-
Graph-Theoretic Framework for Self-Testing in Bell Scenarios
Authors:
Kishor Bharti,
Maharshi Ray,
Zhen-Peng Xu,
Masahito Hayashi,
Leong-Chuan Kwek,
Adán Cabello
Abstract:
Quantum self-testing is the task of certifying quantum states and measurements using the output statistics solely, with minimal assumptions about the underlying quantum system. It is based on the observation that some extremal points in the set of quantum correlations can only be achieved, up to isometries, with specific states and measurements. Here, we present a new approach for quantum self-tes…
▽ More
Quantum self-testing is the task of certifying quantum states and measurements using the output statistics solely, with minimal assumptions about the underlying quantum system. It is based on the observation that some extremal points in the set of quantum correlations can only be achieved, up to isometries, with specific states and measurements. Here, we present a new approach for quantum self-testing in Bell non-locality scenarios, motivated by the following observation: the quantum maximum of a given Bell inequality is, in general, difficult to characterize. However, it is strictly contained in an easy-to-characterize set: the \emph{theta body} of a vertex-weighted induced subgraph $(G,w)$ of the graph in which vertices represent the events and edges join mutually exclusive events. This implies that, for the cases where the quantum maximum and the maximum within the theta body (known as the Lovász theta number) of $(G,w)$ coincide, self-testing can be demonstrated by just proving self-testability with the theta body of $G$. This graph-theoretic framework allows us to (i) recover the self-testability of several quantum correlations that are known to permit self-testing (like those violating the Clauser-Horne-Shimony-Holt (CHSH) and three-party Mermin Bell inequalities for projective measurements of arbitrary rank, and chained Bell inequalities for rank-one projective measurements), (ii) prove the self-testability of quantum correlations that were not known using existing self-testing techniques (e.g., those violating the Abner Shimony Bell inequality for rank-one projective measurements). Additionally, the analysis of the chained Bell inequalities gives us a closed-form expression of the Lovász theta number for a family of well-studied graphs known as the Möbius ladders, which might be of independent interest in the community of discrete mathematics.
△ Less
Submitted 27 April, 2021;
originally announced April 2021.
-
Quantum-classical algorithms for skewed linear systems with optimized Hadamard test
Authors:
Bujiao Wu,
Maharshi Ray,
Liming Zhao,
Xiaoming Sun,
Patrick Rebentrost
Abstract:
The solving of linear systems provides a rich area to investigate the use of nearer-term, noisy, intermediate-scale quantum computers. In this work, we discuss hybrid quantum-classical algorithms for skewed linear systems for over-determined and under-determined cases. Our input model is such that the columns or rows of the matrix defining the linear system are given via quantum circuits of poly-l…
▽ More
The solving of linear systems provides a rich area to investigate the use of nearer-term, noisy, intermediate-scale quantum computers. In this work, we discuss hybrid quantum-classical algorithms for skewed linear systems for over-determined and under-determined cases. Our input model is such that the columns or rows of the matrix defining the linear system are given via quantum circuits of poly-logarithmic depth and the number of circuits is much smaller than their Hilbert space dimension. Our algorithms have poly-logarithmic dependence on the dimension and polynomial dependence in other natural quantities. In addition, we present an algorithm for the special case of a factorized linear system with run time poly-logarithmic in the respective dimensions. At the core of these algorithms is the Hadamard test and in the second part of this paper we consider the optimization of the circuit depth of this test. Given an $n$-qubit and $d$-depth quantum circuit $\mathcal{C}$, we can approximate $\langle 0|\mathcal{C}|0\rangle$ using $(n + s)$ qubits and $O\left(\log s + d\log (n/s) + d\right)$-depth quantum circuits, where $s\leq n$. In comparison, the standard implementation requires $n+1$ qubits and $O(dn)$ depth. Lattice geometries underlie recent quantum supremacy experiments with superconducting devices. We also optimize the Hadamard test for an $(l_1\times l_2)$ lattice with $l_1 \times l_2 = n$, and can approximate $\langle 0|\mathcal{C} |0\rangle$ with $(n + 1)$ qubits and $O\left(d \left(l_1 + l_2\right)\right)$-depth circuits. In comparison, the standard depth is $O\left(d n^2\right)$ in this setting. Both of our optimization methods are asymptotically tight in the case of one-depth quantum circuits $\mathcal{C}$.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
Graph-theoretic approach to dimension witnessing
Authors:
Maharshi Ray,
Naresh Goud Boddu,
Kishor Bharti,
Leong-Chuan Kwek,
Adán Cabello
Abstract:
A fundamental problem in quantum computation and quantum information is finding the minimum quantum dimension needed for a task. For tasks involving state preparation and measurements, this problem can be addressed using only the input-output correlations. This has been applied to Bell, prepare-and-measure, and Kochen-Specker contextuality scenarios. Here, we introduce a novel approach to quantum…
▽ More
A fundamental problem in quantum computation and quantum information is finding the minimum quantum dimension needed for a task. For tasks involving state preparation and measurements, this problem can be addressed using only the input-output correlations. This has been applied to Bell, prepare-and-measure, and Kochen-Specker contextuality scenarios. Here, we introduce a novel approach to quantum dimension witnessing for scenarios with one preparation and several measurements, which uses the graphs of mutual exclusivity between sets of measurement events. We present the concepts and tools needed for graph-theoretic quantum dimension witnessing and illustrate their use by identifying novel quantum dimension witnesses, including a family that can certify arbitrarily high quantum dimensions with few events.
△ Less
Submitted 13 November, 2020; v1 submitted 21 July, 2020;
originally announced July 2020.
-
Quantum algorithms for hedging and the learning of Ising models
Authors:
Patrick Rebentrost,
Yassine Hamoudi,
Maharshi Ray,
Xin Wang,
Siyi Yang,
Miklos Santha
Abstract:
A paradigmatic algorithm for online learning is the Hedge algorithm by Freund and Schapire. An allocation into different strategies is chosen for multiple rounds and each round incurs corresponding losses for each strategy. The algorithm obtains a favorable guarantee for the total losses even in an adversarial situation. This work presents quantum algorithms for such online learning in an oracular…
▽ More
A paradigmatic algorithm for online learning is the Hedge algorithm by Freund and Schapire. An allocation into different strategies is chosen for multiple rounds and each round incurs corresponding losses for each strategy. The algorithm obtains a favorable guarantee for the total losses even in an adversarial situation. This work presents quantum algorithms for such online learning in an oracular setting. For $T$ time steps and $N$ strategies, we exhibit run times of about $O \left ({\rm poly} (T) \sqrt{N} \right)$ for estimating the losses and for betting on individual strategies by sampling. In addition, we discuss a quantum analogue of the Sparsitron, a machine learning algorithm based on the Hedge algorithm. The quantum algorithm inherits the provable learning guarantees from the classical algorithm and exhibits polynomial speedups. The speedups may find relevance in finance, for example for hedging risks, and machine learning, for example for learning generalized linear models or Ising models.
△ Less
Submitted 30 November, 2020; v1 submitted 14 February, 2020;
originally announced February 2020.
-
Local certification of programmable quantum devices of arbitrary high dimensionality
Authors:
Kishor Bharti,
Maharshi Ray,
Antonios Varvitsiotis,
Adán Cabello,
Leong-Chuan Kwek
Abstract:
The onset of the era of fully-programmable error-corrected quantum computers will be marked by major breakthroughs in all areas of science and engineering. These devices promise to have significant technological and societal impact, notable examples being the analysis of big data through better machine learning algorithms and the design of new materials. Nevertheless, the capacity of quantum compu…
▽ More
The onset of the era of fully-programmable error-corrected quantum computers will be marked by major breakthroughs in all areas of science and engineering. These devices promise to have significant technological and societal impact, notable examples being the analysis of big data through better machine learning algorithms and the design of new materials. Nevertheless, the capacity of quantum computers to faithfully implement quantum algorithms relies crucially on their ability to prepare specific high-dimensional and high-purity quantum states, together with suitable quantum measurements. Thus, the unambiguous certification of these requirements without assumptions on the inner workings of the quantum computer is critical to the development of trusted quantum processors. One of the most important approaches for benchmarking quantum devices is through the mechanism of self-testing that requires a pair of entangled non-communicating quantum devices. Nevertheless, although computation typically happens in a localized fashion, no local self-testing scheme is known to benchmark high dimensional states and measurements. Here, we show that the quantum self-testing paradigm can be employed to an individual quantum computer that is modelled as a programmable black box by introducing a noise-tolerant certification scheme. We substantiate the applicability of our scheme by providing a family of outcome statistics whose observation certifies that the computer is producing specific high-dimensional quantum states and implementing specific measurements.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Robust self-testing of quantum systems via noncontextuality inequalities
Authors:
Kishor Bharti,
Maharshi Ray,
Antonios Varvitsiotis,
Naqueeb Ahmad Warsi,
Adán Cabello,
Leong-Chuan Kwek
Abstract:
Characterising unknown quantum states and measurements is a fundamental problem in quantum information processing. In this Letter, we provide a novel scheme to self-test local quantum systems using non-contextuality inequalities. Our work leverages the graph-theoretic framework for contextuality introduced by Cabello, Severini, and Winter, combined with tools from mathematical optimisation that gu…
▽ More
Characterising unknown quantum states and measurements is a fundamental problem in quantum information processing. In this Letter, we provide a novel scheme to self-test local quantum systems using non-contextuality inequalities. Our work leverages the graph-theoretic framework for contextuality introduced by Cabello, Severini, and Winter, combined with tools from mathematical optimisation that guarantee the unicity of optimal solutions. As an application, we show that the celebrated Klyachko-Can-Biniciogglu-Shumovsky inequality and its generalisation to contextuality scenarios with odd n-cycle compatibility relations admit robust self-testing.
△ Less
Submitted 5 June, 2019; v1 submitted 18 December, 2018;
originally announced December 2018.
-
Non-classical Correlations in n-Cycle Setting
Authors:
Kishor Bharti,
Maharshi Ray,
Leong Chuan Kwek
Abstract:
We explore non-classical correlations in n-cycle setting. In particular, we focus on correlations manifested by Kochen-Specker-Klyachko box (KS box), scenarios involving n-cycle non-contextuality inequalities and Popescu-Rohlrich boxes (PR box). We provide the criteria for optimal classical simulation of a KS box of arbitrary n dimension. The non-contextuality inequalities are analysed for n-cycle…
▽ More
We explore non-classical correlations in n-cycle setting. In particular, we focus on correlations manifested by Kochen-Specker-Klyachko box (KS box), scenarios involving n-cycle non-contextuality inequalities and Popescu-Rohlrich boxes (PR box). We provide the criteria for optimal classical simulation of a KS box of arbitrary n dimension. The non-contextuality inequalities are analysed for n-cycle setting, and the condition for the quantum violation for odd as well as even n-cycle is discussed. We offer a simple extension of even cycle non-contextuality inequalities to the continuous variable case. Furthermore, we simulate a generalized PR box using KS box and provide some interesting insights. Towards the end, we discuss a few possible interesting open problems for future research.
△ Less
Submitted 12 December, 2018;
originally announced December 2018.
-
Strategies for quantum races
Authors:
Troy Lee,
Maharshi Ray,
Miklos Santha
Abstract:
We initiate the study of quantum races, games where two or more quantum computers compete to solve a computational problem. While the problem of dueling algorithms has been studied for classical deterministic algorithms, the quantum case presents additional sources of uncertainty for the players. The foremost among these is that players do not know if they have solved the problem until they measur…
▽ More
We initiate the study of quantum races, games where two or more quantum computers compete to solve a computational problem. While the problem of dueling algorithms has been studied for classical deterministic algorithms, the quantum case presents additional sources of uncertainty for the players. The foremost among these is that players do not know if they have solved the problem until they measure their quantum state. This question of `when to measure?' presents a very interesting strategic problem. We develop a game-theoretic model of a multiplayer quantum race, and find an approximate Nash equilibrium where all players play the same strategy. In the two-party case, we further show that this strategy is nearly optimal in terms of payoff among all symmetric Nash equilibria. A key role in our analysis of quantum races is played by a more tractable version of the game where there is no payout on a tie; for such races we completely characterize the Nash equilibria in the two-party case.
One application of our results is to the stability of the Bitcoin protocol when mining is done by quantum computers. Bitcoin mining is a race to solve a computational search problem, with the winner gaining the right to create a new block. Our results inform the strategies that eventual quantum miners should use, and also indicate that the collision probability---the probability that two miners find a new block at the same time---would not be too high in the case of quantum miners. Such collisions are undesirable as they lead to forking of the Bitcoin blockchain.
△ Less
Submitted 27 September, 2018; v1 submitted 10 September, 2018;
originally announced September 2018.
-
On the Security of Semi Device Independent QKD protocols
Authors:
Anubhav Chaturvedi,
Maharshi Ray,
Ryszard Veynar,
Marcin Pawlowski
Abstract:
While fully device-independent security in (BB84-like) prepare and measure Quantum Key Distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used are made except for an upper bound on the the dimension of the communicated system. Studying security under su…
▽ More
While fully device-independent security in (BB84-like) prepare and measure Quantum Key Distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used are made except for an upper bound on the the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent {\it quantum hacking} attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work we study the security of a SDIQKD protocol based on the prepare and measure quantum implementation of a well-known cryptographic primitive, the Random Access Code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.
△ Less
Submitted 6 May, 2018; v1 submitted 3 April, 2015;
originally announced April 2015.
-
Observation of Dirac Monopoles in a Synthetic Magnetic Field
Authors:
M. W. Ray,
E. Ruokokoski,
S. Kandel,
M. Möttönen,
D. S. Hall
Abstract:
Magnetic monopoles --- particles that behave as isolated north or south magnetic poles --- have been the subject of speculation since the first detailed observations of magnetism several hundred years ago. Numerous theoretical investigations and hitherto unsuccessful experimental searches have followed Dirac's 1931 development of a theory of monopoles consistent with both quantum mechanics and the…
▽ More
Magnetic monopoles --- particles that behave as isolated north or south magnetic poles --- have been the subject of speculation since the first detailed observations of magnetism several hundred years ago. Numerous theoretical investigations and hitherto unsuccessful experimental searches have followed Dirac's 1931 development of a theory of monopoles consistent with both quantum mechanics and the gauge invariance of the electromagnetic field. The existence of even a single Dirac magnetic monopole would have far-reaching physical consequences, most famously explaining the quantization of electric charge. Although analogues of magnetic monopoles have been found in exotic spin-ices and other systems, there has been no direct experimental observation of Dirac monopoles within a medium described by a quantum field, such as superfluid helium-3. Here we demonstrate the controlled creation of Dirac monopoles in the synthetic magnetic field produced by a spinor Bose-Einstein condensate. Monopoles are identified, in both experiments and matching numerical simulations, at the termini of vortex lines within the condensate. By directly imaging such a vortex line, the presence of a monopole may be discerned from the experimental data alone. These real-space images provide conclusive and long-awaited experimental evidence of the existence of Dirac monopoles. Our result provides an unprecedented opportunity to observe and manipulate these quantum-mechanical entities in a controlled environment.
△ Less
Submitted 13 August, 2014;
originally announced August 2014.
-
Sequential Quantum Secret Sharing in a Noisy Environment aided with Weak Measurements
Authors:
Maharshi Ray,
Sourav Chatterjee,
Indranil Chakrabarty
Abstract:
In this work we give a $(n,n)$-threshold protocol for sequential secret sharing of quantum information for the first time.
By sequential secret sharing we refer to a situation where the dealer is not having all the secrets at the same time, at the beginning of the protocol; however if the dealer wishes to share secrets at subsequent phases she/he can realize it with the help of our protocol. Fir…
▽ More
In this work we give a $(n,n)$-threshold protocol for sequential secret sharing of quantum information for the first time.
By sequential secret sharing we refer to a situation where the dealer is not having all the secrets at the same time, at the beginning of the protocol; however if the dealer wishes to share secrets at subsequent phases she/he can realize it with the help of our protocol. First of all we present our protocol for three parties and later we generalize it for the situation where we have $(n>3)$ parties.
Further in a much more realistic situation, we consider the sharing of qubits through two kinds of noisy channels, namely the phase dam** channel (PDC) and the amplitude dam** channel (ADC). When we carry out the sequential secret sharing in the presence of noise we observe that the fidelity of secret sharing at the $k^{th}$ iteration is independent of the effect of noise at the $(k-1)^{th}$ iteration. In case of ADC we have seen that the average fidelity of secret sharing drops down to $\frac{1}{2}$ which is equivalent to a random guess of the quantum secret. Interestingly, we find that by applying weak measurements one can enhance the average fidelity. This increase of the average fidelity can be achieved with certain trade off with the success probability of the weak measurements.
△ Less
Submitted 4 April, 2016; v1 submitted 11 February, 2014;
originally announced February 2014.
-
Missing data outside the detector range: application to continuous variable entanglement verification and quantum cryptography
Authors:
Megan R. Ray,
S. J. van Enk
Abstract:
In continuous-variable quantum information processing detectors are necessarily coarse grained and of finite range. We discuss how especially the latter feature is a bug and may easily lead to overoptimistic estimates of entanglement and of security, when missed data outside the detector range are ignored. We show that entropic separability or security criteria are much superior to variance-based…
▽ More
In continuous-variable quantum information processing detectors are necessarily coarse grained and of finite range. We discuss how especially the latter feature is a bug and may easily lead to overoptimistic estimates of entanglement and of security, when missed data outside the detector range are ignored. We show that entropic separability or security criteria are much superior to variance-based criteria for mitigating the negative effects of this bug.
△ Less
Submitted 20 February, 2013;
originally announced February 2013.
-
Verifying entanglement in the Hong-Ou-Mandel dip
Authors:
Megan R. Ray,
Steven J. van Enk
Abstract:
The Hong-Ou-Mandel interference dip is caused by an entangled state, a delocalized bi-photon state. We propose a method of detecting this entanglement by utilizing inverse Hong-Ou-Mandel interference, while taking into account vacuum and multi-photon contaminations, phase noise, and other imperfections. The method uses just linear optics and photodetectors, and for single-mode photodetectors we fi…
▽ More
The Hong-Ou-Mandel interference dip is caused by an entangled state, a delocalized bi-photon state. We propose a method of detecting this entanglement by utilizing inverse Hong-Ou-Mandel interference, while taking into account vacuum and multi-photon contaminations, phase noise, and other imperfections. The method uses just linear optics and photodetectors, and for single-mode photodetectors we find a lower bound on the amount of entanglement.
△ Less
Submitted 4 January, 2011;
originally announced January 2011.