-
Measuring quantum relative entropy with finite-size effect
Authors:
Masahito Hayashi
Abstract:
We study the estimation of relative entropy $D(ρ\|σ)$ when $σ$ is known. We show that the Cramér-Rao type bound equals the relative varentropy. Our estimator attains the Cramér-Rao type bound when the dimension $d$ is fixed. It also achieves the sample complexity $O(d^2)$ when the dimension $d$ increases. This sample complexity is optimal when $σ$ is the complexity mixed state. Also, it has time c…
▽ More
We study the estimation of relative entropy $D(ρ\|σ)$ when $σ$ is known. We show that the Cramér-Rao type bound equals the relative varentropy. Our estimator attains the Cramér-Rao type bound when the dimension $d$ is fixed. It also achieves the sample complexity $O(d^2)$ when the dimension $d$ increases. This sample complexity is optimal when $σ$ is the complexity mixed state. Also, it has time complexity $O(d^5 \polylog d)$. Our proposed estimator unifiedly works under both settings.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
Three-Receiver Quantum Broadcast Channels: Classical Communication with Quantum Non-unique Decoding
Authors:
Farzin Salek,
Patrick Hayden,
Masahito Hayashi
Abstract:
In network communication, it is common in broadcasting scenarios for there to exist a hierarchy among receivers based on information they decode due, for example, to different physical conditions or premium subscriptions. This hierarchy may result in varied information quality, such as higher-quality video for certain receivers. This is modeled mathematically as a degraded message set, indicating…
▽ More
In network communication, it is common in broadcasting scenarios for there to exist a hierarchy among receivers based on information they decode due, for example, to different physical conditions or premium subscriptions. This hierarchy may result in varied information quality, such as higher-quality video for certain receivers. This is modeled mathematically as a degraded message set, indicating a hierarchy between messages to be decoded by different receivers, where the default quality corresponds to a common message intended for all receivers, a higher quality is represented by a message for a smaller subset of receivers, and so forth. We extend these considerations to quantum communication, exploring three-receiver quantum broadcast channels with two- and three-degraded message sets. Our technical tool involves employing quantum non-unique decoding, a technique we develop by utilizing the simultaneous pinching method. We construct one-shot codes for various scenarios and find achievable rate regions relying on various quantum Rényi mutual information error exponents. Our investigation includes a comprehensive study of pinching across tensor product spaces, presenting our findings as the asymptotic counterpart to our one-shot codes. By employing the non-unique decoding, we also establish a simpler proof to Marton's inner bound for two-receiver quantum broadcast channels without the need for more involved techniques. Additionally, we derive no-go results and demonstrate their tightness in special cases.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
Alexander S. Holevo's Researches in Quantum Information Theory in 20th Century
Authors:
Masahito Hayashi
Abstract:
This paper reviews Holevo's contributions to quantum information theory during the 20 century. At that time, he mainly studied three topics, classical-quantum channel coding, quantum estimation with Cramero-Rao approach, and quantum estimation with the group covariant approach. This paper addresses these three topics.
This paper reviews Holevo's contributions to quantum information theory during the 20 century. At that time, he mainly studied three topics, classical-quantum channel coding, quantum estimation with Cramero-Rao approach, and quantum estimation with the group covariant approach. This paper addresses these three topics.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Reverse em-problem based on Bregman divergence and its application to classical and quantum information theory
Authors:
Masahito Hayashi
Abstract:
The recent paper (IEEE Trans. IT 69, 1680) introduced an analytical method for calculating the channel capacity without the need for iteration. This method has certain limitations that restrict its applicability. Furthermore, the paper does not provide an explanation as to why the channel capacity can be solved analytically in this particular case. In order to broaden the scope of this method and…
▽ More
The recent paper (IEEE Trans. IT 69, 1680) introduced an analytical method for calculating the channel capacity without the need for iteration. This method has certain limitations that restrict its applicability. Furthermore, the paper does not provide an explanation as to why the channel capacity can be solved analytically in this particular case. In order to broaden the scope of this method and address its limitations, we turn our attention to the reverse em-problem, proposed by Toyota (Information Geometry, 3, 1355 (2020)). This reverse em-problem involves iteratively applying the inverse map of the em iteration to calculate the channel capacity, which represents the maximum mutual information. However, several open problems remained unresolved in Toyota's work. To overcome these challenges, we formulate the reverse em-problem based on Bregman divergence and provide solutions to these open problems. Building upon these results, we transform the reverse em-problem into em-problems and derive a non-iterative formula for the reverse em-problem. This formula can be viewed as a generalization of the aforementioned analytical calculation method. Importantly, this derivation sheds light on the information geometrical structure underlying this special case. By effectively addressing the limitations of the previous analytical method and providing a deeper understanding of the underlying information geometrical structure, our work significantly expands the applicability of the proposed method for calculating the channel capacity without iteration.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
Finding the optimal probe state for multiparameter quantum metrology using conic programming
Authors:
Masahito Hayashi,
Yingkai Ouyang
Abstract:
The aim of the channel estimation is to estimate the parameters encoded in a quantum channel. For this aim, it is allowed to choose the input state as well as the measurement to get the outcome. Various precision bounds are known for the state estimation. For the channel estimation, the respective bounds are determined depending on the choice of the input state. However, determining the optimal in…
▽ More
The aim of the channel estimation is to estimate the parameters encoded in a quantum channel. For this aim, it is allowed to choose the input state as well as the measurement to get the outcome. Various precision bounds are known for the state estimation. For the channel estimation, the respective bounds are determined depending on the choice of the input state. However, determining the optimal input probe state and the corresponding precision bounds in estimation is a non-trivial problem, particularly in the multi-parameter setting, where parameters are often incompatible. In this paper, we present a conic programming framework that allows us to determine the optimal probe state for the corresponding multi-parameter precision bounds. The precision bounds we consider include the Holevo-Nagaoka bound and the tight precision bound that give the optimal performances of correlated and uncorrelated measurement strategies, respectively. Using our conic programming framework, we discuss the optimality of a maximally entangled probe state in various settings. We also apply our theory to analyze the canonical field sensing problem using entangled quantum probe states.
△ Less
Submitted 26 January, 2024; v1 submitted 11 January, 2024;
originally announced January 2024.
-
Measurement-Device-Independent Detection of Beyond-Quantum State
Authors:
Baichu Yu,
Masahito Hayashi
Abstract:
In quantum theory, a quantum state on a composite system of two parties realizes a non-negative probability with any measurement element with a tensor product form. However, there also exist non-quantum states which satisfy the above condition. Such states are called beyond-quantum states, and cannot be detected by standard Bell tests. To distinguish a beyond-quantum state from quantum states, we…
▽ More
In quantum theory, a quantum state on a composite system of two parties realizes a non-negative probability with any measurement element with a tensor product form. However, there also exist non-quantum states which satisfy the above condition. Such states are called beyond-quantum states, and cannot be detected by standard Bell tests. To distinguish a beyond-quantum state from quantum states, we propose a measurement-device-independent (MDI) test for beyond-quantum state detection, which is composed of quantum input states on respective parties and quantum measurements across the input system and the target system on respective parties. The performance of our protocol is independent of the forms of the tested states and the measurement operators, which provides an advantage in practical scenarios. We also discuss the importance of tomographic completeness of the input sets to the detection.
△ Less
Submitted 31 December, 2023; v1 submitted 11 December, 2023;
originally announced December 2023.
-
Entanglement measures for detectability
Authors:
Masahito Hayashi,
Yuki Ito
Abstract:
We propose new entanglement measures as the detection performance based on the hypothesis testing setting. We clarify how our measures work for detecting an entangled state by extending the quantum Sanov theorem. Our analysis covers the finite-length setting. Exploiting this entanglement measure, we present how to derive entanglement witness to detect the given entangled state by using the geometr…
▽ More
We propose new entanglement measures as the detection performance based on the hypothesis testing setting. We clarify how our measures work for detecting an entangled state by extending the quantum Sanov theorem. Our analysis covers the finite-length setting. Exploiting this entanglement measure, we present how to derive entanglement witness to detect the given entangled state by using the geometrical structure of this measure. We derive their calculation formulas for maximally correlated states, and propose their algorithms that work for general entangled states. In addition, we investigate how our algorithm works for solving the membership problem for separability.
△ Less
Submitted 30 December, 2023; v1 submitted 18 November, 2023;
originally announced November 2023.
-
Generalized quantum Arimoto-Blahut algorithm and its application to quantum information bottleneck
Authors:
Masahito Hayashi,
Geng Liu
Abstract:
We generalize the quantum Arimoto-Blahut algorithm by Ramakrishnan et al. (IEEE Trans. IT, 67, 946 (2021)) to a function defined over a set of density matrices with linear constraints so that our algorithm can be applied to optimizations of quantum operations. This algorithm has wider applicability. Hence, we apply our algorithm to the quantum information bottleneck with three quantum systems, whi…
▽ More
We generalize the quantum Arimoto-Blahut algorithm by Ramakrishnan et al. (IEEE Trans. IT, 67, 946 (2021)) to a function defined over a set of density matrices with linear constraints so that our algorithm can be applied to optimizations of quantum operations. This algorithm has wider applicability. Hence, we apply our algorithm to the quantum information bottleneck with three quantum systems, which can be used for quantum learning. We numerically compare our obtained algorithm with the existing algorithm by Grimsmo and Still (Phys. Rev. A, 94, 012338 (2016)). Our numerical analysis shows that our algorithm is better than their algorithm.
△ Less
Submitted 12 January, 2024; v1 submitted 18 November, 2023;
originally announced November 2023.
-
Cohernece in permutation-invariant state enhances permutation-asymmetry
Authors:
Masahito Hayashi
Abstract:
A Dicke state and its decohered state are invariant for permutation. However, when another qubits state to each of them is attached, the whole state is not invariant for permutation, and has a certain asymmetry for permutation. The amount of asymmetry can be measured by the number of distinguishable states under the group action or the mutual information. This paper investigates how the coherence…
▽ More
A Dicke state and its decohered state are invariant for permutation. However, when another qubits state to each of them is attached, the whole state is not invariant for permutation, and has a certain asymmetry for permutation. The amount of asymmetry can be measured by the number of distinguishable states under the group action or the mutual information. This paper investigates how the coherence of a Dicke state affects the amount of asymmetry. To address this problem asymptotically, we introduce a new type of central limit theorem by using several formulas on hypergeometric functions. We reveal that the amount of the asymmetry in the case with a Dicke state has a strictly larger order than that with the decohered state in a specific type of the limit.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
Derivation of Standard Quantum Theory via State Discrimination
Authors:
Hayato Arai,
Masahito Hayashi
Abstract:
It is a key issue to characterize the model of standard quantum theory out of general models by an operational condition. The framework of General Probabilistic Theories (GPTs) is a new information theoretical approach to single out standard quantum theory. It is known that traditional properties, for example, Bell-CHSH inequality are not sufficient to single out standard quantum theory among poss…
▽ More
It is a key issue to characterize the model of standard quantum theory out of general models by an operational condition. The framework of General Probabilistic Theories (GPTs) is a new information theoretical approach to single out standard quantum theory. It is known that traditional properties, for example, Bell-CHSH inequality are not sufficient to single out standard quantum theory among possible models in GPTs. As a more precise property, we focus on the bound of the performance for an information task called state discrimination in general models. We give an equivalent condition for outperforming the minimum discrimination error probability under the standard quantum theory, which is given by the trace norm. Besides, by applying the equivalent condition, we characterize standard quantum theory out of general models in GPTs by the bound of the performance for state discrimination.
△ Less
Submitted 15 February, 2024; v1 submitted 20 July, 2023;
originally announced July 2023.
-
When quantum memory is useful for dense coding
Authors:
Ryuji Takagi,
Masahito Hayashi
Abstract:
We discuss dense coding with $n$ copies of a specific preshared state between the sender and the receiver when the encoding operation is limited to the application of group representation. Typically, to act on multiple local copies of these preshared states, the receiver needs quantum memory, because in general the multiple copies will be generated sequentially. Depending on available encoding uni…
▽ More
We discuss dense coding with $n$ copies of a specific preshared state between the sender and the receiver when the encoding operation is limited to the application of group representation. Typically, to act on multiple local copies of these preshared states, the receiver needs quantum memory, because in general the multiple copies will be generated sequentially. Depending on available encoding unitary operations, we investigate what preshared state offers an advantage of using quantum memory on the receiver's side.
△ Less
Submitted 9 June, 2024; v1 submitted 19 June, 2023;
originally announced June 2023.
-
Robust and efficient verification of graph states in blind measurement-based quantum computation
Authors:
Zihao Li,
Huangjun Zhu,
Masahito Hayashi
Abstract:
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients. Measurement-based quantum computation (MBQC) is a promising approach for realizing BQC. To obtain reliable results in blind MBQC, it is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario. However, previous verification protocols for this…
▽ More
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients. Measurement-based quantum computation (MBQC) is a promising approach for realizing BQC. To obtain reliable results in blind MBQC, it is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario. However, previous verification protocols for this task are too resource consuming or noise susceptible to be applied in practice. Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension in the adversarial scenario, which leads to a robust and efficient protocol for verifying the resource state in blind MBQC. Our protocol requires only local Pauli measurements and is thus easy to realize with current technologies. Nevertheless, it can achieve the optimal scaling behaviors with respect to the system size and the target precision as quantified by the infidelity and significance level, which has never been achieved before. Notably, our protocol can exponentially enhance the scaling behavior with the significance level.
△ Less
Submitted 19 November, 2023; v1 submitted 18 May, 2023;
originally announced May 2023.
-
Prior Entanglement Exponentially Improves One-Server Quantum Private Information Retrieval for Quantum Messages
Authors:
Seunghoan Song,
Francois Le Gall,
Masahito Hayashi
Abstract:
Quantum private information retrieval (QPIR) for quantum messages is a quantum communication task, in which a user retrieves one of the multiple quantum states from the server without revealing which state is retrieved. In the one-server setting, we find an exponential gap in the communication complexities between the presence and absence of prior entanglement in this problem with the one-server s…
▽ More
Quantum private information retrieval (QPIR) for quantum messages is a quantum communication task, in which a user retrieves one of the multiple quantum states from the server without revealing which state is retrieved. In the one-server setting, we find an exponential gap in the communication complexities between the presence and absence of prior entanglement in this problem with the one-server setting. To achieve this aim, as the first step, we prove that the trivial solution of downloading all messages is optimal under QPIR for quantum messages, which is a similar result to that of classical PIR but different from QPIR for classical messages. As the second step, we propose an efficient one-server one-round QPIR protocol with prior entanglement by constructing a reduction from a QPIR protocol for classical messages to a QPIR protocol for quantum messages in the presence of prior entanglement.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
Special functions in quantum phase estimation
Authors:
Masahito Hayashi
Abstract:
This paper explains existing results for the application of special functions to phase estimation, which is a fundamental topic in quantum information. We focus on two special functions. One is prolate spheroidal wave function, which approximately gives the maximum probability that the difference between the true parameter and the estimate is smaller than a certain threshold. The other is Mathieu…
▽ More
This paper explains existing results for the application of special functions to phase estimation, which is a fundamental topic in quantum information. We focus on two special functions. One is prolate spheroidal wave function, which approximately gives the maximum probability that the difference between the true parameter and the estimate is smaller than a certain threshold. The other is Mathieu function, which exactly gives the optimum estimation under the energy constraint. It also characterizes the uncertainty relation for the position and the momentum for periodic functions.
△ Less
Submitted 14 February, 2023;
originally announced February 2023.
-
Detection of Beyond-Quantum Non-locality based on Standard Local Quantum Observables
Authors:
Hayato Arai,
Baichu Yu,
Masahito Hayashi
Abstract:
Device independent detections of quantum non-locality like Bell-CHSH inequality are important methods to detect quantum non-locality because the whole protocol can be implemented by uncertified local observables. However, this detection is not sufficient for the justification of standard quantum theory, because there are theoretically many types of beyond-quantum non-local states in General Probab…
▽ More
Device independent detections of quantum non-locality like Bell-CHSH inequality are important methods to detect quantum non-locality because the whole protocol can be implemented by uncertified local observables. However, this detection is not sufficient for the justification of standard quantum theory, because there are theoretically many types of beyond-quantum non-local states in General Probabilistic Theories. One important class is Entanglement Structures (ESs), which contain beyond-quantum non-local states even though their local systems are completely equivalent to standard quantum systems. This paper shows that any device independent detection cannot distinguish beyond-quantum non-local states from standard quantum states. To overcome this problem, this paper gives a device dependent detection based on local observables to distinguish any beyond-quantum non-local state from all standard quantum states. Especially, we give a way to detect any beyond-quantum non-local state in two-qubit ESs by observing only spin observables on local systems.
△ Less
Submitted 15 May, 2023; v1 submitted 10 January, 2023;
originally announced January 2023.
-
Two-Server Oblivious Transfer for Quantum Messages
Authors:
Masahito Hayashi,
Seunghoan Song
Abstract:
Oblivious transfer is considered as a cryptographic primitive task for quantum information processing over quantum network. Although it is possible with two servers, any existing protocol works only with classical messages. We propose two-server oblivious transfer protocols for quantum messages.
Oblivious transfer is considered as a cryptographic primitive task for quantum information processing over quantum network. Although it is possible with two servers, any existing protocol works only with classical messages. We propose two-server oblivious transfer protocols for quantum messages.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Oblivious Quantum Computation and Delegated Multiparty Quantum Computation
Authors:
Masahito Hayashi
Abstract:
We propose a new concept, oblivious quantum computation, which requires performing oblivious transfer with respect to the computation outcome of the quantum computation, where the secrecy of the input qubits and the program to identify the quantum gates are required. Exploiting quantum teleportation, we propose a two-server protocol for this task, which realizes an exponential improvement for the…
▽ More
We propose a new concept, oblivious quantum computation, which requires performing oblivious transfer with respect to the computation outcome of the quantum computation, where the secrecy of the input qubits and the program to identify the quantum gates are required. Exploiting quantum teleportation, we propose a two-server protocol for this task, which realizes an exponential improvement for the communication complexity over the simple application of two-server (quantum) oblivious transfer to the sending of the computation result. Also, we discuss delegated multiparty quantum computation, in which, several users ask multiparty quantum computation to server(s) only using classical communications. We propose a two-server protocol for the latter task as well.
△ Less
Submitted 11 May, 2023; v1 submitted 2 November, 2022;
originally announced November 2022.
-
Compression for Qubit Clocks
Authors:
Yuxiang Yang,
Giulio Chiribella,
Masahito Hayashi
Abstract:
Two-Ievel (qubit) clock systems are often used to perform precise measurement of time. In this work, we propose a compression protocol for $n$ identically prepared states of qubit clocks. The protocol faithfully encodes the states into $(1/2)\log n$ qubits and $(1/2)\log n$ classical bits and works even in the presence of noise. If the purity of the clock states is fixed, $(1/2)\log n$ qubits are…
▽ More
Two-Ievel (qubit) clock systems are often used to perform precise measurement of time. In this work, we propose a compression protocol for $n$ identically prepared states of qubit clocks. The protocol faithfully encodes the states into $(1/2)\log n$ qubits and $(1/2)\log n$ classical bits and works even in the presence of noise. If the purity of the clock states is fixed, $(1/2)\log n$ qubits are sufficient. We also prove that this protocol requires the minimum amount of total memory among all protocols with vanishing error in the large $n$ limit.
△ Less
Submitted 14 September, 2022;
originally announced September 2022.
-
Tight Cramér-Rao type bounds for multiparameter quantum metrology through conic programming
Authors:
Masahito Hayashi,
Yingkai Ouyang
Abstract:
In the quest to unlock the maximum potential of quantum sensors, it is of paramount importance to have practical measurement strategies that can estimate incompatible parameters with best precisions possible. However, it is still not known how to find practical measurements with optimal precisions, even for uncorrelated measurements over probe states. Here, we give a concrete way to find uncorrela…
▽ More
In the quest to unlock the maximum potential of quantum sensors, it is of paramount importance to have practical measurement strategies that can estimate incompatible parameters with best precisions possible. However, it is still not known how to find practical measurements with optimal precisions, even for uncorrelated measurements over probe states. Here, we give a concrete way to find uncorrelated measurement strategies with optimal precisions. We solve this fundamental problem by introducing a framework of conic programming that unifies the theory of precision bounds for multiparameter estimates for uncorrelated and correlated measurement strategies under a common umbrella. Namely, we give precision bounds that arise from linear programs on various cones defined on a tensor product space of matrices, including a particular cone of separable matrices. Subsequently, our theory allows us to develop an efficient algorithm that calculates both upper and lower bounds for the ultimate precision bound for uncorrelated measurement strategies, where these bounds can be tight. In particular, the uncorrelated measurement strategy that arises from our theory saturates the upper bound to the ultimate precision bound. Also, we show numerically that there is a strict gap between the previous efficiently computable bounds and the ultimate precision bound.
△ Less
Submitted 22 August, 2023; v1 submitted 12 September, 2022;
originally announced September 2022.
-
Efficient algorithms for quantum information bottleneck
Authors:
Masahito Hayashi,
Yuxiang Yang
Abstract:
The ability to extract relevant information is critical to learning. An ingenious approach as such is the information bottleneck, an optimisation problem whose solution corresponds to a faithful and memory-efficient representation of relevant information from a large system. The advent of the age of quantum computing calls for efficient methods that work on information regarding quantum systems. H…
▽ More
The ability to extract relevant information is critical to learning. An ingenious approach as such is the information bottleneck, an optimisation problem whose solution corresponds to a faithful and memory-efficient representation of relevant information from a large system. The advent of the age of quantum computing calls for efficient methods that work on information regarding quantum systems. Here we address this by proposing a new and general algorithm for the quantum generalisation of information bottleneck. Our algorithm excels in the speed and the definiteness of convergence compared with prior results. It also works for a much broader range of problems, including the quantum extension of deterministic information bottleneck, an important variant of the original information bottleneck problem. Notably, we discover that a quantum system can achieve strictly better performance than a classical system of the same size regarding quantum information bottleneck, providing new vision on justifying the advantage of quantum machine learning.
△ Less
Submitted 25 February, 2023; v1 submitted 22 August, 2022;
originally announced August 2022.
-
Unified Approach to Secret Sharing and Symmetric Private Information Retrieval with Colluding Servers in Quantum Systems
Authors:
Masahito Hayashi,
Seunghoan Song
Abstract:
This paper unifiedly addresses two kinds of key quantum secure tasks, i.e., quantum versions of secret sharing (SS) and symmetric private information retrieval (SPIR) by using multi-target monotone span program (MMSP), which characterizes the classical linear protocols of SS and SPIR. SS has two quantum extensions; One is the classical-quantum (CQ) setting, in which the secret to be sent is classi…
▽ More
This paper unifiedly addresses two kinds of key quantum secure tasks, i.e., quantum versions of secret sharing (SS) and symmetric private information retrieval (SPIR) by using multi-target monotone span program (MMSP), which characterizes the classical linear protocols of SS and SPIR. SS has two quantum extensions; One is the classical-quantum (CQ) setting, in which the secret to be sent is classical information and the shares are quantum systems. The other is the quantum-quantum (QQ) setting, in which the secret to be sent is a quantum state and the shares are quantum systems. The relation between these quantum protocols and MMSP has not been studied sufficiently. We newly introduce the third setting, i.e., the entanglement-assisted (EA) setting, which is defined by modifying the CQ setting with allowing prior entanglement between the dealer and the end-user who recovers the secret by collecting the shares. Showing that the linear version of SS with the EA setting is directly linked to MMSP, we characterize linear quantum versions of SS with the CQ ad QQ settings via MMSP. Further, we introduce the EA setting of SPIR, which is shown to link to MMSP. In addition, we discuss the quantum version of maximum distance separable codes.
△ Less
Submitted 17 February, 2023; v1 submitted 29 May, 2022;
originally announced May 2022.
-
Pseudo standard entanglement structure cannot be distinguished from standard entanglement structure
Authors:
Hayato Arai,
Masahito Hayashi
Abstract:
An experimental verification of the maximally entangled state ensures that the constructed state is close to the maximally entangled state, but it does not guarantee that the state is exactly the same as the maximally entangled state. Further, the entanglement structure is not uniquely determined in general probabilistic theories even if we impose that the local subsystems are fully equal to quant…
▽ More
An experimental verification of the maximally entangled state ensures that the constructed state is close to the maximally entangled state, but it does not guarantee that the state is exactly the same as the maximally entangled state. Further, the entanglement structure is not uniquely determined in general probabilistic theories even if we impose that the local subsystems are fully equal to quantum systems. Therefore, the existence of the maximally entangled state depends on whether the standard entanglement structure is valid. To examine this issue, we introduce pseudo standard entanglement structure as a structure of quantum composite system under natural assumptions based on the existence of projective measurements and the existence of approximations of all maximally entangled standard states. Surprisingly, there exist infinitely many pseudo standard entanglement structures different from the standard entanglement structure. In our setting, any maximally entangled state can be arbitrarily approximated by an entangled state that belongs to our obtained pseudo standard entanglement structure. That is, experimental verification does not exclude the possibility of our obtained pseudo standard entanglement structure that is different from the standard entanglement structure. On the other hand, such pseudo structures never possess global unitary symmetry, i.e., global unitary symmetry is essential condition for the standard entanglement structure.
△ Less
Submitted 22 December, 2022; v1 submitted 15 March, 2022;
originally announced March 2022.
-
Optimum ratio between two bases in Bennett-Brassard 1984 protocol with second order analysis
Authors:
Masahito Hayashi
Abstract:
Bennet-Brassard 1984 (BB84) protocol, we optimize the ratio of the choice of two bases, the bit basis and the phase basis by using the second order expansion for the length of the generation keys under the coherent attack. This optimization addresses the trade-off between the loss of transmitted bits due to the disagreement of their bases and the estimation error of the error rate in the phase bas…
▽ More
Bennet-Brassard 1984 (BB84) protocol, we optimize the ratio of the choice of two bases, the bit basis and the phase basis by using the second order expansion for the length of the generation keys under the coherent attack. This optimization addresses the trade-off between the loss of transmitted bits due to the disagreement of their bases and the estimation error of the error rate in the phase basis. Then, we derive the optimum ratio and the optimum length of the generation keys with the second order asymptotics. Surprisingly, the second order has the order $n^{3/4}$, which is much larger than the second order $n^{1/2}$ in the conventional setting when $n$ is the number of quantum communication. This fact shows that our setting has much larger importance for the second order analysis than the conventional problem. To illustrate this importance, we numerically plot the effect of the second order correction.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
Commitment capacity of classical-quantum channels
Authors:
Masahito Hayashi,
Naqueeb Ahmad Warsi
Abstract:
We study commitment scheme for classical-quantum channels. To accomplish this we define various notions of commitment capacity for these channels and prove matching upper and lower bound on it in terms of the conditional entropy. Our achievability (lower bound) proof is quantum generalisation of the work of one of the authors (arXiv:2103.11548) which studied the problem of secure list decoding and…
▽ More
We study commitment scheme for classical-quantum channels. To accomplish this we define various notions of commitment capacity for these channels and prove matching upper and lower bound on it in terms of the conditional entropy. Our achievability (lower bound) proof is quantum generalisation of the work of one of the authors (arXiv:2103.11548) which studied the problem of secure list decoding and its application to bit-string commitment. The techniques we use in the proof of converse (upper bound) is similar in spirit to the techniques introduced by Winter, Nascimento and Imai (Cryptography and Coding 2003) to prove upper bound on the commitment capacity of classical channels. However, generalisation of this technique to the quantum case is not so straightforward and requires some new constructions, which can be of independent interest.
△ Less
Submitted 5 May, 2022; v1 submitted 17 January, 2022;
originally announced January 2022.
-
Analytical calculation formulas for capacities of classical and classical-quantum channels
Authors:
Masahito Hayashi
Abstract:
We derive an analytical calculation formula for the channel capacity of a classical channel without any iteration while its existing algorithms require iterations and the number of iteration depends on the required precision level. Hence, our formula is its first analytical formula without any iteration. We apply the obtained formula to examples and see how the obtained formula works in these exam…
▽ More
We derive an analytical calculation formula for the channel capacity of a classical channel without any iteration while its existing algorithms require iterations and the number of iteration depends on the required precision level. Hence, our formula is its first analytical formula without any iteration. We apply the obtained formula to examples and see how the obtained formula works in these examples. Then, we extend it to the channel capacity of a classical-quantum (cq-) channel. Many existing studies proposed algorithms for a cq-channel and all of them require iterations. Our extended analytical algorithm have also no iteration and output the exactly optimum values.
△ Less
Submitted 14 February, 2023; v1 submitted 7 January, 2022;
originally announced January 2022.
-
Bregman divergence based em algorithm and its application to classical and quantum rate distortion theory
Authors:
Masahito Hayashi
Abstract:
We formulate em algorithm in the framework of Bregman divergence, which is a general problem setting of information geometry. That is, we address the minimization problem of the Bregman divergence between an exponential subfamily and a mixture subfamily in a Bregman divergence system. Then, we show the convergence and its speed under several conditions. We apply this algorithm to rate distortion a…
▽ More
We formulate em algorithm in the framework of Bregman divergence, which is a general problem setting of information geometry. That is, we address the minimization problem of the Bregman divergence between an exponential subfamily and a mixture subfamily in a Bregman divergence system. Then, we show the convergence and its speed under several conditions. We apply this algorithm to rate distortion and its variants including the quantum setting, and show the usefulness of our general algorithm. In fact, existing applications of Arimoto-Blahut algorithm to rate distortion theory make the optimization of the weighted sum of the mutual information and the cost function by using the Lagrange multiplier. However, in the rate distortion theory, it is needed to minimize the mutual information under the constant constraint for the cost function. Our algorithm directly solves this minimization. In addition, we have numerically checked the convergence speed of our algorithm in the classical case of rate distortion problem.
△ Less
Submitted 4 May, 2022; v1 submitted 7 January, 2022;
originally announced January 2022.
-
Quantum secure direct communication with private dense coding using general preshared quantum state
Authors:
Jiawei Wu,
Gui-Lu Long,
Masahito Hayashi
Abstract:
We study quantum secure direct communication by using a general preshared quantum state and a generalization of dense coding. In this scenario, Alice is allowed to apply a unitary on the preshared state to encode her message, and the set of allowed unitaries forms a group. To decode the message, Bob is allowed to apply a measurement across his own system and the system he receives. In the worst sc…
▽ More
We study quantum secure direct communication by using a general preshared quantum state and a generalization of dense coding. In this scenario, Alice is allowed to apply a unitary on the preshared state to encode her message, and the set of allowed unitaries forms a group. To decode the message, Bob is allowed to apply a measurement across his own system and the system he receives. In the worst scenario, we guarantee that Eve obtains no information for the message even when Eve access the joint system between the system that she intercepts and her original system of the preshared state. For a practical application, we propose a concrete protocol and derive an upper bound of information leakage in the finite-length setting. We also discuss how to apply our scenario to the case with discrete Weyl-Heisenberg representation when the preshared state is unknown.
△ Less
Submitted 22 May, 2022; v1 submitted 30 December, 2021;
originally announced December 2021.
-
Non-standard entanglement structure of local unitary self-dual models as a saturated situation of repeatability in general probabilistic theories
Authors:
Hayato Arai,
Masahito Hayashi
Abstract:
We study the entanglement structure, i.e., the structure of quantum composite system from operational aspects. The structure is not uniquely determined in General Probabilistic Theories (GPTs) even if we impose reasonable postulate about local systems. In this paper, we investigate the possibility that the standard entanglement structure can be determined uniquely by repeatability of measurement p…
▽ More
We study the entanglement structure, i.e., the structure of quantum composite system from operational aspects. The structure is not uniquely determined in General Probabilistic Theories (GPTs) even if we impose reasonable postulate about local systems. In this paper, we investigate the possibility that the standard entanglement structure can be determined uniquely by repeatability of measurement processing and its saturated situation called self-duality. Surprisingly, self-duality cannot determine the standard entanglement structure even if we additionally impose local unitary symmetry assumption. In this paper, we show the existence of infinite structures of quantum composite system such that it is self-dual with local unitary symmetry. Besides, we also show the existence of a structure of quantum composite system such that non-orthogonal states in the structure are perfectly distinguishable. In addition, as a byproduct, we derive an sufficient condition to achieve the detection of the entanglement property with a finite number of parameterized minimizations.
△ Less
Submitted 27 May, 2022; v1 submitted 29 November, 2021;
originally announced November 2021.
-
Tight Exponential Analysis for Smoothing the Max-Relative Entropy and for Quantum Privacy Amplification
Authors:
Ke Li,
Yongsheng Yao,
Masahito Hayashi
Abstract:
The max-relative entropy together with its smoothed version is a basic tool in quantum information theory. In this paper, we derive the exact exponent for the asymptotic decay of the small modification of the quantum state in smoothing the max-relative entropy based on purified distance. We then apply this result to the problem of privacy amplification against quantum side information, and we obta…
▽ More
The max-relative entropy together with its smoothed version is a basic tool in quantum information theory. In this paper, we derive the exact exponent for the asymptotic decay of the small modification of the quantum state in smoothing the max-relative entropy based on purified distance. We then apply this result to the problem of privacy amplification against quantum side information, and we obtain an upper bound for the exponent of the asymptotic decreasing of the insecurity, measured using either purified distance or relative entropy. Our upper bound complements the earlier lower bound established by Hayashi, and the two bounds match when the rate of randomness extraction is above a critical value. Thus, for the case of high rate, we have determined the exact security exponent. Following this, we give examples and show that in the low-rate case, neither the upper bound nor the lower bound is tight in general. This exhibits a picture similar to that of the error exponent in channel coding. Lastly, we investigate the asymptotics of equivocation and its exponent under the security measure using the sandwiched Rényi divergence of order $s\in (1,2]$, which has not been addressed previously in the quantum setting.
△ Less
Submitted 1 June, 2023; v1 submitted 1 November, 2021;
originally announced November 2021.
-
Global Heisenberg scaling in noisy and practical phase estimation
Authors:
Masahito Hayashi,
Zi-Wen Liu,
Haidong Yuan
Abstract:
Heisenberg scaling characterizes the ultimate precision of parameter estimation enabled by quantum mechanics, which represents an important quantum advantage of both theoretical and technological interest. Here, we study the attainability of strong, global notions of Heisenberg scaling in the fundamental problem of phase estimation, from a practical standpoint. A main message of this work is an as…
▽ More
Heisenberg scaling characterizes the ultimate precision of parameter estimation enabled by quantum mechanics, which represents an important quantum advantage of both theoretical and technological interest. Here, we study the attainability of strong, global notions of Heisenberg scaling in the fundamental problem of phase estimation, from a practical standpoint. A main message of this work is an asymptotic noise "threshold" for global Heisenberg scaling. We first demonstrate that Heisenberg scaling is fragile to noises in the sense that it cannot be achieved in the presence of phase dam** noise with strength above a stringent scaling in the system size. Nevertheless, we show that when the noise does not exceed this threshold, the global Heisenberg scaling in terms of limiting distribution (which we highlight as a practically important figure of merit) as well as average error can indeed be achieved. Furthermore, we provide a practical adaptive protocol using one qubit only, which achieves global Heisenberg scaling in terms of limiting distribution under such noise.
△ Less
Submitted 5 October, 2021;
originally announced October 2021.
-
Quantum Causal Unravelling
Authors:
Ge Bai,
Ya-Dong Wu,
Yan Zhu,
Masahito Hayashi,
Giulio Chiribella
Abstract:
Complex processes often arise from sequences of simpler interactions involving a few particles at a time. These interactions, however, may not be directly accessible to experiments. Here we develop the first efficient method for unravelling the causal structure of the interactions in a multipartite quantum process, under the assumption that the process has bounded information loss and induces caus…
▽ More
Complex processes often arise from sequences of simpler interactions involving a few particles at a time. These interactions, however, may not be directly accessible to experiments. Here we develop the first efficient method for unravelling the causal structure of the interactions in a multipartite quantum process, under the assumption that the process has bounded information loss and induces causal dependencies whose strength is above a fixed (but otherwise arbitrary) threshold. Our method is based on a quantum algorithm whose complexity scales polynomially in the total number of input/output systems, in the dimension of the systems involved in each interaction, and in the inverse of the chosen threshold for the strength of the causal dependencies. Under additional assumptions, we also provide a second algorithm that has lower complexity and requires only local state preparation and local measurements. Our algorithms can be used to identify processes that can be characterized efficiently with the technique of quantum process tomography. Similarly, they can be used to identify useful communication channels in quantum networks, and to test the internal structure of uncharacterized quantum circuits.
△ Less
Submitted 23 June, 2022; v1 submitted 27 September, 2021;
originally announced September 2021.
-
Dense Coding with Locality Restriction for Decoder: Quantum Encoders vs. Super-Quantum Encoders
Authors:
Masahito Hayashi,
Kun Wang
Abstract:
We investigate dense coding by imposing various locality restrictions to our decoder by employing the resource theory of asymmetry framework. In this task, the sender Alice and the receiver Bob share an entangled state. She encodes the classical information into it using a symmetric preserving encoder and sends the encoded state to Bob through a noiseless quantum channel. The decoder is limited to…
▽ More
We investigate dense coding by imposing various locality restrictions to our decoder by employing the resource theory of asymmetry framework. In this task, the sender Alice and the receiver Bob share an entangled state. She encodes the classical information into it using a symmetric preserving encoder and sends the encoded state to Bob through a noiseless quantum channel. The decoder is limited to a measurement to satisfy a certain locality condition on the bipartite system composed of the receiving system and the preshared entanglement half. Our contributions are summarized as follows: First, we derive an achievable transmission rate for this task dependently of conditions of encoder and decoder. Surprisingly, we show that the obtained rate cannot be improved even when the decoder is relaxed to local measurements, two-way LOCCs, separable measurements, or partial transpose positive (PPT) measurements for the bipartite system. Moreover, depending on the class of allowed measurements with a locality condition, we relax the class of encoding operations to super-quantum encoders in the framework of general probability theory (GPT). That is, when our decoder is restricted to a separable measurement, theoretically, a positive operation is allowed as an encoding operation. Surprisingly, even under this type of super-quantum relaxation, the transmission rate cannot be improved. This fact highlights the universal validity of our analysis beyond quantum theory.
△ Less
Submitted 26 September, 2021;
originally announced September 2021.
-
On the Capacity of Quantum Private Information Retrieval from MDS-Coded and Colluding Servers
Authors:
Matteo Allaix,
Seunghoan Song,
Lukas Holzbaur,
Tefjol Pllaha,
Masahito Hayashi,
Camilla Hollanti
Abstract:
In quantum private information retrieval (QPIR), a user retrieves a classical file from multiple servers by downloading quantum systems without revealing the identity of the file. The QPIR capacity is the maximal achievable ratio of the retrieved file size to the total download size. In this paper, the capacity of QPIR from MDS-coded and colluding servers is studied for the first time. Two general…
▽ More
In quantum private information retrieval (QPIR), a user retrieves a classical file from multiple servers by downloading quantum systems without revealing the identity of the file. The QPIR capacity is the maximal achievable ratio of the retrieved file size to the total download size. In this paper, the capacity of QPIR from MDS-coded and colluding servers is studied for the first time. Two general classes of QPIR, called stabilizer QPIR and dimension-squared QPIR induced from classical strongly linear PIR are defined, and the related QPIR capacities are derived. For the non-colluding case, the general QPIR capacity is derived when the number of files goes to infinity. A general statement on the converse bound for QPIR with coded and colluding servers is derived showing that the capacities of stabilizer QPIR and dimension-squared QPIR induced from any class of PIR are upper bounded by twice the classical capacity of the respective PIR class. The proposed capacity-achieving scheme combines the star-product scheme by Freij-Hollanti et al. and the stabilizer QPIR scheme by Song et al. by employing (weakly) self-dual Reed--Solomon codes.
△ Less
Submitted 8 November, 2021; v1 submitted 28 June, 2021;
originally announced June 2021.
-
Computation-aided classical-quantum multiple access to boost network communication speeds
Authors:
Masahito Hayashi,
Angeles Vazquez-Castro
Abstract:
A multiple access channel (MAC) consists of multiple senders simultaneously transmitting their messages to a single receiver. For the classical-quantum case (cq-MAC), achievable rates are known assuming that all the messages are decoded, a common assumption in quantum network design. However, such a conventional design approach ignores the global network structure, i.e., the network topology. When…
▽ More
A multiple access channel (MAC) consists of multiple senders simultaneously transmitting their messages to a single receiver. For the classical-quantum case (cq-MAC), achievable rates are known assuming that all the messages are decoded, a common assumption in quantum network design. However, such a conventional design approach ignores the global network structure, i.e., the network topology. When a cq-MAC is given as a part of quantum network communication, this work shows that computation properties can be used to boost communication speeds with code design dependently on the network topology. We quantify achievable quantum communication rates of codes with computation property for a two-sender cq-MAC. When the two-sender cq-MAC is a boson coherent channel with binary discrete modulation, we show that it achieves the maximum possible communication rate (the single-user capacity), which cannot be achieved with conventional design. Further, such a rate can be achieved by different detection methods: quantum (with and without quantum memory), on-off photon counting and homodyne (each at different photon power). Finally, we describe two practical applications, one of which cryptographic.
△ Less
Submitted 30 May, 2021;
originally announced May 2021.
-
Graph-Theoretic Framework for Self-Testing in Bell Scenarios
Authors:
Kishor Bharti,
Maharshi Ray,
Zhen-Peng Xu,
Masahito Hayashi,
Leong-Chuan Kwek,
Adán Cabello
Abstract:
Quantum self-testing is the task of certifying quantum states and measurements using the output statistics solely, with minimal assumptions about the underlying quantum system. It is based on the observation that some extremal points in the set of quantum correlations can only be achieved, up to isometries, with specific states and measurements. Here, we present a new approach for quantum self-tes…
▽ More
Quantum self-testing is the task of certifying quantum states and measurements using the output statistics solely, with minimal assumptions about the underlying quantum system. It is based on the observation that some extremal points in the set of quantum correlations can only be achieved, up to isometries, with specific states and measurements. Here, we present a new approach for quantum self-testing in Bell non-locality scenarios, motivated by the following observation: the quantum maximum of a given Bell inequality is, in general, difficult to characterize. However, it is strictly contained in an easy-to-characterize set: the \emph{theta body} of a vertex-weighted induced subgraph $(G,w)$ of the graph in which vertices represent the events and edges join mutually exclusive events. This implies that, for the cases where the quantum maximum and the maximum within the theta body (known as the Lovász theta number) of $(G,w)$ coincide, self-testing can be demonstrated by just proving self-testability with the theta body of $G$. This graph-theoretic framework allows us to (i) recover the self-testability of several quantum correlations that are known to permit self-testing (like those violating the Clauser-Horne-Shimony-Holt (CHSH) and three-party Mermin Bell inequalities for projective measurements of arbitrary rank, and chained Bell inequalities for rank-one projective measurements), (ii) prove the self-testability of quantum correlations that were not known using existing self-testing techniques (e.g., those violating the Abner Shimony Bell inequality for rank-one projective measurements). Additionally, the analysis of the chained Bell inequalities gives us a closed-form expression of the Lovász theta number for a family of well-studied graphs known as the Möbius ladders, which might be of independent interest in the community of discrete mathematics.
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
Stochastic behavior of outcome of Schur-Weyl duality measurement
Authors:
Masahito Hayashi,
Akihito Hora,
Shintarou Yanagida
Abstract:
We focus on the measurement defined by the decomposition based on Schur-Weyl duality on $n$ qubits. As the first setting, we discuss the asymptotic behavior of the measurement outcome when the state is given as the permutation mixture $ρ_{mix,n,l}$ of the state $| 1^{l} \, 0^{n-l} \rangle := | 1 \rangle^{\otimes l} \otimes |0\rangle^{\otimes (n-l)}$. In contrast, when the state is given as the Dic…
▽ More
We focus on the measurement defined by the decomposition based on Schur-Weyl duality on $n$ qubits. As the first setting, we discuss the asymptotic behavior of the measurement outcome when the state is given as the permutation mixture $ρ_{mix,n,l}$ of the state $| 1^{l} \, 0^{n-l} \rangle := | 1 \rangle^{\otimes l} \otimes |0\rangle^{\otimes (n-l)}$. In contrast, when the state is given as the Dicke state $|Ξ_{n,l}\rangle$, the measurement outcome takes one deterministic value. These two cases have completely different behaviors. As the second setting, we study the case when the state is given as the tensor product of the permutation mixture $ρ_{mix,k,l}$ and the Dicke state $| Ξ_{n-k,m-l} \rangle$. We derive various types of asymptotic distribution including a kind of central limit theorem when $n$ goes to infinity.
△ Less
Submitted 15 November, 2023; v1 submitted 26 April, 2021;
originally announced April 2021.
-
Quantum Private Information Retrieval for Quantum Messages
Authors:
Seunghoan Song,
Masahito Hayashi
Abstract:
Quantum private information retrieval (QPIR) for quantum messages is the protocol in which a user retrieves one of the multiple quantum states from one or multiple servers without revealing which state is retrieved. We consider QPIR in two different settings: the blind setting, in which the servers contain one copy of the message states, and the visible setting, in which the servers contain the de…
▽ More
Quantum private information retrieval (QPIR) for quantum messages is the protocol in which a user retrieves one of the multiple quantum states from one or multiple servers without revealing which state is retrieved. We consider QPIR in two different settings: the blind setting, in which the servers contain one copy of the message states, and the visible setting, in which the servers contain the description of the message states. One trivial solution in both settings is downloading all states from the servers and the main goal of this paper is to find more efficient QPIR protocols. First, we prove that the trivial solution is optimal for one-server QPIR in the blind setting. In one-round protocols, the same optimality holds even in the visible setting. On the other hand, when the user and the server share entanglement, we prove that there exists an efficient one-server QPIR protocol in the blind setting. Furthermore, in the visible setting, we prove that it is possible to construct symmetric QPIR protocols in which the user obtains no information of the non-targeted messages. We construct three two-server symmetric QPIR protocols for pure states. Note that symmetric classical PIR is impossible without shared randomness unknown to the user.
△ Less
Submitted 22 January, 2021;
originally announced January 2021.
-
Efficient Algorithms for Causal Order Discovery in Quantum Networks
Authors:
Ge Bai,
Ya-Dong Wu,
Yan Zhu,
Masahito Hayashi,
Giulio Chiribella
Abstract:
Given black-box access to the input and output systems, we develop the first efficient quantum causal order discovery algorithm with polynomial query complexity with respect to the number of systems. We model the causal order with quantum combs, and our algorithms output the order of inputs and outputs that the given process is compatible with. Our algorithm searches for the last input and the las…
▽ More
Given black-box access to the input and output systems, we develop the first efficient quantum causal order discovery algorithm with polynomial query complexity with respect to the number of systems. We model the causal order with quantum combs, and our algorithms output the order of inputs and outputs that the given process is compatible with. Our algorithm searches for the last input and the last output in the causal order, removes them, and iteratively repeats the above procedure until we get the order of all inputs and outputs. Our method guarantees a polynomial running time for quantum combs with a low Kraus rank, namely processes with low noise and little information loss. For special cases where the causal order can be inferred from local observations, we also propose algorithms that have lower query complexity and only require local state preparation and local measurements. Our algorithms will provide efficient ways to detect and optimize available transmission paths in quantum communication networks, as well as methods to verify quantum circuits and to discover the latent structure of multipartite quantum systems.
△ Less
Submitted 28 September, 2021; v1 submitted 3 December, 2020;
originally announced December 2020.
-
Usefulness of adaptive strategies in asymptotic quantum channel discrimination
Authors:
Farzin Salek,
Masahito Hayashi,
Andreas Winter
Abstract:
Adaptiveness is a key principle in information processing including statistics and machine learning. We investigate the usefulness of adaptive methods in the framework of asymptotic binary hypothesis testing, when each hypothesis represents asymptotically many independent instances of a quantum channel, and the tests are based on using the unknown channel and observing outputs. Unlike the familiar…
▽ More
Adaptiveness is a key principle in information processing including statistics and machine learning. We investigate the usefulness of adaptive methods in the framework of asymptotic binary hypothesis testing, when each hypothesis represents asymptotically many independent instances of a quantum channel, and the tests are based on using the unknown channel and observing outputs. Unlike the familiar setting of quantum states as hypotheses, there is a fundamental distinction between adaptive and non-adaptive strategies with respect to the channel uses, and we introduce a number of further variants of the discrimination tasks by imposing different restrictions on the test strategies. The following results are obtained: (1) We prove that for classical-quantum channels, adaptive and non-adaptive strategies lead to the same error exponents both in the symmetric (Chernoff) and asymmetric (Hoeffding, Stein) settings. (2) The first separation between adaptive and non-adaptive symmetric hypothesis testing exponents for quantum channels, which we derive from a general lower bound on the error probability for non-adaptive strategies; the concrete example we analyze is a pair of entanglement-breaking channels. (3)We prove, in some sense generalizing the previous statement, that for general channels adaptive strategies restricted to classical feed-forward and product state channel inputs are not superior in the asymptotic limit to non-adaptive product state strategies. (4) As an application of our findings, we address the discrimination power of an arbitrary quantum channel and show that adaptive strategies with classical feedback and no quantum memory at the input do not increase the discrimination power of the channel beyond non-adaptive tensor product input strategies.
△ Less
Submitted 17 March, 2024; v1 submitted 12 November, 2020;
originally announced November 2020.
-
Universal classical-quantum superposition coding and universal classical-quantum multiple access channel coding
Authors:
Masahito Hayashi,
Ning Cai
Abstract:
We derive universal classical-quantum superposition coding and universal classical-quantum multiple access channel code by using generalized packing lemmas for the type method. Using our classical-quantum universal superposition code, we establish the capacity region of a classical-quantum compound broadcast channel with degraded message sets. Our universal classical-quantum multiple access channe…
▽ More
We derive universal classical-quantum superposition coding and universal classical-quantum multiple access channel code by using generalized packing lemmas for the type method. Using our classical-quantum universal superposition code, we establish the capacity region of a classical-quantum compound broadcast channel with degraded message sets. Our universal classical-quantum multiple access channel codes have two types of codes. One is a code with joint decoding and the other is a code with separate decoding. The former universally achieves corner points of the capacity region and the latter universally achieves general points of the capacity region. Combining the latter universal code with the existing result by Quantum Inf Process. 18, 246 (2019), we establish a single-letterized formula for the capacity region of a classical-quantum compound multiple access channel.
△ Less
Submitted 5 May, 2021; v1 submitted 31 October, 2020;
originally announced November 2020.
-
Representation matching for delegated quantum computing
Authors:
Yuxiang Yang,
Masahito Hayashi
Abstract:
Many quantum computational tasks have inherent symmetries, suggesting a path to enhancing their efficiency and performance. Exploiting this observation, we propose representation matching, a generic probabilistic protocol for reducing the cost of quantum computation in a quantum network. We show that the representation matching protocol is capable of reducing the communication or memory cost to al…
▽ More
Many quantum computational tasks have inherent symmetries, suggesting a path to enhancing their efficiency and performance. Exploiting this observation, we propose representation matching, a generic probabilistic protocol for reducing the cost of quantum computation in a quantum network. We show that the representation matching protocol is capable of reducing the communication or memory cost to almost minimum in various tasks, including remote execution of unitary gate arrays, permutation gates and unitary conjugation, as well as the storage and retrieval of unitary gates.
△ Less
Submitted 28 May, 2021; v1 submitted 14 September, 2020;
originally announced September 2020.
-
Perfect Discrimination in Approximate Quantum Theory of General Probabilistic Theories
Authors:
Yuuya Yoshida,
Hayato Arai,
Masahito Hayashi
Abstract:
As a modern approach for the foundation of quantum theory, existing studies of General Probabilistic Theories gave various models of states and measurements that are quite different from quantum theory. In this paper, to seek a more realistic situation, we investigate models approximately close to quantum theory. We define larger measurement classes that are smoothly connected with the class of PO…
▽ More
As a modern approach for the foundation of quantum theory, existing studies of General Probabilistic Theories gave various models of states and measurements that are quite different from quantum theory. In this paper, to seek a more realistic situation, we investigate models approximately close to quantum theory. We define larger measurement classes that are smoothly connected with the class of POVMs via a parameter, and investigate the performance of perfect discrimination. As a result, we give a sufficient condition of perfect discrimination, which shows a significant improvement beyond the class of POVMs.
△ Less
Submitted 10 April, 2020;
originally announced April 2020.
-
Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free One-Way Public Communication
Authors:
Go Kato,
Masaki Owari,
Masahito Hayashi
Abstract:
It is natural in a quantum network system that multiple users intend to send their quantum message to their respective receivers, which is called a multiple unicast quantum network. We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network from a secure classical network code. Our code correctly transmits quantum states when there is no attack. I…
▽ More
It is natural in a quantum network system that multiple users intend to send their quantum message to their respective receivers, which is called a multiple unicast quantum network. We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network from a secure classical network code. Our code correctly transmits quantum states when there is no attack. It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack when the attack satisfies a certain natural condition. In our security proof, the eavesdropper is allowed to modify wiretapped information dependently on the previously wiretapped messages. Our protocol guarantees the secrecy by utilizing one-way classical information transmission (public communication) in the same direction as the quantum network although the verification of quantum information transmission requires two-way classical communication. Our secure network code can be applied to several networks including the butterfly network.
△ Less
Submitted 30 March, 2020;
originally announced March 2020.
-
Finite Block Length Analysis on Quantum Coherence Distillation and Incoherent Randomness Extraction
Authors:
Masahito Hayashi,
Kun Fang,
Kun Wang
Abstract:
We give the first systematic study on the second order asymptotics of the operational task of coherence distillation with and without assistance. In the unassisted setting, we introduce a variant of randomness extraction framework where free incoherent operations are allowed before the incoherent measurement and the randomness extractors. We then show that the maximum number of random bits extract…
▽ More
We give the first systematic study on the second order asymptotics of the operational task of coherence distillation with and without assistance. In the unassisted setting, we introduce a variant of randomness extraction framework where free incoherent operations are allowed before the incoherent measurement and the randomness extractors. We then show that the maximum number of random bits extractable from a given quantum state is precisely equal to the maximum number of coherent bits that can be distilled from the same state. This relation enables us to derive tight second order expansions of both tasks in the independent and identically distributed setting. Remarkably, the incoherent operation classes that can empower coherence distillation for generic states all admit the same second order expansions, indicating their operational equivalence for coherence distillation in both asymptotic and large block length regime. We then generalize the above line of research to the assisted setting, arising naturally in bipartite quantum systems where Bob distills coherence from the state at hand, aided by the benevolent Alice possessing the other system. More precisely, we introduce a new assisted incoherent randomness extraction task and establish an exact relation between this task and the assisted coherence distillation. This strengthens the one-shot relation in the unassisted setting and confirms that this cryptographic framework indeed offers a new perspective to the study of quantum coherence distillation. Likewise, this relation yields second order characterizations to the assisted tasks. As by-products, we show the strong converse property of the aforementioned tasks from their second order expansions.
△ Less
Submitted 10 November, 2020; v1 submitted 27 February, 2020;
originally announced February 2020.
-
Communication Cost of Quantum Processes
Authors:
Yuxiang Yang,
Giulio Chiribella,
Masahito Hayashi
Abstract:
A common scenario in distributed computing involves a client who asks a server to perform a computation on a remote computer. An important problem is to determine the minimum amount of communication needed to specify the desired computation. Here we extend this problem to the quantum domain, analyzing the total amount of (classical and quantum) communication needed by a server in order to accurate…
▽ More
A common scenario in distributed computing involves a client who asks a server to perform a computation on a remote computer. An important problem is to determine the minimum amount of communication needed to specify the desired computation. Here we extend this problem to the quantum domain, analyzing the total amount of (classical and quantum) communication needed by a server in order to accurately execute a quantum process chosen by a client from a parametric family of quantum processes. We derive a general lower bound on the communication cost, establishing a relation with the precision limits of quantum metrology: if a $ν$-dimensional family of processes can be estimated with mean squared error $n^{-β}$ by using $n$ parallel queries, then the communication cost for $n$ parallel executions of a process in the family is at least $(βν/2-ε)\log n$ qubits at the leading order in $n$, for every $ε>0$. For a class of quantum processes satisfying the standard quantum limit ($β=1$), we show that the bound can be attained by transmitting an approximate classical description of the desired process. For quantum processes satisfying the Heisenberg limit ($β=2$), our bound shows that the communication cost is at least twice as the cost of communicating standard quantum limited processes with the same number of parameters.
△ Less
Submitted 26 October, 2020; v1 submitted 17 February, 2020;
originally announced February 2020.
-
Capacity of Quantum Private Information Retrieval with Colluding Servers
Authors:
Seunghoan Song,
Masahito Hayashi
Abstract:
Quantum private information retrieval (QPIR) is a protocol in which a user retrieves one of multiple files from $\mathsf{n}$ non-communicating servers by downloading quantum systems without revealing which file is retrieved. As variants of QPIR with stronger security requirements, symmetric QPIR is a protocol in which no other files than the target file are leaked to the user, and $\mathsf{t}$-pri…
▽ More
Quantum private information retrieval (QPIR) is a protocol in which a user retrieves one of multiple files from $\mathsf{n}$ non-communicating servers by downloading quantum systems without revealing which file is retrieved. As variants of QPIR with stronger security requirements, symmetric QPIR is a protocol in which no other files than the target file are leaked to the user, and $\mathsf{t}$-private QPIR is a protocol in which the identity of the target file is kept secret even if at most $\mathsf{t}$ servers may collude to reveal the identity. The QPIR capacity is the maximum ratio of the file size to the size of downloaded quantum systems, and we prove that the symmetric $\mathsf{t}$-private QPIR capacity is $\min\{1,2(\mathsf{n}-\mathsf{t})/\mathsf{n}\}$ for any $1\leq \mathsf{t}< \mathsf{n}$. We construct a capacity-achieving QPIR protocol by the stabilizer formalism and prove the optimality of our protocol. The proposed capacity is greater than the classical counterpart.
△ Less
Submitted 22 April, 2021; v1 submitted 13 January, 2020;
originally announced January 2020.
-
Permutation Enhances Classical Communication Assisted by Entangled States
Authors:
Kun Wang,
Masahito Hayashi
Abstract:
We give a capacity formula for the classical communication over a noisy quantum channel, when local operations and global permutations allowed in the encoding and bipartite states preshared between the sender and the receiver. The two endpoints of this formula are the Holevo capacity (without entanglement assistance) and the entanglement-assisted capacity (with unlimited entanglement assistance).…
▽ More
We give a capacity formula for the classical communication over a noisy quantum channel, when local operations and global permutations allowed in the encoding and bipartite states preshared between the sender and the receiver. The two endpoints of this formula are the Holevo capacity (without entanglement assistance) and the entanglement-assisted capacity (with unlimited entanglement assistance). What's more, we show that the capacity satisfies the strong converse property and thus the formula serves as a sharp dividing line between achievable and unachievable rates of communication. We prove that the difference between the assisted capacity and the Holevo capacity is upper bounded by the discord of formation of the preshared state. As examples, we derive analytically the classical capacity of various quantum channels of interests. Our result witnesses the power of random permutation in classical communication, whenever entanglement assistance is available.
△ Less
Submitted 9 January, 2020; v1 submitted 6 January, 2020;
originally announced January 2020.
-
Quantum Capacity of Partially Corrupted Quantum Network
Authors:
Masahito Hayashi,
Seunghoan Song
Abstract:
We discuss a quantum network, in which the sender has $m_0$ outgoing channels, the receiver has $m_0$ incoming channels, each channel is of capacity $d$, each intermediate node applies invertible unitary, only $m_1$ channels are corrupted, and other non-corrupted channels are noiseless. As our result, we show that the quantum capacity is not smaller than $(m_0-2m_1+1)\log d$ under the following tw…
▽ More
We discuss a quantum network, in which the sender has $m_0$ outgoing channels, the receiver has $m_0$ incoming channels, each channel is of capacity $d$, each intermediate node applies invertible unitary, only $m_1$ channels are corrupted, and other non-corrupted channels are noiseless. As our result, we show that the quantum capacity is not smaller than $(m_0-2m_1+1)\log d$ under the following two settings. In the first case, the unitaries on intermediate nodes are arbitrary and the corruptions on the $m_1$ channels are individual. In the second case, the unitaries on intermediate nodes are restricted to Clifford operations and the corruptions on the $m_1$ channels are adaptive, i.e., the attacker is allowed to have a quantum memory. Further, our code in the second case realizes the noiseless communication even with the single-shot setting and is constructed dependently only on the network topology and the places of the $m_1$ corrupted channels while this result holds regardless of the network topology and the places.
△ Less
Submitted 7 November, 2019;
originally announced November 2019.
-
Quantum state estimation with nuisance parameters
Authors:
Jun Suzuki,
Yuxiang Yang,
Masahito Hayashi
Abstract:
In parameter estimation, nuisance parameters refer to parameters that are not of interest but nevertheless affect the precision of estimating other parameters of interest. For instance, the strength of noises in a probe can be regarded as a nuisance parameter. Despite its long history in classical statistics, the nuisance parameter problem in quantum estimation remains largely unexplored. The goal…
▽ More
In parameter estimation, nuisance parameters refer to parameters that are not of interest but nevertheless affect the precision of estimating other parameters of interest. For instance, the strength of noises in a probe can be regarded as a nuisance parameter. Despite its long history in classical statistics, the nuisance parameter problem in quantum estimation remains largely unexplored. The goal of this article is to provide a systematic review of quantum estimation in the presence of nuisance parameters, and to supply those who work in quantum tomography and quantum metrology with tools to tackle relevant problems. After an introduction to the nuisance parameter and quantum estimation theory, we explicitly formulate the problem of quantum state estimation with nuisance parameters. We extend quantum Cramer-Rao bounds to the nuisance parameter case and provide a parameter orthogonalization tool to separate the nuisance parameters from the parameters of interest. In particular, we put more focus on the case of one-parameter estimation in the presence of nuisance parameters, as it is most frequently encountered in practice.
△ Less
Submitted 29 June, 2020; v1 submitted 7 November, 2019;
originally announced November 2019.
-
Verifiable Quantum Secure Modulo Summation
Authors:
Masahito Hayashi,
Takeshi Koshiba
Abstract:
We propose a new cryptographic task, which we call verifiable quantum secure modulo summation. Secure modulo summation is a calculation of modulo summation $Y_1+\ldots+ Y_m$ when $m$ players have their individual variables $Y_1,\ldots, Y_m$ with kee** the secrecy of the individual variables. However, the conventional method for secure modulo summation uses so many secret communication channels.…
▽ More
We propose a new cryptographic task, which we call verifiable quantum secure modulo summation. Secure modulo summation is a calculation of modulo summation $Y_1+\ldots+ Y_m$ when $m$ players have their individual variables $Y_1,\ldots, Y_m$ with kee** the secrecy of the individual variables. However, the conventional method for secure modulo summation uses so many secret communication channels. We say that a quantum protocol for secure modulo summation is quantum verifiable secure modulo summation when it can verify the desired secrecy condition. If we combine device independent quantum key distribution, it is possible to verify such secret communication channels. However, it consumes so many steps. To resolve this problem, using quantum systems, we propose a more direct method to realize secure modulo summation with verification. To realize this protocol, we propose modulo zero-sum randomness as another new concept, and show that secure modulo summation can be realized by using modulo zero-sum randomness. Then, we construct a verifiable quantum protocol method to generate modulo zero-sum randomness. This protocol can be verified only with minimum requirements.
△ Less
Submitted 14 October, 2019;
originally announced October 2019.