Skip to main content

Showing 1–50 of 187 results for author: Hayashi, M

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2406.17299  [pdf, ps, other

    quant-ph

    Measuring quantum relative entropy with finite-size effect

    Authors: Masahito Hayashi

    Abstract: We study the estimation of relative entropy $D(ρ\|σ)$ when $σ$ is known. We show that the Cramér-Rao type bound equals the relative varentropy. Our estimator attains the Cramér-Rao type bound when the dimension $d$ is fixed. It also achieves the sample complexity $O(d^2)$ when the dimension $d$ increases. This sample complexity is optimal when $σ$ is the complexity mixed state. Also, it has time c… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  2. arXiv:2406.09854  [pdf, other

    quant-ph cs.IT

    Three-Receiver Quantum Broadcast Channels: Classical Communication with Quantum Non-unique Decoding

    Authors: Farzin Salek, Patrick Hayden, Masahito Hayashi

    Abstract: In network communication, it is common in broadcasting scenarios for there to exist a hierarchy among receivers based on information they decode due, for example, to different physical conditions or premium subscriptions. This hierarchy may result in varied information quality, such as higher-quality video for certain receivers. This is modeled mathematically as a degraded message set, indicating… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

  3. arXiv:2404.16550  [pdf, ps, other

    quant-ph

    Alexander S. Holevo's Researches in Quantum Information Theory in 20th Century

    Authors: Masahito Hayashi

    Abstract: This paper reviews Holevo's contributions to quantum information theory during the 20 century. At that time, he mainly studied three topics, classical-quantum channel coding, quantum estimation with Cramero-Rao approach, and quantum estimation with the group covariant approach. This paper addresses these three topics.

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: This paper has been acceepted for the publication in International Journal of Quantum Information on Apr 25, 2024

  4. arXiv:2403.09252  [pdf, other

    cs.IT math.OC quant-ph

    Reverse em-problem based on Bregman divergence and its application to classical and quantum information theory

    Authors: Masahito Hayashi

    Abstract: The recent paper (IEEE Trans. IT 69, 1680) introduced an analytical method for calculating the channel capacity without the need for iteration. This method has certain limitations that restrict its applicability. Furthermore, the paper does not provide an explanation as to why the channel capacity can be solved analytically in this particular case. In order to broaden the scope of this method and… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  5. arXiv:2401.05886  [pdf, other

    quant-ph

    Finding the optimal probe state for multiparameter quantum metrology using conic programming

    Authors: Masahito Hayashi, Yingkai Ouyang

    Abstract: The aim of the channel estimation is to estimate the parameters encoded in a quantum channel. For this aim, it is allowed to choose the input state as well as the measurement to get the outcome. Various precision bounds are known for the state estimation. For the channel estimation, the respective bounds are determined depending on the choice of the input state. However, determining the optimal in… ▽ More

    Submitted 26 January, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

    Comments: 36 pages, 2 columns, 5 figures. Title change, added references, and edited introduction

  6. arXiv:2312.06151  [pdf, other

    quant-ph

    Measurement-Device-Independent Detection of Beyond-Quantum State

    Authors: Baichu Yu, Masahito Hayashi

    Abstract: In quantum theory, a quantum state on a composite system of two parties realizes a non-negative probability with any measurement element with a tensor product form. However, there also exist non-quantum states which satisfy the above condition. Such states are called beyond-quantum states, and cannot be detected by standard Bell tests. To distinguish a beyond-quantum state from quantum states, we… ▽ More

    Submitted 31 December, 2023; v1 submitted 11 December, 2023; originally announced December 2023.

    Comments: 10 pages, 1 figures

  7. arXiv:2311.11189  [pdf, other

    quant-ph

    Entanglement measures for detectability

    Authors: Masahito Hayashi, Yuki Ito

    Abstract: We propose new entanglement measures as the detection performance based on the hypothesis testing setting. We clarify how our measures work for detecting an entangled state by extending the quantum Sanov theorem. Our analysis covers the finite-length setting. Exploiting this entanglement measure, we present how to derive entanglement witness to detect the given entangled state by using the geometr… ▽ More

    Submitted 30 December, 2023; v1 submitted 18 November, 2023; originally announced November 2023.

  8. arXiv:2311.11188  [pdf, other

    quant-ph

    Generalized quantum Arimoto-Blahut algorithm and its application to quantum information bottleneck

    Authors: Masahito Hayashi, Geng Liu

    Abstract: We generalize the quantum Arimoto-Blahut algorithm by Ramakrishnan et al. (IEEE Trans. IT, 67, 946 (2021)) to a function defined over a set of density matrices with linear constraints so that our algorithm can be applied to optimizations of quantum operations. This algorithm has wider applicability. Hence, we apply our algorithm to the quantum information bottleneck with three quantum systems, whi… ▽ More

    Submitted 12 January, 2024; v1 submitted 18 November, 2023; originally announced November 2023.

  9. arXiv:2311.10307  [pdf, other

    quant-ph

    Cohernece in permutation-invariant state enhances permutation-asymmetry

    Authors: Masahito Hayashi

    Abstract: A Dicke state and its decohered state are invariant for permutation. However, when another qubits state to each of them is attached, the whole state is not invariant for permutation, and has a certain asymmetry for permutation. The amount of asymmetry can be measured by the number of distinguishable states under the group action or the mutual information. This paper investigates how the coherence… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: The paper arXiv:2104.12635v1 was divided into three parts. This paper is an extended version of the third part of arXiv:2104.12635v1. The second part was posted as arXiv:2104.12635v2, and the first part was posted as arXiv:2311.09992

  10. arXiv:2307.11271  [pdf, other

    quant-ph

    Derivation of Standard Quantum Theory via State Discrimination

    Authors: Hayato Arai, Masahito Hayashi

    Abstract: It is a key issue to characterize the model of standard quantum theory out of general models by an operational condition. The framework of General Probabilistic Theories (GPTs) is a new information theoretical approach to single out standard quantum theory. It is known that traditional properties, for example, Bell-CHSH inequality are not sufficient to single out standard quantum theory among poss… ▽ More

    Submitted 15 February, 2024; v1 submitted 20 July, 2023; originally announced July 2023.

    Comments: 17 pages, 1 figure

  11. When quantum memory is useful for dense coding

    Authors: Ryuji Takagi, Masahito Hayashi

    Abstract: We discuss dense coding with $n$ copies of a specific preshared state between the sender and the receiver when the encoding operation is limited to the application of group representation. Typically, to act on multiple local copies of these preshared states, the receiver needs quantum memory, because in general the multiple copies will be generated sequentially. Depending on available encoding uni… ▽ More

    Submitted 9 June, 2024; v1 submitted 19 June, 2023; originally announced June 2023.

    Comments: 32 pages, 1 figure

    Journal ref: Lett. Math. Phys. 114, 88 (2024)

  12. Robust and efficient verification of graph states in blind measurement-based quantum computation

    Authors: Zihao Li, Huangjun Zhu, Masahito Hayashi

    Abstract: Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients. Measurement-based quantum computation (MBQC) is a promising approach for realizing BQC. To obtain reliable results in blind MBQC, it is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario. However, previous verification protocols for this… ▽ More

    Submitted 19 November, 2023; v1 submitted 18 May, 2023; originally announced May 2023.

    Comments: 14+32 pages, 8+5 figures, and 1 table; published in npj Quantum Information

    Journal ref: npj Quantum Inf. 9, 115 (2023)

  13. arXiv:2304.05125  [pdf, ps, other

    quant-ph

    Prior Entanglement Exponentially Improves One-Server Quantum Private Information Retrieval for Quantum Messages

    Authors: Seunghoan Song, Francois Le Gall, Masahito Hayashi

    Abstract: Quantum private information retrieval (QPIR) for quantum messages is a quantum communication task, in which a user retrieves one of the multiple quantum states from the server without revealing which state is retrieved. In the one-server setting, we find an exponential gap in the communication complexities between the presence and absence of prior entanglement in this problem with the one-server s… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

  14. arXiv:2302.06899  [pdf, other

    quant-ph math-ph

    Special functions in quantum phase estimation

    Authors: Masahito Hayashi

    Abstract: This paper explains existing results for the application of special functions to phase estimation, which is a fundamental topic in quantum information. We focus on two special functions. One is prolate spheroidal wave function, which approximately gives the maximum probability that the difference between the true parameter and the estimate is smaller than a certain threshold. The other is Mathieu… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

  15. arXiv:2301.04196  [pdf, other

    quant-ph

    Detection of Beyond-Quantum Non-locality based on Standard Local Quantum Observables

    Authors: Hayato Arai, Baichu Yu, Masahito Hayashi

    Abstract: Device independent detections of quantum non-locality like Bell-CHSH inequality are important methods to detect quantum non-locality because the whole protocol can be implemented by uncertified local observables. However, this detection is not sufficient for the justification of standard quantum theory, because there are theoretically many types of beyond-quantum non-local states in General Probab… ▽ More

    Submitted 15 May, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

    Comments: 8 pages, 2 figure

  16. arXiv:2211.03308  [pdf, other

    quant-ph cs.CR cs.IR cs.IT

    Two-Server Oblivious Transfer for Quantum Messages

    Authors: Masahito Hayashi, Seunghoan Song

    Abstract: Oblivious transfer is considered as a cryptographic primitive task for quantum information processing over quantum network. Although it is possible with two servers, any existing protocol works only with classical messages. We propose two-server oblivious transfer protocols for quantum messages.

    Submitted 7 November, 2022; originally announced November 2022.

  17. arXiv:2211.00962  [pdf, other

    quant-ph cs.CR

    Oblivious Quantum Computation and Delegated Multiparty Quantum Computation

    Authors: Masahito Hayashi

    Abstract: We propose a new concept, oblivious quantum computation, which requires performing oblivious transfer with respect to the computation outcome of the quantum computation, where the secrecy of the input qubits and the program to identify the quantum gates are required. Exploiting quantum teleportation, we propose a two-server protocol for this task, which realizes an exponential improvement for the… ▽ More

    Submitted 11 May, 2023; v1 submitted 2 November, 2022; originally announced November 2022.

  18. Compression for Qubit Clocks

    Authors: Yuxiang Yang, Giulio Chiribella, Masahito Hayashi

    Abstract: Two-Ievel (qubit) clock systems are often used to perform precise measurement of time. In this work, we propose a compression protocol for $n$ identically prepared states of qubit clocks. The protocol faithfully encodes the states into $(1/2)\log n$ qubits and $(1/2)\log n$ classical bits and works even in the presence of noise. If the purity of the clock states is fixed, $(1/2)\log n$ qubits are… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Comments: 5 pages; published version. arXiv admin note: substantial text overlap with arXiv:1703.05876

    Journal ref: 2018 IEEE International Symposium on Information Theory (ISIT), pp. 2476-2480

  19. Tight Cramér-Rao type bounds for multiparameter quantum metrology through conic programming

    Authors: Masahito Hayashi, Yingkai Ouyang

    Abstract: In the quest to unlock the maximum potential of quantum sensors, it is of paramount importance to have practical measurement strategies that can estimate incompatible parameters with best precisions possible. However, it is still not known how to find practical measurements with optimal precisions, even for uncorrelated measurements over probe states. Here, we give a concrete way to find uncorrela… ▽ More

    Submitted 22 August, 2023; v1 submitted 12 September, 2022; originally announced September 2022.

    Comments: final version, accepted in Quantum, single column 53 pages

    Journal ref: Quantum 7, 1094 (2023)

  20. Efficient algorithms for quantum information bottleneck

    Authors: Masahito Hayashi, Yuxiang Yang

    Abstract: The ability to extract relevant information is critical to learning. An ingenious approach as such is the information bottleneck, an optimisation problem whose solution corresponds to a faithful and memory-efficient representation of relevant information from a large system. The advent of the age of quantum computing calls for efficient methods that work on information regarding quantum systems. H… ▽ More

    Submitted 25 February, 2023; v1 submitted 22 August, 2022; originally announced August 2022.

    Comments: accepted by Quantum

    Journal ref: Quantum 7, 936 (2023)

  21. arXiv:2205.14622  [pdf, other

    quant-ph cs.CR cs.IR cs.IT

    Unified Approach to Secret Sharing and Symmetric Private Information Retrieval with Colluding Servers in Quantum Systems

    Authors: Masahito Hayashi, Seunghoan Song

    Abstract: This paper unifiedly addresses two kinds of key quantum secure tasks, i.e., quantum versions of secret sharing (SS) and symmetric private information retrieval (SPIR) by using multi-target monotone span program (MMSP), which characterizes the classical linear protocols of SS and SPIR. SS has two quantum extensions; One is the classical-quantum (CQ) setting, in which the secret to be sent is classi… ▽ More

    Submitted 17 February, 2023; v1 submitted 29 May, 2022; originally announced May 2022.

  22. Pseudo standard entanglement structure cannot be distinguished from standard entanglement structure

    Authors: Hayato Arai, Masahito Hayashi

    Abstract: An experimental verification of the maximally entangled state ensures that the constructed state is close to the maximally entangled state, but it does not guarantee that the state is exactly the same as the maximally entangled state. Further, the entanglement structure is not uniquely determined in general probabilistic theories even if we impose that the local subsystems are fully equal to quant… ▽ More

    Submitted 22 December, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

    Comments: The previous version contains two wrong statements (Theorem3 and existence of G-symmetric self-dual models in the previous version). In order to replace them with correct statements, we revise mainly the following three points from the previous version. 1. Definition of pseudo standard entanglement structure. 2. Construction of our examples. 3. Statements and proofs for discrimination

  23. Optimum ratio between two bases in Bennett-Brassard 1984 protocol with second order analysis

    Authors: Masahito Hayashi

    Abstract: Bennet-Brassard 1984 (BB84) protocol, we optimize the ratio of the choice of two bases, the bit basis and the phase basis by using the second order expansion for the length of the generation keys under the coherent attack. This optimization addresses the trade-off between the loss of transmitted bits due to the disagreement of their bases and the estimation error of the error rate in the phase bas… ▽ More

    Submitted 28 January, 2022; originally announced January 2022.

    Journal ref: Physical Review A, 105, 042603 (2022)

  24. arXiv:2201.06333  [pdf, ps, other

    cs.IT quant-ph

    Commitment capacity of classical-quantum channels

    Authors: Masahito Hayashi, Naqueeb Ahmad Warsi

    Abstract: We study commitment scheme for classical-quantum channels. To accomplish this we define various notions of commitment capacity for these channels and prove matching upper and lower bound on it in terms of the conditional entropy. Our achievability (lower bound) proof is quantum generalisation of the work of one of the authors (arXiv:2103.11548) which studied the problem of secure list decoding and… ▽ More

    Submitted 5 May, 2022; v1 submitted 17 January, 2022; originally announced January 2022.

    Comments: 23 pages; added a new subsection in section V

  25. Analytical calculation formulas for capacities of classical and classical-quantum channels

    Authors: Masahito Hayashi

    Abstract: We derive an analytical calculation formula for the channel capacity of a classical channel without any iteration while its existing algorithms require iterations and the number of iteration depends on the required precision level. Hence, our formula is its first analytical formula without any iteration. We apply the obtained formula to examples and see how the obtained formula works in these exam… ▽ More

    Submitted 14 February, 2023; v1 submitted 7 January, 2022; originally announced January 2022.

  26. arXiv:2201.02447  [pdf, other

    cs.IT quant-ph

    Bregman divergence based em algorithm and its application to classical and quantum rate distortion theory

    Authors: Masahito Hayashi

    Abstract: We formulate em algorithm in the framework of Bregman divergence, which is a general problem setting of information geometry. That is, we address the minimization problem of the Bregman divergence between an exponential subfamily and a mixture subfamily in a Bregman divergence system. Then, we show the convergence and its speed under several conditions. We apply this algorithm to rate distortion a… ▽ More

    Submitted 4 May, 2022; v1 submitted 7 January, 2022; originally announced January 2022.

  27. Quantum secure direct communication with private dense coding using general preshared quantum state

    Authors: Jiawei Wu, Gui-Lu Long, Masahito Hayashi

    Abstract: We study quantum secure direct communication by using a general preshared quantum state and a generalization of dense coding. In this scenario, Alice is allowed to apply a unitary on the preshared state to encode her message, and the set of allowed unitaries forms a group. To decode the message, Bob is allowed to apply a measurement across his own system and the system he receives. In the worst sc… ▽ More

    Submitted 22 May, 2022; v1 submitted 30 December, 2021; originally announced December 2021.

    Comments: This paper is accepted for publicaiotn in Physical Review Applied

    Journal ref: Physical Review Applied Vol. 17, No. 6 (2022)

  28. arXiv:2111.15019   

    quant-ph

    Non-standard entanglement structure of local unitary self-dual models as a saturated situation of repeatability in general probabilistic theories

    Authors: Hayato Arai, Masahito Hayashi

    Abstract: We study the entanglement structure, i.e., the structure of quantum composite system from operational aspects. The structure is not uniquely determined in General Probabilistic Theories (GPTs) even if we impose reasonable postulate about local systems. In this paper, we investigate the possibility that the standard entanglement structure can be determined uniquely by repeatability of measurement p… ▽ More

    Submitted 27 May, 2022; v1 submitted 29 November, 2021; originally announced November 2021.

    Comments: We found out some mathematical mistakes in the proofs of statements in Section V. Therefore we withdraw this paper

  29. arXiv:2111.01075  [pdf, ps, other

    quant-ph cs.IT math-ph

    Tight Exponential Analysis for Smoothing the Max-Relative Entropy and for Quantum Privacy Amplification

    Authors: Ke Li, Yongsheng Yao, Masahito Hayashi

    Abstract: The max-relative entropy together with its smoothed version is a basic tool in quantum information theory. In this paper, we derive the exact exponent for the asymptotic decay of the small modification of the quantum state in smoothing the max-relative entropy based on purified distance. We then apply this result to the problem of privacy amplification against quantum side information, and we obta… ▽ More

    Submitted 1 June, 2023; v1 submitted 1 November, 2021; originally announced November 2021.

    Comments: V3: close to published version

    Journal ref: IEEE Trans. Inf. Theory 69(3), 1680-1694 (2023)

  30. Global Heisenberg scaling in noisy and practical phase estimation

    Authors: Masahito Hayashi, Zi-Wen Liu, Haidong Yuan

    Abstract: Heisenberg scaling characterizes the ultimate precision of parameter estimation enabled by quantum mechanics, which represents an important quantum advantage of both theoretical and technological interest. Here, we study the attainability of strong, global notions of Heisenberg scaling in the fundamental problem of phase estimation, from a practical standpoint. A main message of this work is an as… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Journal ref: Quantum Science and Technology, vol. 7, no. 2, 025030 (2022)

  31. Quantum Causal Unravelling

    Authors: Ge Bai, Ya-Dong Wu, Yan Zhu, Masahito Hayashi, Giulio Chiribella

    Abstract: Complex processes often arise from sequences of simpler interactions involving a few particles at a time. These interactions, however, may not be directly accessible to experiments. Here we develop the first efficient method for unravelling the causal structure of the interactions in a multipartite quantum process, under the assumption that the process has bounded information loss and induces caus… ▽ More

    Submitted 23 June, 2022; v1 submitted 27 September, 2021; originally announced September 2021.

    Comments: 43 pages, 5 figures. Modified to match the published version. This version supercedes arXiv:2012.01731

    Journal ref: npj Quantum Inf 8, 69 (2022)

  32. arXiv:2109.12518  [pdf, other

    quant-ph

    Dense Coding with Locality Restriction for Decoder: Quantum Encoders vs. Super-Quantum Encoders

    Authors: Masahito Hayashi, Kun Wang

    Abstract: We investigate dense coding by imposing various locality restrictions to our decoder by employing the resource theory of asymmetry framework. In this task, the sender Alice and the receiver Bob share an entangled state. She encodes the classical information into it using a symmetric preserving encoder and sends the encoded state to Bob through a noiseless quantum channel. The decoder is limited to… ▽ More

    Submitted 26 September, 2021; originally announced September 2021.

  33. arXiv:2106.14719  [pdf, ps, other

    cs.IT cs.IR quant-ph

    On the Capacity of Quantum Private Information Retrieval from MDS-Coded and Colluding Servers

    Authors: Matteo Allaix, Seunghoan Song, Lukas Holzbaur, Tefjol Pllaha, Masahito Hayashi, Camilla Hollanti

    Abstract: In quantum private information retrieval (QPIR), a user retrieves a classical file from multiple servers by downloading quantum systems without revealing the identity of the file. The QPIR capacity is the maximal achievable ratio of the retrieved file size to the total download size. In this paper, the capacity of QPIR from MDS-coded and colluding servers is studied for the first time. Two general… ▽ More

    Submitted 8 November, 2021; v1 submitted 28 June, 2021; originally announced June 2021.

    Comments: This work extends arXiv:2102.02511

  34. Computation-aided classical-quantum multiple access to boost network communication speeds

    Authors: Masahito Hayashi, Angeles Vazquez-Castro

    Abstract: A multiple access channel (MAC) consists of multiple senders simultaneously transmitting their messages to a single receiver. For the classical-quantum case (cq-MAC), achievable rates are known assuming that all the messages are decoded, a common assumption in quantum network design. However, such a conventional design approach ignores the global network structure, i.e., the network topology. When… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Journal ref: Physical Review Applied, 16, 054021 (2021)

  35. Graph-Theoretic Framework for Self-Testing in Bell Scenarios

    Authors: Kishor Bharti, Maharshi Ray, Zhen-Peng Xu, Masahito Hayashi, Leong-Chuan Kwek, Adán Cabello

    Abstract: Quantum self-testing is the task of certifying quantum states and measurements using the output statistics solely, with minimal assumptions about the underlying quantum system. It is based on the observation that some extremal points in the set of quantum correlations can only be achieved, up to isometries, with specific states and measurements. Here, we present a new approach for quantum self-tes… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

    Comments: 29 pages

    Journal ref: PRX Quantum 3, 030344- Published 26 September 2022

  36. arXiv:2104.12635  [pdf, other

    math-ph math.CA math.PR math.RT quant-ph

    Stochastic behavior of outcome of Schur-Weyl duality measurement

    Authors: Masahito Hayashi, Akihito Hora, Shintarou Yanagida

    Abstract: We focus on the measurement defined by the decomposition based on Schur-Weyl duality on $n$ qubits. As the first setting, we discuss the asymptotic behavior of the measurement outcome when the state is given as the permutation mixture $ρ_{mix,n,l}$ of the state $| 1^{l} \, 0^{n-l} \rangle := | 1 \rangle^{\otimes l} \otimes |0\rangle^{\otimes (n-l)}$. In contrast, when the state is given as the Dic… ▽ More

    Submitted 15 November, 2023; v1 submitted 26 April, 2021; originally announced April 2021.

    Comments: The second part of the revised version. The first and third parts are submitted as new items. 45 pages, 5 figures

  37. arXiv:2101.09041  [pdf, ps, other

    quant-ph cs.CR

    Quantum Private Information Retrieval for Quantum Messages

    Authors: Seunghoan Song, Masahito Hayashi

    Abstract: Quantum private information retrieval (QPIR) for quantum messages is the protocol in which a user retrieves one of the multiple quantum states from one or multiple servers without revealing which state is retrieved. We consider QPIR in two different settings: the blind setting, in which the servers contain one copy of the message states, and the visible setting, in which the servers contain the de… ▽ More

    Submitted 22 January, 2021; originally announced January 2021.

  38. arXiv:2012.01731  [pdf, ps, other

    quant-ph

    Efficient Algorithms for Causal Order Discovery in Quantum Networks

    Authors: Ge Bai, Ya-Dong Wu, Yan Zhu, Masahito Hayashi, Giulio Chiribella

    Abstract: Given black-box access to the input and output systems, we develop the first efficient quantum causal order discovery algorithm with polynomial query complexity with respect to the number of systems. We model the causal order with quantum combs, and our algorithms output the order of inputs and outputs that the given process is compatible with. Our algorithm searches for the last input and the las… ▽ More

    Submitted 28 September, 2021; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: 21 pages, 4 figures. Unchanged from previous version. Superceded by arXiv:2109.13166

  39. Usefulness of adaptive strategies in asymptotic quantum channel discrimination

    Authors: Farzin Salek, Masahito Hayashi, Andreas Winter

    Abstract: Adaptiveness is a key principle in information processing including statistics and machine learning. We investigate the usefulness of adaptive methods in the framework of asymptotic binary hypothesis testing, when each hypothesis represents asymptotically many independent instances of a quantum channel, and the tests are based on using the unknown channel and observing outputs. Unlike the familiar… ▽ More

    Submitted 17 March, 2024; v1 submitted 12 November, 2020; originally announced November 2020.

    Comments: v3 is the accepted version

    Journal ref: Phys. Rev. A 105, 022419 (2022)

  40. Universal classical-quantum superposition coding and universal classical-quantum multiple access channel coding

    Authors: Masahito Hayashi, Ning Cai

    Abstract: We derive universal classical-quantum superposition coding and universal classical-quantum multiple access channel code by using generalized packing lemmas for the type method. Using our classical-quantum universal superposition code, we establish the capacity region of a classical-quantum compound broadcast channel with degraded message sets. Our universal classical-quantum multiple access channe… ▽ More

    Submitted 5 May, 2021; v1 submitted 31 October, 2020; originally announced November 2020.

    Journal ref: IEEE Transactions on Information Theory, Volume: 68, Issue: 3, 1822 - 1850 (2022)

  41. Representation matching for delegated quantum computing

    Authors: Yuxiang Yang, Masahito Hayashi

    Abstract: Many quantum computational tasks have inherent symmetries, suggesting a path to enhancing their efficiency and performance. Exploiting this observation, we propose representation matching, a generic probabilistic protocol for reducing the cost of quantum computation in a quantum network. We show that the representation matching protocol is capable of reducing the communication or memory cost to al… ▽ More

    Submitted 28 May, 2021; v1 submitted 14 September, 2020; originally announced September 2020.

    Comments: 11 pages, 7 figures; close to published version

    Journal ref: PRX Quantum 2, 020327 (2021)

  42. Perfect Discrimination in Approximate Quantum Theory of General Probabilistic Theories

    Authors: Yuuya Yoshida, Hayato Arai, Masahito Hayashi

    Abstract: As a modern approach for the foundation of quantum theory, existing studies of General Probabilistic Theories gave various models of states and measurements that are quite different from quantum theory. In this paper, to seek a more realistic situation, we investigate models approximately close to quantum theory. We define larger measurement classes that are smoothly connected with the class of PO… ▽ More

    Submitted 10 April, 2020; originally announced April 2020.

    Comments: 14 pages, 2 figures

    Journal ref: Phys. Rev. Lett. 125, 150402 (2020)

  43. arXiv:2003.13293  [pdf, ps, other

    quant-ph cs.IT

    Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication

    Authors: Go Kato, Masaki Owari, Masahito Hayashi

    Abstract: It is natural in a quantum network system that multiple users intend to send their quantum message to their respective receivers, which is called a multiple unicast quantum network. We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network from a secure classical network code. Our code correctly transmits quantum states when there is no attack. I… ▽ More

    Submitted 30 March, 2020; originally announced March 2020.

  44. arXiv:2002.12004  [pdf, other

    quant-ph cs.IT math-ph

    Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction

    Authors: Masahito Hayashi, Kun Fang, Kun Wang

    Abstract: We give the first systematic study on the second order asymptotics of the operational task of coherence distillation with and without assistance. In the unassisted setting, we introduce a variant of randomness extraction framework where free incoherent operations are allowed before the incoherent measurement and the randomness extractors. We then show that the maximum number of random bits extract… ▽ More

    Submitted 10 November, 2020; v1 submitted 27 February, 2020; originally announced February 2020.

    Comments: v2 added the second order analysis on the assisted coherence distillation, one author is added; comments are welcome

    Journal ref: IEEE Transactions on Information Theory ( Volume: 67, Issue: 6, June 2021)

  45. Communication Cost of Quantum Processes

    Authors: Yuxiang Yang, Giulio Chiribella, Masahito Hayashi

    Abstract: A common scenario in distributed computing involves a client who asks a server to perform a computation on a remote computer. An important problem is to determine the minimum amount of communication needed to specify the desired computation. Here we extend this problem to the quantum domain, analyzing the total amount of (classical and quantum) communication needed by a server in order to accurate… ▽ More

    Submitted 26 October, 2020; v1 submitted 17 February, 2020; originally announced February 2020.

    Comments: 9 pages, 4 figures plus appendix; published version

    Journal ref: IEEE Journal on Selected Areas in Information Theory, vol. 1, no. 2, pp. 387-400 (2020)

  46. arXiv:2001.04436  [pdf, ps, other

    quant-ph cs.IT

    Capacity of Quantum Private Information Retrieval with Colluding Servers

    Authors: Seunghoan Song, Masahito Hayashi

    Abstract: Quantum private information retrieval (QPIR) is a protocol in which a user retrieves one of multiple files from $\mathsf{n}$ non-communicating servers by downloading quantum systems without revealing which file is retrieved. As variants of QPIR with stronger security requirements, symmetric QPIR is a protocol in which no other files than the target file are leaked to the user, and $\mathsf{t}$-pri… ▽ More

    Submitted 22 April, 2021; v1 submitted 13 January, 2020; originally announced January 2020.

  47. arXiv:2001.01845  [pdf, other

    quant-ph cs.IT

    Permutation Enhances Classical Communication Assisted by Entangled States

    Authors: Kun Wang, Masahito Hayashi

    Abstract: We give a capacity formula for the classical communication over a noisy quantum channel, when local operations and global permutations allowed in the encoding and bipartite states preshared between the sender and the receiver. The two endpoints of this formula are the Holevo capacity (without entanglement assistance) and the entanglement-assisted capacity (with unlimited entanglement assistance).… ▽ More

    Submitted 9 January, 2020; v1 submitted 6 January, 2020; originally announced January 2020.

    Comments: 27 pages, 4 figures. Comments are welcome

  48. Quantum Capacity of Partially Corrupted Quantum Network

    Authors: Masahito Hayashi, Seunghoan Song

    Abstract: We discuss a quantum network, in which the sender has $m_0$ outgoing channels, the receiver has $m_0$ incoming channels, each channel is of capacity $d$, each intermediate node applies invertible unitary, only $m_1$ channels are corrupted, and other non-corrupted channels are noiseless. As our result, we show that the quantum capacity is not smaller than $(m_0-2m_1+1)\log d$ under the following tw… ▽ More

    Submitted 7 November, 2019; originally announced November 2019.

    Journal ref: Phys. Rev. Research 2, 033079 (2020)

  49. Quantum state estimation with nuisance parameters

    Authors: Jun Suzuki, Yuxiang Yang, Masahito Hayashi

    Abstract: In parameter estimation, nuisance parameters refer to parameters that are not of interest but nevertheless affect the precision of estimating other parameters of interest. For instance, the strength of noises in a probe can be regarded as a nuisance parameter. Despite its long history in classical statistics, the nuisance parameter problem in quantum estimation remains largely unexplored. The goal… ▽ More

    Submitted 29 June, 2020; v1 submitted 7 November, 2019; originally announced November 2019.

    Comments: Remarks 4.2 and 4.5 are added to the published journal version to explain several properties of the Hovelo bound. This paper was accepted for publication in Journal of Physics A: Mathematical and Theoretical

  50. arXiv:1910.05976  [pdf, ps, other

    quant-ph cs.CR

    Verifiable Quantum Secure Modulo Summation

    Authors: Masahito Hayashi, Takeshi Koshiba

    Abstract: We propose a new cryptographic task, which we call verifiable quantum secure modulo summation. Secure modulo summation is a calculation of modulo summation $Y_1+\ldots+ Y_m$ when $m$ players have their individual variables $Y_1,\ldots, Y_m$ with kee** the secrecy of the individual variables. However, the conventional method for secure modulo summation uses so many secret communication channels.… ▽ More

    Submitted 14 October, 2019; originally announced October 2019.