-
Calibration of the Cryogenic Measurement System of a Resonant Haloscope Cavity
Authors:
Dong He,
Jie Fan,
Xin Gao,
Yu Gao,
Nick Houston,
Zhongqing Ji,
Yirong **,
Chuang Li,
**mian Li,
Tianjun Li,
Shi-hang Liu,
Jia-Shu Niu,
Zhihui Peng,
Liang Sun,
Zheng Sun,
Jia Wang,
Puxian Wei,
Lina Wu,
Zhongchen Xiang,
Qiaoli Yang,
Chi Zhang,
Wenxing Zhang,
Xin Zhang,
Dongning Zheng,
Ruifeng Zheng
, et al. (1 additional authors not shown)
Abstract:
Possible light bosonic dark matter interactions with the Standard Model photon have been searched by microwave resonant cavities. In this paper, we demonstrate the cryogenic readout system calibration of a 7.138 GHz copper cavity with a loaded quality factor $Q_l=10^4$, operated at 22 mK temperature based on a dilution refrigerator. Our readout system consists of High Electron Mobility Transistors…
▽ More
Possible light bosonic dark matter interactions with the Standard Model photon have been searched by microwave resonant cavities. In this paper, we demonstrate the cryogenic readout system calibration of a 7.138 GHz copper cavity with a loaded quality factor $Q_l=10^4$, operated at 22 mK temperature based on a dilution refrigerator. Our readout system consists of High Electron Mobility Transistors as cryogenic amplifiers at 4 K, plus room-temperature amplifiers and a spectrum analyzer for signal power detection. We test the system with a superconducting two-level system as a single-photon source in the microwave frequency regime and report an overall 95.6 dB system gain and -71.4 dB attenuation in the cavity's input channel. The effective noise temperature of the measurement system is 7.5 K.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Exceptional nexus in Bose-Einstein condensates with collective dissipation
Authors:
Chenhao Wang,
Nan Li,
** Xie,
Cong Ding,
Zhonghua Ji,
Liantuan Xiao,
Suotang Jia,
Ying Hu,
Yanting Zhao
Abstract:
In multistate non-Hermitian systems, higher-order exceptional points and exotic phenomena with no analogues in two-level systems arise. A paradigm is the exceptional nexus (EX), a third-order EP as the cusp singularity of exceptional arcs (EAs), that has a hybrid topological nature. Using atomic Bose-Einstein condensates to implement a dissipative three-state system, we experimentally realize an E…
▽ More
In multistate non-Hermitian systems, higher-order exceptional points and exotic phenomena with no analogues in two-level systems arise. A paradigm is the exceptional nexus (EX), a third-order EP as the cusp singularity of exceptional arcs (EAs), that has a hybrid topological nature. Using atomic Bose-Einstein condensates to implement a dissipative three-state system, we experimentally realize an EX within a two-parameter space, despite the absence of symmetry. The engineered dissipation exhibits density dependence due to the collective atomic response to resonant light. Based on extensive analysis of the system's decay dynamics, we demonstrate the formation of an EX from the coalescence of two EAs with distinct geometries. These structures arise from the different roles played by dissipation in the strong coupling limit and quantum Zeno regime. Our work paves the way for exploring higher-order exceptional physics in the many-body setting of ultracold atoms.
△ Less
Submitted 20 June, 2024; v1 submitted 18 September, 2023;
originally announced September 2023.
-
IQP Sampling and Verifiable Quantum Advantage: Stabilizer Scheme and Classical Security
Authors:
Michael J. Bremner,
Bin Cheng,
Zhengfeng Ji
Abstract:
Sampling problems demonstrating beyond classical computing power with noisy intermediate-scale quantum (NISQ) devices have been experimentally realized. In those realizations, however, our trust that the quantum devices faithfully solve the claimed sampling problems is usually limited to simulations of smaller-scale instances and is, therefore, indirect. The problem of verifiable quantum advantage…
▽ More
Sampling problems demonstrating beyond classical computing power with noisy intermediate-scale quantum (NISQ) devices have been experimentally realized. In those realizations, however, our trust that the quantum devices faithfully solve the claimed sampling problems is usually limited to simulations of smaller-scale instances and is, therefore, indirect. The problem of verifiable quantum advantage aims to resolve this critical issue and provides us with greater confidence in a claimed advantage. Instantaneous quantum polynomial-time (IQP) sampling has been proposed to achieve beyond classical capabilities with a verifiable scheme based on quadratic-residue codes (QRC). Unfortunately, this verification scheme was recently broken by an attack proposed by Kahanamoku-Meyer. In this work, we revive IQP-based verifiable quantum advantage by making two major contributions. Firstly, we introduce a family of IQP sampling protocols called the \emph{stabilizer scheme}, which builds on results linking IQP circuits, the stabilizer formalism, coding theory, and an efficient characterization of IQP circuit correlation functions. This construction extends the scope of existing IQP-based schemes while maintaining their simplicity and verifiability. Secondly, we introduce the \emph{Hidden Structured Code} (HSC) problem as a well-defined mathematical challenge that underlies the stabilizer scheme. To assess classical security, we explore a class of attacks based on secret extraction, including the Kahanamoku-Meyer's attack as a special case. We provide evidence of the security of the stabilizer scheme, assuming the hardness of the HSC problem. We also point out that the vulnerability observed in the original QRC scheme is primarily attributed to inappropriate parameter choices, which can be naturally rectified with proper parameter settings.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Logarithmic-Regret Quantum Learning Algorithms for Zero-Sum Games
Authors:
Minbo Gao,
Zhengfeng Ji,
Tongyang Li,
Qisheng Wang
Abstract:
We propose the first online quantum algorithm for zero-sum games with $\tilde O(1)$ regret under the game setting. Moreover, our quantum algorithm computes an $\varepsilon$-approximate Nash equilibrium of an $m \times n$ matrix zero-sum game in quantum time $\tilde O(\sqrt{m+n}/\varepsilon^{2.5})$, yielding a quadratic improvement over classical algorithms in terms of $m, n$. Our algorithm uses st…
▽ More
We propose the first online quantum algorithm for zero-sum games with $\tilde O(1)$ regret under the game setting. Moreover, our quantum algorithm computes an $\varepsilon$-approximate Nash equilibrium of an $m \times n$ matrix zero-sum game in quantum time $\tilde O(\sqrt{m+n}/\varepsilon^{2.5})$, yielding a quadratic improvement over classical algorithms in terms of $m, n$. Our algorithm uses standard quantum inputs and generates classical outputs with succinct descriptions, facilitating end-to-end applications. As an application, we obtain a fast quantum linear programming solver. Technically, our online quantum algorithm "quantizes" classical algorithms based on the optimistic multiplicative weight update method. At the heart of our algorithm is a fast quantum multi-sampling procedure for the Gibbs sampling problem, which may be of independent interest.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Quasiparticle poisoning rate in a superconducting transmon qubit involving Majorana zero modes
Authors:
Xiaopei Sun,
Zhaozheng Lyu,
Enna Zhuo,
Bing Li,
Zhongqing Ji,
Jie Fan,
Xiaohui Song,
Fanning Qu,
Guangtong Liu,
Jie Shen,
Li Lu
Abstract:
Majorana zero modes have been attracting considerable attention because of their prospective applications in fault-tolerant topological quantum computing. In recent years, some schemes have been proposed to detect and manipulate Majorana zero modes using superconducting qubits. However, manipulating and reading the Majorana zero modes must be kept in the time window of quasiparticle poisoning. In…
▽ More
Majorana zero modes have been attracting considerable attention because of their prospective applications in fault-tolerant topological quantum computing. In recent years, some schemes have been proposed to detect and manipulate Majorana zero modes using superconducting qubits. However, manipulating and reading the Majorana zero modes must be kept in the time window of quasiparticle poisoning. In this work, we study the problem of quasiparticle poisoning in a split transmon qubit containing hybrid Josephson junctions involving Majorana zero modes. We show that Majorana coupling will cause parity mixing and 4π Josephson effect. In addition, we obtained the expression of qubit parameter-dependent parity switching rate and demonstrated that quasiparticle poisoning can be greatly suppressed by reducing E_J/E_C via qubit design.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
Parameterized Complexity of Weighted Local Hamiltonian Problems and the Quantum Exponential Time Hypothesis
Authors:
Michael J. Bremner,
Zhengfeng Ji,
Xingjian Li,
Luke Mathieson,
Mauro E. S. Morales
Abstract:
We study a parameterized version of the local Hamiltonian problem, called the weighted local Hamiltonian problem, where the relevant quantum states are superpositions of computational basis states of Hamming weight $k$. The Hamming weight constraint can have a physical interpretation as a constraint on the number of excitations allowed or particle number in a system. We prove that this problem is…
▽ More
We study a parameterized version of the local Hamiltonian problem, called the weighted local Hamiltonian problem, where the relevant quantum states are superpositions of computational basis states of Hamming weight $k$. The Hamming weight constraint can have a physical interpretation as a constraint on the number of excitations allowed or particle number in a system. We prove that this problem is in QW[1], the first level of the quantum weft hierarchy and that it is hard for QM[1], the quantum analogue of M[1]. Our results show that this problem cannot be fixed-parameter quantum tractable (FPQT) unless certain natural quantum analogue of the exponential time hypothesis (ETH) is false.
△ Less
Submitted 9 November, 2022;
originally announced November 2022.
-
Classical and Quantum Iterative Optimization Algorithms Based on Matrix Legendre-Bregman Projections
Authors:
Zhengfeng Ji
Abstract:
We consider Legendre-Bregman projections defined on the Hermitian matrix space and design iterative optimization algorithms based on them. A general duality theorem is established for Bregman divergences on Hermitian matrices, and it plays a crucial role in proving the convergence of the iterative algorithms. We study both exact and approximate Bregman projection algorithms. In the particular case…
▽ More
We consider Legendre-Bregman projections defined on the Hermitian matrix space and design iterative optimization algorithms based on them. A general duality theorem is established for Bregman divergences on Hermitian matrices, and it plays a crucial role in proving the convergence of the iterative algorithms. We study both exact and approximate Bregman projection algorithms. In the particular case of Kullback-Leibler divergence, our approximate iterative algorithm gives rise to the non-commutative versions of both the generalized iterative scaling (GIS) algorithm for maximum entropy inference and the AdaBoost algorithm in machine learning as special cases. As the Legendre-Bregman projections are simple matrix functions on Hermitian matrices, quantum algorithmic techniques are applicable to achieve potential speedups in each iteration of the algorithm. We discuss several quantum algorithmic design techniques applicable in our setting, including the smooth function evaluation technique, two-phase quantum minimum finding, and NISQ Gibbs state preparation.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states
Authors:
Tian-Yu Ye,
Zhao-Xu Ji
Abstract:
Quantum private comparison (QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we summarize eight modes of quantum state preparation and transmission existing in current QPC protocols first. Then, by using the mode of scattered preparation and one-way convergent t…
▽ More
Quantum private comparison (QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we summarize eight modes of quantum state preparation and transmission existing in current QPC protocols first. Then, by using the mode of scattered preparation and one-way convergent transmission, we construct a new multi-user quantum private comparison (MQPC) protocol with two-particle maximally entangled states, which can accomplish arbitrary pair's comparison of equality among K users within one execution. Analysis turns out that its output correctness and its security against both the outside attack and the participant attack are guaranteed. The proposed MQPC protocol can be implemented with current technologies. It can be concluded that the mode of scattered preparation and one-way convergent transmission of quantum states is beneficial to designing the MQPC protocol which can accomplish arbitrary pair's comparison of equality among K users within one execution.
△ Less
Submitted 9 May, 2022;
originally announced May 2022.
-
Multi-party Quantum Private Comparison Based on the Entanglement Swap** of d-level Cat States and d-level Bell states
Authors:
Zhao-Xu Ji,
Tian-Yu Ye
Abstract:
In this paper, a novel multi-party quantum private comparison (MQPC) protocol with a semi-honest third party (TP) is proposed based on the entanglement swap** of d-level cat states and d-level Bell states. Here, TP is allowed to misbehave on his own but will not conspire with any party. In our protocol, n parties employ unitary operations to encode their private secrets and can compare the equal…
▽ More
In this paper, a novel multi-party quantum private comparison (MQPC) protocol with a semi-honest third party (TP) is proposed based on the entanglement swap** of d-level cat states and d-level Bell states. Here, TP is allowed to misbehave on his own but will not conspire with any party. In our protocol, n parties employ unitary operations to encode their private secrets and can compare the equality of their private secrets within one time execution of the protocol. Our protocol can withstand both the outside attacks and the participant attacks on the condition that none of the QKD methods is adopted to generate keys for security. One party cannot obtain other parties' secrets except for the case that their secrets are identical. The semi-honest TP cannot learn any information about these parties' secrets except the end comparison result on whether all private secrets from n parties are equal.
△ Less
Submitted 9 May, 2022;
originally announced May 2022.
-
Quantum Parameterized Complexity
Authors:
Michael J. Bremner,
Zhengfeng Ji,
Ryan L. Mann,
Luke Mathieson,
Mauro E. S. Morales,
Alexis T. E. Shaw
Abstract:
Parameterized complexity theory was developed in the 1990s to enrich the complexity-theoretic analysis of problems that depend on a range of parameters. In this paper we establish a quantum equivalent of classical parameterized complexity theory, motivated by the need for new tools for the classifications of the complexity of real-world problems. We introduce the quantum analogues of a range of pa…
▽ More
Parameterized complexity theory was developed in the 1990s to enrich the complexity-theoretic analysis of problems that depend on a range of parameters. In this paper we establish a quantum equivalent of classical parameterized complexity theory, motivated by the need for new tools for the classifications of the complexity of real-world problems. We introduce the quantum analogues of a range of parameterized complexity classes and examine the relationship between these classes, their classical counterparts, and well-studied problems. This framework exposes a rich classification of the complexity of parameterized versions of QMA-hard problems, demonstrating, for example, a clear separation between the Quantum Circuit Satisfiability problem and the Local Hamiltonian problem.
△ Less
Submitted 15 March, 2022;
originally announced March 2022.
-
Entanglement swap** under quantum information masking
Authors:
Zhaoxu Ji,
Peiru Fan,
Atta Ur Rahman,
Huanguo Zhang
Abstract:
Quantum information contained in single-particle states can be masked by map** them to entangled states. In this paper, we consider entanglement swap** under the masking of quantum information. Our work can pave the way for develo** the applications of quantum information masking schemes in entanglement-swap**based quantum cryptography.
Quantum information contained in single-particle states can be masked by map** them to entangled states. In this paper, we consider entanglement swap** under the masking of quantum information. Our work can pave the way for develo** the applications of quantum information masking schemes in entanglement-swap**based quantum cryptography.
△ Less
Submitted 12 November, 2021;
originally announced November 2021.
-
Quantum soundness of testing tensor codes
Authors:
Zhengfeng Ji,
Anand Natarajan,
Thomas Vidick,
John Wright,
Henry Yuen
Abstract:
A locally testable code is an error-correcting code that admits very efficient probabilistic tests of membership. Tensor codes provide a simple family of combinatorial constructions of locally testable codes that generalize the family of Reed-Muller codes. The natural test for tensor codes, the axis-parallel line vs. point test, plays an essential role in constructions of probabilistically checkab…
▽ More
A locally testable code is an error-correcting code that admits very efficient probabilistic tests of membership. Tensor codes provide a simple family of combinatorial constructions of locally testable codes that generalize the family of Reed-Muller codes. The natural test for tensor codes, the axis-parallel line vs. point test, plays an essential role in constructions of probabilistically checkable proofs.
We analyze the axis-parallel line vs. point test as a two-prover game and show that the test is sound against quantum provers sharing entanglement. Our result implies the quantum-soundness of the low individual degree test, which is an essential component of the MIP* = RE theorem. Our proof also generalizes to the infinite-dimensional commuting-operator model of quantum provers.
△ Less
Submitted 6 December, 2022; v1 submitted 15 November, 2021;
originally announced November 2021.
-
Demonstration of entanglement and coherence in GHZ-like state when exposed to classical environments with power-law noise
Authors:
Atta Ur Rahman,
ZhaoXu Ji,
HuanGuo Zhang
Abstract:
Entanglement and coherence protection are investigated using the dynamical map of three non-interacting qubits that are initially prepared as maximally entangled GHZ-like states coupled to external fields in solid-state and superconducting materials. Thermal fluctuations and resistance in these materials produce power-law (PL) noise, which we assume controls external fields in three different conf…
▽ More
Entanglement and coherence protection are investigated using the dynamical map of three non-interacting qubits that are initially prepared as maximally entangled GHZ-like states coupled to external fields in solid-state and superconducting materials. Thermal fluctuations and resistance in these materials produce power-law (PL) noise, which we assume controls external fields in three different configurations with single or multiple noise sources. The genuine response of isolated environments to entanglement and coherence retention is analyzed. We also briefly discuss the initial purity and relative efficiency of the GHZ-like states. Unlike the multiple PL noise sources, exposure, the GHZ-class state remains partially entangled and coherent for an indefinite time when subject to single noise source. However, long-term non-local correlation and coherence are still feasible under multiple noise sources. Due to the lack of back-action of the environments, the conversion of the free state into the resource GHZ-class states is not allowed. The parameter optimization, in addition to the noise phase, regulates disorders, noise effects, and memory properties in the current environments. Unlike the bipartite states and tripartite W-type states, the GHZ-like state has been shown to have positive traits of preserving entanglement and coherence against PL noise.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Anonymous multi-party quantum computation with a third party
Authors:
Zhaoxu Ji,
Peiru Fan,
Atta Ur Rahman,
Huanguo Zhang
Abstract:
We reconsider and modify the second secure multi-party quantum addition protocol proposed in our original work. We show that the protocol is an anonymous multi-party quantum addition protocol rather than a secure multi-party quantum addition protocol. Through small changes, we develop the protocol to propose, for the first time, anonymous multiparty quantum computation with a third party, who fait…
▽ More
We reconsider and modify the second secure multi-party quantum addition protocol proposed in our original work. We show that the protocol is an anonymous multi-party quantum addition protocol rather than a secure multi-party quantum addition protocol. Through small changes, we develop the protocol to propose, for the first time, anonymous multiparty quantum computation with a third party, who faithfully executes protocol processes, but is interested in the identity of the data owners. Further, we propose a new anonymous multiparty quantum protocol based on our original protocol. We calculate the success probability of the proposed protocols, which is also a modification of the success probability of the original protocols.
△ Less
Submitted 23 October, 2021;
originally announced October 2021.
-
Decoherence Effects in a Three-Level System under Gaussian Process
Authors:
Sultan Mahmood Zangi,
Atta ur Rahman,
ZhaoXu Ji,
Hazrat Ai,
HuanGuo Zhang
Abstract:
When subjected to a classical fluctuating field characterized by a Gaussian process, we examine the {purity} and coherence protection in a three-level quantum system. This symmetry of the three-level system is examined when the local random field is investigated further in the noiseless and noisy regimes. In~particular, we consider fractional Gaussian, Gaussian, Ornstein--Uhlenbeck, and~power law…
▽ More
When subjected to a classical fluctuating field characterized by a Gaussian process, we examine the {purity} and coherence protection in a three-level quantum system. This symmetry of the three-level system is examined when the local random field is investigated further in the noiseless and noisy regimes. In~particular, we consider fractional Gaussian, Gaussian, Ornstein--Uhlenbeck, and~power law noisy regimes. We show that the destructive nature of the Ornstein--Uhlenbeck noise toward the symmetry of the qutrit to preserve encoded {purity and coherence} remains large. Our findings suggest that properly adjusting the noisy parameters to specifically provided values can facilitate optimal extended {purity and coherence} survival. Non-vanishing terms appear in the final density matrix of the single qutrit system, indicating that it is in a strong coherence regime. Because~of all of the Gaussian noises, monotonic decay with no revivals has been observed in the single qutrit system. In~terms of coherence and information preservation, we find that the current qutrit system outperforms systems with multiple qubits or qutrits using purity and von Neumann entropy. A~comparison of noisy and noiseless situations shows that the fluctuating nature of the local random fields is ultimately lost when influenced using the classical Gaussian noises
△ Less
Submitted 29 November, 2022; v1 submitted 29 July, 2021;
originally announced July 2021.
-
Two-party quantum private comparison based on eight-qubit entangled state
Authors:
Peiru Fan,
Atta Ur Rahman,
Zhaoxu Ji,
Xiangmin Ji,
Zhiqiang Hao,
Huanguo Zhang
Abstract:
The purpose of quantum private comparison (QPC) is to solve "Tierce problem" using quantum mechanics laws, where the "Tierce problem" is to judge whether the secret data of two participants are equal under the condition of protecting data privacy. Here we consider for the first time the usefulness of eight-qubit entangled states for QPC by proposing a new protocol. The proposed protocol only adopt…
▽ More
The purpose of quantum private comparison (QPC) is to solve "Tierce problem" using quantum mechanics laws, where the "Tierce problem" is to judge whether the secret data of two participants are equal under the condition of protecting data privacy. Here we consider for the first time the usefulness of eight-qubit entangled states for QPC by proposing a new protocol. The proposed protocol only adopts necessary quantum technologies such as preparing quantum states and quantum measurements without using any other quantum technologies (e.g. unitary operations and entanglement swap**), thus the protocol has advantages in quantum device consumption. The measurements adopted only include single-particle measurements, which is easier to implement than entangled-state measurements under the existing technical conditions. The proposed protocol takes advantage of the entanglement characteristics of the eight-qubit entangled state, and uses joint computation, decoy photon technology, the keys generated by a quantum key distribution protocol to ensure data privacy. We show that when all singleparticle measurements in the proposed protocol are replaced by Bell measurements, the purpose of the protocol can also be achieved. We also show that the proposed protocol can be changed into a semi-quantum protocol with a few small changes.
△ Less
Submitted 13 May, 2022; v1 submitted 5 January, 2021;
originally announced January 2021.
-
Security proof for qudit-system-based quantum cryptography against entanglement-measurement attack
Authors:
Zhaoxu Ji,
Peiru Fan,
Huanguo Zhang
Abstract:
Entanglement-measurement attack is a well-known attack in quantum cryptography. In quantum cryptography protocols, eavesdrop** checking can resist this attack. There are two known eavesdrop** checking methods. One is to use decoy photon technology for eavesdrop** checking. The other is to use the entanglement correlation of two groups of non-orthogonal entangled states for eavesdrop** chec…
▽ More
Entanglement-measurement attack is a well-known attack in quantum cryptography. In quantum cryptography protocols, eavesdrop** checking can resist this attack. There are two known eavesdrop** checking methods. One is to use decoy photon technology for eavesdrop** checking. The other is to use the entanglement correlation of two groups of non-orthogonal entangled states for eavesdrop** checking. In this paper, we prove the security against entanglement-measurement attack for the qudit-system-based quantum cryptography protocols which use the two methods for eavesdrop** checking. Our security proof is useful to improve the eavesdrop** checking method used in quantum cryptography protocols.
△ Less
Submitted 9 March, 2021; v1 submitted 24 December, 2020;
originally announced December 2020.
-
Symbolic Verification of Quantum Circuits
Authors:
Mingsheng Ying,
Zhengfeng Ji
Abstract:
This short note proposes a symbolic approach for representing and reasoning about quantum circuits using complex, vector or matrix-valued Boolean expressions. A major benefit of this approach is that it allows us to directly borrow the existing techniques and tools for verification of classical logic circuits in reasoning about quantum circuits.
This short note proposes a symbolic approach for representing and reasoning about quantum circuits using complex, vector or matrix-valued Boolean expressions. A major benefit of this approach is that it allows us to directly borrow the existing techniques and tools for verification of classical logic circuits in reasoning about quantum circuits.
△ Less
Submitted 4 October, 2020;
originally announced October 2020.
-
Quantum soundness of the classical low individual degree test
Authors:
Zhengfeng Ji,
Anand Natarajan,
Thomas Vidick,
John Wright,
Henry Yuen
Abstract:
Low degree tests play an important role in classical complexity theory, serving as basic ingredients in foundational results such as $\mathsf{MIP} = \mathsf{NEXP}$ [BFL91] and the PCP theorem [AS98,ALM+98]. Over the last ten years, versions of these tests which are sound against quantum provers have found increasing applications to the study of nonlocal games and the complexity class~…
▽ More
Low degree tests play an important role in classical complexity theory, serving as basic ingredients in foundational results such as $\mathsf{MIP} = \mathsf{NEXP}$ [BFL91] and the PCP theorem [AS98,ALM+98]. Over the last ten years, versions of these tests which are sound against quantum provers have found increasing applications to the study of nonlocal games and the complexity class~$\mathsf{MIP}^*$. The culmination of this line of work is the result $\mathsf{MIP}^* = \mathsf{RE}$ [arXiv:2001.04383]. One of the key ingredients in the first reported proof of $\mathsf{MIP}^* = \mathsf{RE}$ is a two-prover variant of the low degree test, initially shown to be sound against multiple quantum provers in [arXiv:1302.1242]. Unfortunately a mistake was recently discovered in the latter result, invalidating the main result of [arXiv:1302.1242] as well as its use in subsequent works, including [arXiv:2001.04383]. We analyze a variant of the low degree test called the low individual degree test. Our main result is that the two-player version of this test is sound against quantum provers. This soundness result is sufficient to re-derive several bounds on~$\mathsf{MIP}^*$ that relied on [arXiv:1302.1242], including $\mathsf{MIP}^* = \mathsf{RE}$.
△ Less
Submitted 27 September, 2020;
originally announced September 2020.
-
Entanglement swap** theory and beyond
Authors:
Zhaoxu Ji,
Peiru Fan,
Huanguo Zhang
Abstract:
We focus on the general theory of entanglement swap** in this paper, through which one can get final states that the original entangled states collapse onto after entanglement swap**. We consider the entanglement swap** between 2-level maximally entangled states without limiting each subsystem to be in the same basis. For the entanglement swap** between any number of d-level maximally enta…
▽ More
We focus on the general theory of entanglement swap** in this paper, through which one can get final states that the original entangled states collapse onto after entanglement swap**. We consider the entanglement swap** between 2-level maximally entangled states without limiting each subsystem to be in the same basis. For the entanglement swap** between any number of d-level maximally entangled states, we consider the case realized by performing a joint measurement on the particles that contain the first particle of the selected entangled states and the ones without involving the first particle in other entangled states. We generalize the entanglement swap** between two bipartite general pure states to multi-state cases. We propose the entanglement swap** chains for maximally entangled states, which is realized by performing measurements on multiple particles. We use mathematical induction to prove the results of entanglement swap** chains of general pure states and maximally entangled states. We propose the entanglement swap** between bipartite general pure states and maximally entangled states. In addition to pure states entanglement swap**, we also study the entanglement swap** and chains of mixed states, including X states and mixed maximally entangled states. We propose an entanglement model and give a graphical description of entanglement and entanglement swap**. Finally, we provide a new proof for our previous work [2022, Physica A, 585, 126400], which is more concise than the original one.
△ Less
Submitted 19 November, 2022; v1 submitted 5 September, 2020;
originally announced September 2020.
-
MIP*=RE
Authors:
Zhengfeng Ji,
Anand Natarajan,
Thomas Vidick,
John Wright,
Henry Yuen
Abstract:
We show that the class MIP* of languages that can be decided by a classical verifier interacting with multiple all-powerful quantum provers sharing entanglement is equal to the class RE of recursively enumerable languages. Our proof builds upon the quantum low-degree test of (Natarajan and Vidick, FOCS 2018) and the classical low-individual degree test of (Ji, et al., 2020) by integrating recent d…
▽ More
We show that the class MIP* of languages that can be decided by a classical verifier interacting with multiple all-powerful quantum provers sharing entanglement is equal to the class RE of recursively enumerable languages. Our proof builds upon the quantum low-degree test of (Natarajan and Vidick, FOCS 2018) and the classical low-individual degree test of (Ji, et al., 2020) by integrating recent developments from (Natarajan and Wright, FOCS 2019) and combining them with the recursive compression framework of (Fitzsimons et al., STOC 2019).
An immediate byproduct of our result is that there is an efficient reduction from the Halting Problem to the problem of deciding whether a two-player nonlocal game has entangled value $1$ or at most $1/2$. Using a known connection, undecidability of the entangled value implies a negative answer to Tsirelson's problem: we show, by providing an explicit example, that the closure $C_{qa}$ of the set of quantum tensor product correlations is strictly included in the set $C_{qc}$ of quantum commuting correlations. Following work of (Fritz, Rev. Math. Phys. 2012) and (Junge et al., J. Math. Phys. 2011) our results provide a refutation of Connes' embedding conjecture from the theory of von Neumann algebras.
△ Less
Submitted 4 November, 2022; v1 submitted 13 January, 2020;
originally announced January 2020.
-
Cryptanalysis and improvement of several quantum private comparison protocols
Authors:
Zhao-Xu Ji,
Pei-Ru Fan,
Huan-Guo Zhang,
Hou-Zhen Wang
Abstract:
Recently, Wu et al. [Int. J. Theor. Phys. 58, 1854, (2019)] found a serious information leakage problem in Ye and Ji's quantum private comparison protocol [Int. J. Theor. Phys. 56, 1517, (2017)], that is, a malicious participant can steal another's secret data without being detected through an active attack means. In this paper, we show that Wu et al.'s attack means is also effective for several o…
▽ More
Recently, Wu et al. [Int. J. Theor. Phys. 58, 1854, (2019)] found a serious information leakage problem in Ye and Ji's quantum private comparison protocol [Int. J. Theor. Phys. 56, 1517, (2017)], that is, a malicious participant can steal another's secret data without being detected through an active attack means. In this paper, we show that Wu et al.'s attack means is also effective for several other existing protocols, including the ones proposed by Ji et al. and Zha et al. [Commun. Theor. Phys. 65, 711, (2016) and Int. J. Theor. Phys. 57, 3874, (2018)]. In addition, we propose a passive attack means, which is different from Wu et al.'s active attack in that the malicious participant can easily steal another's secret data only by using his own secret data after finishing the protocol. Furthermore, we find that several other existing quantum private comparison protocols also have such an information leakage problem. In response to the problem, we propose a simple solution, which is more efficient than the ones proposed by Wu et al., because it does not consume additional classical and quantum resources. We also make some comments on this problem.
△ Less
Submitted 30 December, 2019; v1 submitted 28 November, 2019;
originally announced November 2019.
-
Approximating Permanent of Random Matrices with Vanishing Mean: Made Better and Simpler
Authors:
Zhengfeng Ji,
Zhihan **,
Pinyan Lu
Abstract:
The algorithm and complexity of approximating the permanent of a matrix is an extensively studied topic. Recently, its connection with quantum supremacy and more specifically BosonSampling draws special attention to the average-case approximation problem of the permanent of random matrices with zero or small mean value for each entry. Eldar and Mehraban (FOCS 2018) gave a quasi-polynomial time alg…
▽ More
The algorithm and complexity of approximating the permanent of a matrix is an extensively studied topic. Recently, its connection with quantum supremacy and more specifically BosonSampling draws special attention to the average-case approximation problem of the permanent of random matrices with zero or small mean value for each entry. Eldar and Mehraban (FOCS 2018) gave a quasi-polynomial time algorithm for random matrices with mean at least $1/\mathbf{\mathrm{polyloglog}} (n)$. In this paper, we improve the result by designing a deterministic quasi-polynomial time algorithm and a PTAS for random matrices with mean at least $1/\mathbf{\mathrm{polylog}}(n)$. We note that if it can be further improved to $1/\mathbf{\mathrm{poly}}(n)$, it will disprove a central conjecture for quantum supremacy.
Our algorithm is also much simpler and has a better and flexible trade-off for running time. The running time can be quasi-polynomial in both $n$ and $1/ε$, or PTAS (polynomial in $n$ but exponential in $1/ε$), where $ε$ is the approximation parameter.
△ Less
Submitted 27 November, 2019;
originally announced November 2019.
-
Entanglement swap** for Bell states and Greenberger-Horne-Zeilinger states in qubit systems
Authors:
Zhaoxu Ji,
Peiru Fan,
Huanguo Zhang
Abstract:
We introduce a class of two-level multi-particle Greenberger-Horne-Zeilinger (GHZ) states, and study entanglement swap** between two systems for Bell states and the class of GHZ states in qubit systems, respectively. We give the formulas for the entanglement swap** of Bell states and GHZ states in any number of qubit systems. We further consider entanglement swap** between any number of Bell…
▽ More
We introduce a class of two-level multi-particle Greenberger-Horne-Zeilinger (GHZ) states, and study entanglement swap** between two systems for Bell states and the class of GHZ states in qubit systems, respectively. We give the formulas for the entanglement swap** of Bell states and GHZ states in any number of qubit systems. We further consider entanglement swap** between any number of Bell states and between any number of the introduced GHZ states, and propose a series of entanglement swap** schemes in a detailed way. We illustrate the applications of such schemes in quantum information processing by proposing quantum protocols for quantum key distribution, quantum secret sharing and quantum private comparison.
△ Less
Submitted 21 September, 2021; v1 submitted 22 November, 2019;
originally announced November 2019.
-
Greenberger-Horne-Zeilinger-based quantum private comparison protocol with bit-flip**
Authors:
Zhaoxu Ji,
Peiru Fan,
Huanguo Zhang,
Houzhen Wang
Abstract:
By introducing a semi-honest third party (TP), we propose in this paper a novel QPC protocol using (n+1)- qubit (n \ge 2) Greenberger-Horne-Zeilinger (GHZ) states as information carriers. The parameter n not only determines the number of qubits contained in a GHZ state, but also determines the probability that TP can successfully steal the participants' data and the qubit efficiency. In the propos…
▽ More
By introducing a semi-honest third party (TP), we propose in this paper a novel QPC protocol using (n+1)- qubit (n \ge 2) Greenberger-Horne-Zeilinger (GHZ) states as information carriers. The parameter n not only determines the number of qubits contained in a GHZ state, but also determines the probability that TP can successfully steal the participants' data and the qubit efficiency. In the proposed protocol, we do not employ any other quantum technologies (e.g., entanglement swap** and unitary operation) except necessary technologies such as preparing quantum states and quantum measurements, which can reduce the need for quantum devices. We use the keys generated by quantum key distribution and bit-flip** for privacy protection, and decoy photons for eavesdrop** checking, making both external and internal attacks invalid. Specifically, for external attacks, we take several well-known attack means (e.g., the intercept-resend attack and the measurement-resend attack) as examples to show that the attackers outside the protocol can not steal the participants' data successfully, in which we provide the security proof of the protocol against the entanglement-measurement attack. For internal attacks, we show that TP cannot steal the participants' data and the participants cannot steal each other's data. We also show that the existing attack means against QPC protocols are invalid for our protocol.
△ Less
Submitted 19 August, 2020; v1 submitted 18 November, 2019;
originally announced November 2019.
-
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography
Authors:
Zhengfeng Ji,
Youming Qiao,
Fang Song,
Aaram Yun
Abstract:
Starting from the one-way group action framework of Brassard and Yung (Crypto '90), we revisit building cryptography based on group actions. Several previous candidates for one-way group actions no longer stand, due to progress both on classical algorithms (e.g., graph isomorphism) and quantum algorithms (e.g., discrete logarithm).
We propose the general linear group action on tensors as a new c…
▽ More
Starting from the one-way group action framework of Brassard and Yung (Crypto '90), we revisit building cryptography based on group actions. Several previous candidates for one-way group actions no longer stand, due to progress both on classical algorithms (e.g., graph isomorphism) and quantum algorithms (e.g., discrete logarithm).
We propose the general linear group action on tensors as a new candidate to build cryptography based on group actions. Recent works (Futorny--Grochow--Sergeichuk, Lin. Alg. Appl., 2019) suggest that the underlying algorithmic problem, the tensor isomorphism problem, is the hardest one among several isomorphism testing problems arising from areas including coding theory, computational group theory, and multivariate cryptography. We present evidence to justify the viability of this proposal from comprehensive study of the state-of-art heuristic algorithms, theoretical algorithms, and hardness results, as well as quantum algorithms.
We then introduce a new notion called pseudorandom group actions to further develop group-action based cryptography. Briefly speaking, given a group $G$ acting on a set $S$, we assume that it is hard to distinguish two distributions of $(s, t)$ either uniformly chosen from $S\times S$, or where $s$ is randomly chosen from $S$ and $t$ is the result of applying a random group action of $g\in G$ on $s$. This subsumes the classical decisional Diffie-Hellman assumption when specialized to a particular group action. We carefully analyze various attack strategies that support the general linear group action on tensors as a candidate for this assumption.
Finally, we establish the quantum security of several cryptographic primitives based on the one-way group action assumption and the pseudorandom group action assumption.
△ Less
Submitted 10 June, 2019;
originally announced June 2019.
-
Quantum proof systems for iterated exponential time, and beyond
Authors:
Joseph Fitzsimons,
Zhengfeng Ji,
Thomas Vidick,
Henry Yuen
Abstract:
We show that any language in nondeterministic time $\exp(\exp(\cdots \exp(n)))$, where the number of iterated exponentials is an arbitrary function $R(n)$, can be decided by a multiprover interactive proof system with a classical polynomial-time verifier and a constant number of quantum entangled provers, with completeness $1$ and soundness $1 - \exp(-C\exp(\cdots\exp(n)))$, where the number of it…
▽ More
We show that any language in nondeterministic time $\exp(\exp(\cdots \exp(n)))$, where the number of iterated exponentials is an arbitrary function $R(n)$, can be decided by a multiprover interactive proof system with a classical polynomial-time verifier and a constant number of quantum entangled provers, with completeness $1$ and soundness $1 - \exp(-C\exp(\cdots\exp(n)))$, where the number of iterated exponentials is $R(n)-1$ and $C>0$ is a universal constant. The result was previously known for $R=1$ and $R=2$; we obtain it for any time-constructible function $R$.
The result is based on a compression technique for interactive proof systems with entangled provers that significantly simplifies and strengthens a protocol compression result of Ji (STOC'17). As a separate consequence of this technique we obtain a different proof of Slofstra's recent result (unpublished) on the uncomputability of the entangled value of multiprover games.
Finally, we show that even minor improvements to our compression result would yield remarkable consequences in computational complexity theory and the foundations of quantum mechanics: first, it would imply that the class MIP* contains all computable languages; second, it would provide a negative resolution to a multipartite version of Tsirelson's problem on the relation between the commuting operator and tensor product models for quantum correlations.
△ Less
Submitted 30 May, 2018;
originally announced May 2018.
-
A three-player coherent state embezzlement game
Authors:
Zhengfeng Ji,
Debbie Leung,
Thomas Vidick
Abstract:
We introduce a three-player nonlocal game, with a finite number of classical questions and answers, such that the optimal success probability of $1$ in the game can only be achieved in the limit of strategies using arbitrarily high-dimensional entangled states. Precisely, there exists a constant $0 <c\leq 1$ such that to succeed with probability $1-\varepsilon$ in the game it is necessary to use a…
▽ More
We introduce a three-player nonlocal game, with a finite number of classical questions and answers, such that the optimal success probability of $1$ in the game can only be achieved in the limit of strategies using arbitrarily high-dimensional entangled states. Precisely, there exists a constant $0 <c\leq 1$ such that to succeed with probability $1-\varepsilon$ in the game it is necessary to use an entangled state of at least $Ω(\varepsilon^{-c})$ qubits, and it is sufficient to use a state of at most $O(\varepsilon^{-1})$ qubits.
The game is based on the coherent state exchange game of Leung et al. (CJTCS 2013). In our game, the task of the quantum verifier is delegated to a third player by a classical referee. Our results complement those of Slofstra (arXiv:1703.08618) and Dykema et al. (arXiv:1709.05032), who obtained two-player games with similar (though quantitatively weaker) properties based on the representation theory of finitely presented groups and $C^*$-algebras respectively.
△ Less
Submitted 22 October, 2020; v1 submitted 13 February, 2018;
originally announced February 2018.
-
Pseudorandom States, Non-Cloning Theorems and Quantum Money
Authors:
Zhengfeng Ji,
Yi-Kai Liu,
Fang Song
Abstract:
We propose the concept of pseudorandom states and study their constructions, properties, and applications. Under the assumption that quantum-secure one-way functions exist, we present concrete and efficient constructions of pseudorandom states. The non-cloning theorem plays a central role in our study---it motivates the proper definition and characterizes one of the important properties of pseudor…
▽ More
We propose the concept of pseudorandom states and study their constructions, properties, and applications. Under the assumption that quantum-secure one-way functions exist, we present concrete and efficient constructions of pseudorandom states. The non-cloning theorem plays a central role in our study---it motivates the proper definition and characterizes one of the important properties of pseudorandom quantum states. Namely, there is no efficient quantum algorithm that can create more copies of the state from a given number of pseudorandom states. As the main application, we prove that any family of pseudorandom states naturally gives rise to a private-key quantum money scheme.
△ Less
Submitted 1 November, 2017;
originally announced November 2017.
-
A Separability-Entanglement Classifier via Machine Learning
Authors:
Sirui Lu,
Shilin Huang,
Keren Li,
Jun Li,
Jianxin Chen,
Dawei Lu,
Zhengfeng Ji,
Yi Shen,
Duanlu Zhou,
Bei Zeng
Abstract:
The problem of determining whether a given quantum state is entangled lies at the heart of quantum information processing, which is known to be an NP-hard problem in general. Despite the proposed many methods such as the positive partial transpose (PPT) criterion and the k-symmetric extendibility criterion to tackle this problem in practice, none of them enables a general, effective solution to th…
▽ More
The problem of determining whether a given quantum state is entangled lies at the heart of quantum information processing, which is known to be an NP-hard problem in general. Despite the proposed many methods such as the positive partial transpose (PPT) criterion and the k-symmetric extendibility criterion to tackle this problem in practice, none of them enables a general, effective solution to the problem even for small dimensions. Explicitly, separable states form a high-dimensional convex set, which exhibits a vastly complicated structure. In this work, we build a new separability-entanglement classifier underpinned by machine learning techniques. Our method outperforms the existing methods in generic cases in terms of both speed and accuracy, opening up the avenues to explore quantum entanglement via the machine learning approach.
△ Less
Submitted 14 June, 2017; v1 submitted 3 May, 2017;
originally announced May 2017.
-
Compression of Quantum Multi-Prover Interactive Proofs
Authors:
Zhengfeng Ji
Abstract:
We present a protocol that transforms any quantum multi-prover interactive proof into a nonlocal game in which questions consist of logarithmic number of bits and answers of constant number of bits. As a corollary, this proves that the promise problem corresponding to the approximation of the nonlocal value to inverse polynomial accuracy is complete for QMIP*, and therefore NEXP-hard. This establi…
▽ More
We present a protocol that transforms any quantum multi-prover interactive proof into a nonlocal game in which questions consist of logarithmic number of bits and answers of constant number of bits. As a corollary, this proves that the promise problem corresponding to the approximation of the nonlocal value to inverse polynomial accuracy is complete for QMIP*, and therefore NEXP-hard. This establishes that nonlocal games are provably harder than classical games without any complexity theory assumptions. Our result also indicates that gap amplification for nonlocal games may be impossible in general and provides a negative evidence for the possibility of the gap amplification approach to the multi-prover variant of the quantum PCP conjecture.
△ Less
Submitted 10 October, 2016;
originally announced October 2016.
-
Joint product numerical range and geometry of reduced density matrices
Authors:
Jianxin Chen,
Cheng Guo,
Zhengfeng Ji,
Yiu-Tung Poon,
Nengkun Yu,
Bei Zeng,
Jie Zhou
Abstract:
The reduced density matrices of a many-body quantum system form a convex set, whose three-dimensional projection $Θ$ is convex in $\mathbb{R}^3$. The boundary $\partialΘ$ of $Θ$ may exhibit nontrivial geometry, in particular ruled surfaces. Two physical mechanisms are known for the origins of ruled surfaces: symmetry breaking and gapless. In this work, we study the emergence of ruled surfaces for…
▽ More
The reduced density matrices of a many-body quantum system form a convex set, whose three-dimensional projection $Θ$ is convex in $\mathbb{R}^3$. The boundary $\partialΘ$ of $Θ$ may exhibit nontrivial geometry, in particular ruled surfaces. Two physical mechanisms are known for the origins of ruled surfaces: symmetry breaking and gapless. In this work, we study the emergence of ruled surfaces for systems with local Hamiltonians in infinite spatial dimension, where the reduced density matrices are known to be separable as a consequence of the quantum de Finetti's theorem. This allows us to identify the reduced density matrix geometry with joint product numerical range $Π$ of the Hamiltonian interaction terms. We focus on the case where the interaction terms have certain structures, such that ruled surface emerge naturally when taking a convex hull of $Π$. We show that, a ruled surface on $\partialΘ$ sitting in $Π$ has a gapless origin, otherwise it has a symmetry breaking origin. As an example, we demonstrate that a famous ruled surface, known as the oloid, is a possible shape of $Θ$, with two boundary pieces of symmetry breaking origin separated by two gapless lines.
△ Less
Submitted 23 June, 2016;
originally announced June 2016.
-
Physical origins of ruled surfaces on the reduced density matrices geometry
Authors:
Ji-Yao Chen,
Zhengfeng Ji,
Zheng-Xin Liu,
Xiaofei Qi,
Nengkun Yu,
Bei Zeng,
Duanlu Zhou
Abstract:
The reduced density matrices (RDMs) of many-body quantum states form a convex set. The boundary of low dimensional projections of this convex set may exhibit nontrivial geometry such as ruled surfaces. In this paper, we study the physical origins of these ruled surfaces for bosonic systems. The emergence of ruled surfaces was recently proposed as signatures of symmetry-breaking phase. We show that…
▽ More
The reduced density matrices (RDMs) of many-body quantum states form a convex set. The boundary of low dimensional projections of this convex set may exhibit nontrivial geometry such as ruled surfaces. In this paper, we study the physical origins of these ruled surfaces for bosonic systems. The emergence of ruled surfaces was recently proposed as signatures of symmetry-breaking phase. We show that, apart from being signatures of symmetry-breaking, ruled surfaces can also be the consequence of gapless quantum systems by demonstrating an explicit example in terms of a two-mode Ising model. Our analysis was largely simplified by the quantum de Finetti's theorem---in the limit of large system size, these RDMs are the convex set of all the symmetric separable states. To distinguish ruled surfaces originated from gapless systems from those caused by symmetry-breaking, we propose to use the finite size scaling method for the corresponding geometry. This method is then applied to the two-mode XY model, successfully identifying a ruled surface as the consequence of gapless systems.
△ Less
Submitted 20 May, 2016;
originally announced May 2016.
-
Quantum State and Process Tomography via Adaptive Measurements
Authors:
Hengyan Wang,
Wenqiang Zheng,
Nengkun Yu,
Keren Li,
Dawei Lu,
Tao Xin,
Carson Li,
Zhengfeng Ji,
David Kribs,
Bei Zeng,
Xinhua Peng,
Jiangfeng Du
Abstract:
We investigate quantum state tomography (QST) for pure states and quantum process tomography (QPT) for unitary channels via $adaptive$ measurements. For a quantum system with a $d$-dimensional Hilbert space, we first propose an adaptive protocol where only $2d-1$ measurement outcomes are used to accomplish the QST for $all$ pure states. This idea is then extended to study QPT for unitary channels,…
▽ More
We investigate quantum state tomography (QST) for pure states and quantum process tomography (QPT) for unitary channels via $adaptive$ measurements. For a quantum system with a $d$-dimensional Hilbert space, we first propose an adaptive protocol where only $2d-1$ measurement outcomes are used to accomplish the QST for $all$ pure states. This idea is then extended to study QPT for unitary channels, where an adaptive unitary process tomography (AUPT) protocol of $d^2+d-1$ measurement outcomes is constructed for any unitary channel. We experimentally implement the AUPT protocol in a 2-qubit nuclear magnetic resonance system. We examine the performance of the AUPT protocol when applied to Hadamard gate, $T$ gate ($π/8$ phase gate), and controlled-NOT gate, respectively, as these gates form the universal gate set for quantum information processing purpose. As a comparison, standard QPT is also implemented for each gate. Our experimental results show that the AUPT protocol that reconstructing unitary channels via adaptive measurements significantly reduce the number of experiments required by standard QPT without considerable loss of fidelity.
△ Less
Submitted 21 April, 2016;
originally announced April 2016.
-
Zero-knowledge proof systems for QMA
Authors:
Anne Broadbent,
Zhengfeng Ji,
Fang Song,
John Watrous
Abstract:
Prior work has established that all problems in NP admit classical zero-knowledge proof systems, and under reasonable hardness assumptions for quantum computations, these proof systems can be made secure against quantum attacks. We prove a result representing a further quantum generalization of this fact, which is that every problem in the complexity class QMA has a quantum zero-knowledge proof sy…
▽ More
Prior work has established that all problems in NP admit classical zero-knowledge proof systems, and under reasonable hardness assumptions for quantum computations, these proof systems can be made secure against quantum attacks. We prove a result representing a further quantum generalization of this fact, which is that every problem in the complexity class QMA has a quantum zero-knowledge proof system. More specifically, assuming the existence of an unconditionally binding and quantum computationally concealing commitment scheme, we prove that every problem in the complexity class QMA has a quantum interactive proof system that is zero-knowledge with respect to efficient quantum computations.
Our QMA proof system is sound against arbitrary quantum provers, but only requires an honest prover to perform polynomial-time quantum computations, provided that it holds a quantum witness for a given instance of the QMA problem under consideration. The proof system relies on a new variant of the QMA-complete local Hamiltonian problem in which the local terms are described by Clifford operations and standard basis measurements. We believe that the QMA-completeness of this problem may have other uses in quantum complexity.
△ Less
Submitted 11 April, 2016;
originally announced April 2016.
-
Quantum state tomography via reduced density matrices
Authors:
Tao Xin,
Dawei Lu,
Joel Klassen,
Nengkun Yu,
Zhengfeng Ji,
Jianxin Chen,
Xian Ma,
Guilu Long,
Bei Zeng,
Raymond Laflamme
Abstract:
Quantum state tomography via local measurements is an efficient tool for characterizing quantum states. However it requires that the original global state be uniquely determined (UD) by its local reduced density matrices (RDMs). In this work we demonstrate for the first time a class of states that are UD by their RDMs under the assumption that the global state is pure, but fail to be UD in the abs…
▽ More
Quantum state tomography via local measurements is an efficient tool for characterizing quantum states. However it requires that the original global state be uniquely determined (UD) by its local reduced density matrices (RDMs). In this work we demonstrate for the first time a class of states that are UD by their RDMs under the assumption that the global state is pure, but fail to be UD in the absence of that assumption. This discovery allows us to classify quantum states according to their UD properties, with the requirement that each class be treated distinctly in the practice of simplifying quantum state tomography. Additionally we experimentally test the feasibility and stability of performing quantum state tomography via the measurement of local RDMs for each class. These theoretical and experimental results advance the project of performing efficient and accurate quantum state tomography in practice.
△ Less
Submitted 7 April, 2016;
originally announced April 2016.
-
Dichotomy of entanglement depth for symmetric states
Authors:
Ji-Yao Chen,
Zhengfeng Ji,
Nengkun Yu,
Bei Zeng
Abstract:
Entanglement depth characterizes the minimal number of particles in a system that are mutually entangled. For symmetric states, we show that there is a dichotomy for entanglement depth: an $N$-particle symmetric state is either fully separable, or fully entangled---the entanglement depth is either $1$ or $N$. This property is even stable under non-symmetric noise. We propose an experimentally acce…
▽ More
Entanglement depth characterizes the minimal number of particles in a system that are mutually entangled. For symmetric states, we show that there is a dichotomy for entanglement depth: an $N$-particle symmetric state is either fully separable, or fully entangled---the entanglement depth is either $1$ or $N$. This property is even stable under non-symmetric noise. We propose an experimentally accessible method to detect entanglement depth in atomic ensembles based on a bound on the particle number population of Dicke states, and demonstrate that the entanglement depth of some Dicke states, for example the twin Fock state, is very stable even under a large arbitrary noise. Our observation can be applied to atomic Bose-Einstein condensates to infer that these systems can be highly entangled with the entanglement depth that is of the order of the system size (i.e. several thousands of atoms).
△ Less
Submitted 15 April, 2016; v1 submitted 10 March, 2016;
originally announced March 2016.
-
Quantum Capacities for Entanglement Networks
Authors:
Shawn X Cui,
Zhengfeng Ji,
Nengkun Yu,
Bei Zeng
Abstract:
We discuss quantum capacities for two types of entanglement networks: $\mathcal{Q}$ for the quantum repeater network with free classical communication, and $\mathcal{R}$ for the tensor network as the rank of the linear operation represented by the tensor network. We find that $\mathcal{Q}$ always equals $\mathcal{R}$ in the regularized case for the samenetwork graph. However, the relationships bet…
▽ More
We discuss quantum capacities for two types of entanglement networks: $\mathcal{Q}$ for the quantum repeater network with free classical communication, and $\mathcal{R}$ for the tensor network as the rank of the linear operation represented by the tensor network. We find that $\mathcal{Q}$ always equals $\mathcal{R}$ in the regularized case for the samenetwork graph. However, the relationships between the corresponding one-shot capacities $\mathcal{Q}_1$ and $\mathcal{R}_1$ are more complicated, and the min-cut upper bound is in general not achievable. We show that the tensor network can be viewed as a stochastic protocol with the quantum repeater network, such that $\mathcal{R}_1$ is a natural upper bound of $\mathcal{Q}_1$. We analyze the possible gap between $\mathcal{R}_1$ and $\mathcal{Q}_1$ for certain networks, and compare them with the one-shot classical capacity of the corresponding classical network.
△ Less
Submitted 1 February, 2016;
originally announced February 2016.
-
Pure State Tomography with Pauli Measurements
Authors:
Xian Ma,
Tyler Jackson,
Hui Zhou,
Jianxin Chen,
Dawei Lu,
Michael D. Mazurek,
Kent A. G. Fisher,
Xinhua Peng,
David Kribs,
Kevin J. Resch,
Zhengfeng Ji,
Bei Zeng,
Raymond Laflamme
Abstract:
We examine the problem of finding the minimum number of Pauli measurements needed to uniquely determine an arbitrary $n$-qubit pure state among all quantum states. We show that only $11$ Pauli measurements are needed to determine an arbitrary two-qubit pure state compared to the full quantum state tomography with $16$ measurements, and only $31$ Pauli measurements are needed to determine an arbitr…
▽ More
We examine the problem of finding the minimum number of Pauli measurements needed to uniquely determine an arbitrary $n$-qubit pure state among all quantum states. We show that only $11$ Pauli measurements are needed to determine an arbitrary two-qubit pure state compared to the full quantum state tomography with $16$ measurements, and only $31$ Pauli measurements are needed to determine an arbitrary three-qubit pure state compared to the full quantum state tomography with $64$ measurements. We demonstrate that our protocol is robust under depolarizing error with simulated random pure states. We experimentally test the protocol on two- and three-qubit systems with nuclear magnetic resonance techniques. We show that the pure state tomography protocol saves us a number of measurements without considerable loss of fidelity. We compare our protocol with same-size sets of randomly selected Pauli operators and find that our selected set of Pauli measurements significantly outperforms those random sampling sets. As a direct application, our scheme can also be used to reduce the number of settings needed for pure-state tomography in quantum optical systems.
△ Less
Submitted 20 January, 2016;
originally announced January 2016.
-
Tomography is necessary for universal entanglement detection with single-copy observables
Authors:
Dawei Lu,
Tao Xin,
Nengkun Yu,
Zhengfeng Ji,
Jianxin Chen,
Guilu Long,
Jonathan Baugh,
Xinhua Peng,
Bei Zeng,
Raymond Laflamme
Abstract:
Entanglement, one of the central mysteries of quantum mechanics, plays an essential role in numerous applications of quantum information theory. A natural question of both theoretical and experimental importance is whether universal entanglement detection is possible without full state tomography. In this work, we prove a no-go theorem that rules out this possibility for any non-adaptive schemes t…
▽ More
Entanglement, one of the central mysteries of quantum mechanics, plays an essential role in numerous applications of quantum information theory. A natural question of both theoretical and experimental importance is whether universal entanglement detection is possible without full state tomography. In this work, we prove a no-go theorem that rules out this possibility for any non-adaptive schemes that employ single-copy measurements only. We also examine in detail a previously implemented experiment, which claimed to detect entanglement of two-qubit states via adaptive single-copy measurements without full state tomography. By performing the experiment and analyzing the data, we demonstrate that the information gathered is indeed sufficient to reconstruct the state. These results reveal a fundamental limit for single-copy measurements in entanglement detection, and provides a general framework to study the detection of other interesting properties of quantum states, such as the positivity of partial transpose and the $k$-symmetric extendibility.
△ Less
Submitted 2 November, 2015;
originally announced November 2015.
-
Detecting Consistency of Overlap** Quantum Marginals by Separability
Authors:
Jianxin Chen,
Zhengfeng Ji,
Nengkun Yu,
Bei Zeng
Abstract:
The quantum marginal problem asks whether a set of given density matrices are consistent, i.e., whether they can be the reduced density matrices of a global quantum state. Not many non-trivial analytic necessary (or sufficient) conditions are known for the problem in general. We propose a method to detect consistency of overlap** quantum marginals by considering the separability of some derived…
▽ More
The quantum marginal problem asks whether a set of given density matrices are consistent, i.e., whether they can be the reduced density matrices of a global quantum state. Not many non-trivial analytic necessary (or sufficient) conditions are known for the problem in general. We propose a method to detect consistency of overlap** quantum marginals by considering the separability of some derived states. Our method works well for the $k$-symmetric extension problem in general, and for the general overlap** marginal problems in some cases. Our work is, in some sense, the converse to the well-known $k$-symmetric extension criterion for separability.
△ Less
Submitted 23 September, 2015; v1 submitted 22 September, 2015;
originally announced September 2015.
-
Geometry of reduced density matrices for symmetry-protected topological phases
Authors:
Ji-Yao Chen,
Zhengfeng Ji,
Zheng-Xin Liu,
Yi Shen,
Bei Zeng
Abstract:
In this paper, we study the geometry of reduced density matrices for states with symmetry-protected topological (SPT) order. We observe ruled surface structures on the boundary of the convex set of low dimension projections of the reduced density matrices. In order to signal the SPT order using ruled surfaces, it is important that we add a symmetry-breaking term to the boundary of the system---no…
▽ More
In this paper, we study the geometry of reduced density matrices for states with symmetry-protected topological (SPT) order. We observe ruled surface structures on the boundary of the convex set of low dimension projections of the reduced density matrices. In order to signal the SPT order using ruled surfaces, it is important that we add a symmetry-breaking term to the boundary of the system---no ruled surface emerges in systems without boundary or when we add a symmetry-breaking term representing a thermodynamic quantity. Although the ruled surfaces only appear in the thermodynamic limit where the ground-state degeneracy is exact, we analyze the precision of our numerical algorithm and show that a finite system calculation suffices to reveal the ruled surface structures.
△ Less
Submitted 9 January, 2016; v1 submitted 16 August, 2015;
originally announced August 2015.
-
Sample-optimal tomography of quantum states
Authors:
Jeongwan Haah,
Aram W. Harrow,
Zhengfeng Ji,
Xiaodi Wu,
Nengkun Yu
Abstract:
It is a fundamental problem to decide how many copies of an unknown mixed quantum state are necessary and sufficient to determine the state. Previously, it was known only that estimating states to error $ε$ in trace distance required $O(dr^2/ε^2)$ copies for a $d$-dimensional density matrix of rank $r$. Here, we give a theoretical measurement scheme (POVM) that requires $O (dr/ δ) \ln (d/δ) $ copi…
▽ More
It is a fundamental problem to decide how many copies of an unknown mixed quantum state are necessary and sufficient to determine the state. Previously, it was known only that estimating states to error $ε$ in trace distance required $O(dr^2/ε^2)$ copies for a $d$-dimensional density matrix of rank $r$. Here, we give a theoretical measurement scheme (POVM) that requires $O (dr/ δ) \ln (d/δ) $ copies of $ρ$ to error $δ$ in infidelity, and a matching lower bound up to logarithmic factors. This implies $O( (dr / ε^2) \ln (d/ε) )$ copies suffice to achieve error $ε$ in trace distance. We also prove that for independent (product) measurements, $Ω(dr^2/δ^2) / \ln(1/δ)$ copies are necessary in order to achieve error $δ$ in infidelity. For fixed $d$, our measurement can be implemented on a quantum computer in time polynomial in $n$.
△ Less
Submitted 24 January, 2017; v1 submitted 7 August, 2015;
originally announced August 2015.
-
Classical Verification of Quantum Proofs
Authors:
Zhengfeng Ji
Abstract:
We present a classical interactive protocol that verifies the validity of a quantum witness state for the local Hamiltonian problem. It follows from this protocol that approximating the non-local value of a multi-player one-round game to inverse polynomial precision is QMA-hard. Our work makes an interesting connection between the theory of QMA-completeness and Hamiltonian complexity on one hand a…
▽ More
We present a classical interactive protocol that verifies the validity of a quantum witness state for the local Hamiltonian problem. It follows from this protocol that approximating the non-local value of a multi-player one-round game to inverse polynomial precision is QMA-hard. Our work makes an interesting connection between the theory of QMA-completeness and Hamiltonian complexity on one hand and the study of non-local games and Bell inequalities on the other.
△ Less
Submitted 27 May, 2015;
originally announced May 2015.
-
Discontinuity of Maximum Entropy Inference and Quantum Phase Transitions
Authors:
Jianxin Chen,
Zhengfeng Ji,
Chi-Kwong Li,
Yiu-Tung Poon,
Yi Shen,
Nengkun Yu,
Bei Zeng,
Duanlu Zhou
Abstract:
In this paper, we discuss the connection between two genuinely quantum phenomena --- the discontinuity of quantum maximum entropy inference and quantum phase transitions at zero temperature. It is shown that the discontinuity of the maximum entropy inference of local observable measurements signals the non-local type of transitions, where local density matrices of the ground state change smoothly…
▽ More
In this paper, we discuss the connection between two genuinely quantum phenomena --- the discontinuity of quantum maximum entropy inference and quantum phase transitions at zero temperature. It is shown that the discontinuity of the maximum entropy inference of local observable measurements signals the non-local type of transitions, where local density matrices of the ground state change smoothly at the transition point. We then propose to use the quantum conditional mutual information of the ground state as an indicator to detect the discontinuity and the non-local type of quantum phase transitions in the thermodynamic limit.
△ Less
Submitted 14 April, 2015; v1 submitted 19 June, 2014;
originally announced June 2014.
-
Binary Constraint System Games and Locally Commutative Reductions
Authors:
Zhengfeng Ji
Abstract:
A binary constraint system game is a two-player one-round non-local game defined by a system of Boolean constraints. The game has a perfect quantum strategy if and only if the constraint system has a quantum satisfying assignment [R. Cleve and R. Mittal, arXiv:1209.2729]. We show that several concepts including the quantum chromatic number and the Kochen-Specker sets that arose from different cont…
▽ More
A binary constraint system game is a two-player one-round non-local game defined by a system of Boolean constraints. The game has a perfect quantum strategy if and only if the constraint system has a quantum satisfying assignment [R. Cleve and R. Mittal, arXiv:1209.2729]. We show that several concepts including the quantum chromatic number and the Kochen-Specker sets that arose from different contexts fit naturally in the binary constraint system framework. The structure and complexity of the quantum satisfiability problems for these constraint systems are investigated. Combined with a new construct called the commutativity gadget for each problem, several classic NP-hardness reductions are lifted to their corresponding quantum versions. We also provide a simple parity constraint game that requires $Ω(\sqrt{n})$ EPR pairs in perfect strategies where $n$ is the number of variables in the constraint system.
△ Less
Submitted 4 November, 2013; v1 submitted 14 October, 2013;
originally announced October 2013.
-
Symmetric Extension of Two-Qubit States
Authors:
Jianxin Chen,
Zhengfeng Ji,
David Kribs,
Norbert Lütkenhaus,
Bei Zeng
Abstract:
Quantum key distribution uses public discussion protocols to establish shared secret keys. In the exploration of ultimate limits to such protocols, the property of symmetric extendibility of underlying bipartite states $ρ_{AB}$ plays an important role. A bipartite state $ρ_{AB}$ is symmetric extendible if there exits a tripartite state $ρ_{ABB'}$, such that the $AB$ marginal state is identical to…
▽ More
Quantum key distribution uses public discussion protocols to establish shared secret keys. In the exploration of ultimate limits to such protocols, the property of symmetric extendibility of underlying bipartite states $ρ_{AB}$ plays an important role. A bipartite state $ρ_{AB}$ is symmetric extendible if there exits a tripartite state $ρ_{ABB'}$, such that the $AB$ marginal state is identical to the $AB'$ marginal state, i.e. $ρ_{AB'}=ρ_{AB}$. For a symmetric extendible state $ρ_{AB}$, the first task of the public discussion protocol is to break this symmetric extendibility. Therefore to characterize all bi-partite quantum states that possess symmetric extensions is of vital importance. We prove a simple analytical formula that a two-qubit state $ρ_{AB}$ admits a symmetric extension if and only if $\tr(ρ_B^2)\geq \tr(ρ_{AB}^2)-4\sqrt{\det{ρ_{AB}}}$. Given the intimate relationship between the symmetric extension problem and the quantum marginal problem, our result also provides the first analytical necessary and sufficient condition for the quantum marginal problem with overlap** marginals.
△ Less
Submitted 3 January, 2014; v1 submitted 13 October, 2013;
originally announced October 2013.
-
Symmetries of Codeword Stabilized Quantum Codes
Authors:
Salman Beigi,
Jianxin Chen,
Markus Grassl,
Zhengfeng Ji,
Qiang Wang,
Bei Zeng
Abstract:
Symmetry is at the heart of coding theory. Codes with symmetry, especially cyclic codes, play an essential role in both theory and practical applications of classical error-correcting codes. Here we examine symmetry properties for codeword stabilized (CWS) quantum codes, which is the most general framework for constructing quantum error-correcting codes known to date. A CWS code Q can be represent…
▽ More
Symmetry is at the heart of coding theory. Codes with symmetry, especially cyclic codes, play an essential role in both theory and practical applications of classical error-correcting codes. Here we examine symmetry properties for codeword stabilized (CWS) quantum codes, which is the most general framework for constructing quantum error-correcting codes known to date. A CWS code Q can be represented by a self-dual additive code S and a classical code C, i.,e., Q=(S,C), however this representation is in general not unique. We show that for any CWS code Q with certain permutation symmetry, one can always find a self-dual additive code S with the same permutation symmetry as Q such that Q=(S,C). As many good CWS codes have been found by starting from a chosen S, this ensures that when trying to find CWS codes with certain permutation symmetry, the choice of S with the same symmetry will suffice. A key step for this result is a new canonical representation for CWS codes, which is given in terms of a unique decomposition as union stabilizer codes. For CWS codes, so far mainly the standard form (G,C) has been considered, where G is a graph state. We analyze the symmetry of the corresponding graph of G, which in general cannot possess the same permutation symmetry as Q. We show that it is indeed the case for the toric code on a square lattice with translational symmetry, even if its encoding graph can be chosen to be translational invariant.
△ Less
Submitted 8 April, 2013; v1 submitted 27 March, 2013;
originally announced March 2013.
-
Uniqueness of Quantum States Compatible with Given Measurement Results
Authors:
Jianxin Chen,
Hillary Dawkins,
Zhengfeng Ji,
Nathaniel Johnston,
David Kribs,
Frederic Shultz,
Bei Zeng
Abstract:
We discuss the uniqueness of quantum states compatible with given results for measuring a set of observables. For a given pure state, we consider two different types of uniqueness: (1) no other pure state is compatible with the same measurement results and (2) no other state, pure or mixed, is compatible with the same measurement results. For case (1), it is known that for a d-dimensional Hilbert…
▽ More
We discuss the uniqueness of quantum states compatible with given results for measuring a set of observables. For a given pure state, we consider two different types of uniqueness: (1) no other pure state is compatible with the same measurement results and (2) no other state, pure or mixed, is compatible with the same measurement results. For case (1), it is known that for a d-dimensional Hilbert space, there exists a set of 4d-5 observables that uniquely determines any pure state. We show that for case (2), 5d-7 observables suffice to uniquely determine any pure state. Thus there is a gap between the results for (1) and (2), and we give some examples to illustrate this. The case of observables corresponding to reduced density matrices (RDMs) of a multipartite system is also discussed, where we improve known bounds on local dimensions for case (2) in which almost all pure states are uniquely determined by their RDMs. We further discuss circumstances where (1) can imply (2). We use convexity of the numerical range of operators to show that when only two observables are measured, (1) always implies (2). More generally, if there is a compact group of symmetries of the state space which has the span of the observables measured as the set of fixed points, then (1) implies (2). We analyze the possible dimensions for the span of such observables. Our results extend naturally to the case of low rank quantum states.
△ Less
Submitted 2 April, 2013; v1 submitted 14 December, 2012;
originally announced December 2012.
-
Minimum Entangling Power is Close to Its Maximum
Authors:
Jianxin Chen,
Zhengfeng Ji,
David W Kribs,
Bei Zeng,
Fang Zhang
Abstract:
Given a quantum gate $U$ acting on a bipartite quantum system, its maximum (average, minimum) entangling power is the maximum (average, minimum) entanglement generation with respect to certain entanglement measure when the inputs are restricted to be product states. In this paper, we mainly focus on the 'weakest' one, i.e., the minimum entangling power, among all these entangling powers. We show t…
▽ More
Given a quantum gate $U$ acting on a bipartite quantum system, its maximum (average, minimum) entangling power is the maximum (average, minimum) entanglement generation with respect to certain entanglement measure when the inputs are restricted to be product states. In this paper, we mainly focus on the 'weakest' one, i.e., the minimum entangling power, among all these entangling powers. We show that, by choosing von Neumann entropy of reduced density operator or Schmidt rank as entanglement measure, even the 'weakest' entangling power is generically very close to its maximal possible entanglement generation. In other words, maximum, average and minimum entangling powers are generically close. We then study minimum entangling power with respect to other Lipschitiz-continuous entanglement measures and generalize our results to multipartite quantum systems.
As a straightforward application, a random quantum gate will almost surely be an intrinsically fault-tolerant entangling device that will always transform every low-entangled state to near-maximally entangled state.
△ Less
Submitted 10 December, 2018; v1 submitted 4 October, 2012;
originally announced October 2012.