theory involve an optimization over auxiliary quantum registers. Evaluating such expressions requires bounds on the dimension of the Hilbert space of these auxiliary registers, for which no non-trivial technique is known; we lack a quantum analog of the Carathéodory theorem. In this paper, we develop a new non-Carathéodory-type tool for evaluating expressions involving a single quantum auxiliary register and several classical random variables. As we show, such expressions appear in problems of entanglement-assisted Gray-Wyner and entanglement-assisted channel simulation, where the question of whether entanglement helps in these settings is related to that of evaluating expressions with a single quantum auxiliary register. To evaluate such expressions, we argue that develo** a quantum analog of the Carathéodory theorem requires a better understanding of a notion which we call ``quantum conditioning." We then proceed by proving a few results about quantum conditioning, one of which is that quantum conditioning is strictly richer than the usual classical conditioning.
△ Less
Submitted 15 November, 2013; v1 submitted 17 July, 2012;
originally announced July 2012.
-
Scale-Invariant Local Descriptor for Event Recognition in 1D Sensor Signals
Authors:
Jierui Xie,
Mandis S. Beigi
Abstract:
In this paper, we introduce a shape-based, time-scale invariant feature descriptor for 1-D sensor signals. The time-scale invariance of the feature allows us to use feature from one training event to describe events of the same semantic class which may take place over varying time scales such as walking slow and walking fast. Therefore it requires less training set. The descriptor takes advantage…
▽ More
In this paper, we introduce a shape-based, time-scale invariant feature descriptor for 1-D sensor signals. The time-scale invariance of the feature allows us to use feature from one training event to describe events of the same semantic class which may take place over varying time scales such as walking slow and walking fast. Therefore it requires less training set. The descriptor takes advantage of the invariant location detection in the scale space theory and employs a high level shape encoding scheme to capture invariant local features of events. Based on this descriptor, a scale-invariant classifier with "R" metric (SIC-R) is designed to recognize multi-scale events of human activities. The R metric combines the number of matches of keypoint in scale space with the Dynamic Time War** score. SICR is tested on various types of 1-D sensors data from passive infrared, accelerometer and seismic sensors with more than 90% classification accuracy.
△ Less
Submitted 27 May, 2011;
originally announced May 2011.
-
Quantum interactive proofs with short messages
Authors:
Salman Beigi,
Peter W. Shor,
John Watrous
Abstract:
This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The first variant is one in which the verifier sends a short message to the prover, and the prover responds with an ordinary, or polynomial-length, message; the second variant is one in which any number of messages can be excha…
▽ More
This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The first variant is one in which the verifier sends a short message to the prover, and the prover responds with an ordinary, or polynomial-length, message; the second variant is one in which any number of messages can be exchanged, but where the combined length of all the messages is logarithmic; and the third variant is one in which the verifier sends polynomially many random bits to the prover, who responds with a short quantum message. We prove that in all of these cases the short messages can be eliminated without changing the power of the model, so the first variant has the expressive power of QMA and the second and third variants have the expressive power of BQP. These facts are proved through the use of quantum state tomography, along with the finite quantum de Finetti theorem for the first variant.
△ Less
Submitted 21 June, 2011; v1 submitted 2 April, 2010;
originally announced April 2010.
-
Entanglement-assisted zero-error capacity is upper bounded by the Lovasz theta function
Authors:
Salman Beigi
Abstract:
The zero-error capacity of a classical channel is expressed in terms of the independence number of some graph and its tensor powers. This quantity is hard to compute even for small graphs such as the cycle of length seven, so upper bounds such as the Lovasz theta function play an important role in zero-error communication. In this paper, we show that the Lovasz theta function is an upper bound on…
▽ More
The zero-error capacity of a classical channel is expressed in terms of the independence number of some graph and its tensor powers. This quantity is hard to compute even for small graphs such as the cycle of length seven, so upper bounds such as the Lovasz theta function play an important role in zero-error communication. In this paper, we show that the Lovasz theta function is an upper bound on the zero-error capacity even in the presence of entanglement between the sender and receiver.
△ Less
Submitted 21 June, 2011; v1 submitted 12 February, 2010;
originally announced February 2010.
-
An Efficient Algorithm to Recognize Locally Equivalent Graphs in Non-Binary Case
Authors:
Mohsen Bahramgiri,
Salman Beigi
Abstract:
Let $v$ be a vertex of a graph $G$. By the local complementation of $G$ at $v$ we mean to complement the subgraph induced by the neighbors of $v$. This operator can be generalized as follows. Assume that, each edge of $G$ has a label in the finite field $\mathbf{F}_q$. Let $(g_{ij})$ be set of labels ($g_{ij}$ is the label of edge $ij$). We define two types of operators. For the first one, let…
▽ More
Let $v$ be a vertex of a graph $G$. By the local complementation of $G$ at $v$ we mean to complement the subgraph induced by the neighbors of $v$. This operator can be generalized as follows. Assume that, each edge of $G$ has a label in the finite field $\mathbf{F}_q$. Let $(g_{ij})$ be set of labels ($g_{ij}$ is the label of edge $ij$). We define two types of operators. For the first one, let $v$ be a vertex of $G$ and $a\in \mathbf{F}_q$, and obtain the graph with labels $g'_{ij}=g_{ij}+ag_{vi}g_{vj}$. For the second, if $0\neq b\in \mathbf{F}_q$ the resulted graph is a graph with labels $g''_{vi}=bg_{vi}$ and $g''_{ij}=g_{ij}$, for $i,j$ unequal to $v$. It is clear that if the field is binary, the operators are just local complementations that we described.
The problem of whether two graphs are equivalent under local complementations has been studied, \cite{bouchalg}. Here we consider the general case and assuming that $q$ is odd, present the first known efficient algorithm to verify whether two graphs are locally equivalent or not.
△ Less
Submitted 1 July, 2007; v1 submitted 9 February, 2007;
originally announced February 2007.