Skip to main content

Showing 1–8 of 8 results for author: Shapiro, J H

Searching in archive cs. Search in all archives.
.
  1. Secret key distillation across a quantum wiretap channel under restricted eavesdrop**

    Authors: Ziwen Pan, Kaushik P. Seshadreesan, William Clark, Mark R. Adcock, Ivan B. Djordjevic, Jeffrey H. Shapiro, Saikat Guha

    Abstract: The theory of quantum cryptography aims to guarantee unconditional information-theoretic security against an omnipotent eavesdropper. In many practical scenarios, however, the assumption of an all-powerful adversary is excessive and can be relaxed considerably. In this paper we study secret key distillation across a lossy and noisy quantum wiretap channel between Alice and Bob, with a separately p… ▽ More

    Submitted 18 April, 2019; v1 submitted 7 March, 2019; originally announced March 2019.

    Comments: 14 pages, 19 figures. We welcome comments and suggestions

    Journal ref: Phys. Rev. Applied 14, 024044 (2020)

  2. Thinning, photonic beamsplitting, and a general discrete entropy power inequality

    Authors: Saikat Guha, Jeffrey H. Shapiro, Raul Garcia-Patron Sanchez

    Abstract: Many partially-successful attempts have been made to find the most natural discrete-variable version of Shannon's entropy power inequality (EPI). We develop an axiomatic framework from which we deduce the natural form of a discrete-variable EPI and an associated entropic monotonicity in a discrete-variable central limit theorem. In this discrete EPI, the geometric distribution, which has the maxim… ▽ More

    Submitted 25 May, 2016; originally announced May 2016.

    Comments: 6 pages, 1 figure. To be presented at the IEEE International Symposium on Information Theory 2016

  3. Quantum enigma machines and the locking capacity of a quantum channel

    Authors: Saikat Guha, Patrick Hayden, Hari Krovi, Seth Lloyd, Cosmo Lupo, Jeffrey H. Shapiro, Masahiro Takeoka, Mark M. Wilde

    Abstract: The locking effect is a phenomenon which is unique to quantum information theory and represents one of the strongest separations between the classical and quantum theories of information. The Fawzi-Hayden-Sen (FHS) locking protocol harnesses this effect in a cryptographic context, whereby one party can encode n bits into n qubits while using only a constant-size secret key. The encoded message is… ▽ More

    Submitted 9 November, 2013; v1 submitted 19 July, 2013; originally announced July 2013.

    Comments: 37 pages

    Journal ref: Physical Review X vol. 4, no. 1, page 011016 (January 2014)

  4. Capacity of optical reading, Part 1: Reading boundless error-free bits using a single photon

    Authors: Saikat Guha, Jeffrey H. Shapiro

    Abstract: We show that nature imposes no fundamental upper limit to the number of information bits per expended photon that can, in principle, be read reliably when classical data is encoded in a medium that can only passively modulate the amplitude and phase of the probe light. We show that with a coherent-state (laser) source, an on-off (amplitude-modulation) pixel encoding, and shot-noise-limited direct… ▽ More

    Submitted 15 February, 2013; v1 submitted 26 July, 2012; originally announced July 2012.

    Comments: 11 pages, 12 figures, v3 includes a new plot characterizing the photon efficiency vs. encoding efficiency tradeoff for optical reading. The main technical body of the paper remains unaltered

    Journal ref: Phys. Rev. A 87, 062306 (2013)

  5. On quantum limit of optical communications: concatenated codes and joint-detection receivers

    Authors: Saikat Guha, Zachary Dutton, Jeffrey H. Shapiro

    Abstract: When classical information is sent over a channel with quantum-state modulation alphabet, such as the free-space optical (FSO) channel, attaining the ultimate (Holevo) limit to channel capacity requires the receiver to make joint measurements over long codeword blocks. In recent work, we showed a receiver for a pure-state channel that can attain the ultimate capacity by applying a single-shot opti… ▽ More

    Submitted 9 February, 2011; originally announced February 2011.

    Comments: 5 pages, 7 figures, submitted to IEEE International Symposium on Information Theory (ISIT), 2011

  6. arXiv:0810.3564  [pdf, ps, other

    cs.IT

    The Poisson Channel at Low Input Powers

    Authors: Amos Lapidoth, Jeffrey H. Shapiro, Vinodh Venkatesan, Ligong Wang

    Abstract: The asymptotic capacity at low input powers of an average-power limited or an average- and peak-power limited discrete-time Poisson channel is considered. For a Poisson channel whose dark current is zero or decays to zero linearly with its average input power $E$, capacity scales like $E\log\frac{1}{E}$ for small $E$. For a Poisson channel whose dark current is a nonzero constant, capacity scale… ▽ More

    Submitted 20 October, 2008; originally announced October 2008.

    Comments: To be presented at IEEEI 2008, December 3-5 2008, Eilat, Israel

  7. arXiv:0801.0841  [pdf, ps, other

    quant-ph cs.IT

    Capacity of the Bosonic Wiretap Channel and the Entropy Photon-Number Inequality

    Authors: Saikat Guha, Jeffrey H. Shapiro, Baris I. Erkmen

    Abstract: Determining the ultimate classical information carrying capacity of electromagnetic waves requires quantum-mechanical analysis to properly account for the bosonic nature of these waves. Recent work has established capacity theorems for bosonic single-user and broadcast channels, under the presumption of two minimum output entropy conjectures. Despite considerable accumulated evidence that suppor… ▽ More

    Submitted 6 January, 2008; originally announced January 2008.

    Comments: 5 pages, 1 figure, submitted to ISIT 2008

  8. arXiv:0710.5666  [pdf, ps, other

    quant-ph cs.IT

    The Entropy Photon-Number Inequality and its Consequences

    Authors: Saikat Guha, Baris I. Erkmen, Jeffrey H. Shapiro

    Abstract: Determining the ultimate classical information carrying capacity of electromagnetic waves requires quantum-mechanical analysis to properly account for the bosonic nature of these waves. Recent work has established capacity theorems for bosonic single-user, broadcast, and wiretap channels, under the presumption of two minimum output entropy conjectures. Despite considerable accumulated evidence t… ▽ More

    Submitted 9 November, 2007; v1 submitted 30 October, 2007; originally announced October 2007.

    Comments: 3 pages, submitted to "Open Problems Session, ITA 2008, UCSD"