-
High-precision and low-depth eigenstate property estimation: theory and resource estimation
Authors:
**zhao Sun,
Pei Zeng,
Tom Gur,
M. S. Kim
Abstract:
Estimating the eigenstate properties of quantum many-body systems is a long-standing, challenging problem for both classical and quantum computing. For the task of eigenstate preparation, quantum signal processing (QSP) has established near-optimal query complexity $O( Δ^{-1} \log(ε^{-1}) )$ by querying the block encoding of the Hamiltonian $H$ where $Δ$ is the energy gap and $ε$ is the target pre…
▽ More
Estimating the eigenstate properties of quantum many-body systems is a long-standing, challenging problem for both classical and quantum computing. For the task of eigenstate preparation, quantum signal processing (QSP) has established near-optimal query complexity $O( Δ^{-1} \log(ε^{-1}) )$ by querying the block encoding of the Hamiltonian $H$ where $Δ$ is the energy gap and $ε$ is the target precision. However, QSP is challenging for both near-term noisy quantum computers and early fault-tolerant quantum computers (FTQC), which are limited by the number of logical qubits and circuit depth. To date, early FTQC algorithms have focused on querying the perfect time evolution $e^{-iHt}$. It remains uncertain whether early FTQC algorithms can maintain good asymptotic scaling at the gate level. Moreover, when considering qubit connectivity, the circuit depth of existing FTQC algorithms may scale suboptimally with system size. Here, we present a full-stack design of a random sampling algorithm for estimating the eigenenergy and the observable expectations on the eigenstates, which can achieve high precision and good system size scaling. The gate complexity has a logarithmic dependence on precision $ {O}(\log^{1+o(1)} (1/ε))$ for generic Hamiltonians, which cannot achieved by methods using Trottersiation to realise $e^{-iHt}$ like in QETU. For $n$-qubit lattice Hamiltonians, our method achieves near-optimal system size dependence with the gate complexity $O(n^{1+o(1)})$. When restricting the qubit connectivity to a linear nearest-neighbour architecture, The method shows advantages in circuit depth, with $O(n^{o(1)})$ for lattice models and $O(n^{2+o(1)})$ for electronic structure problems. We compare the resource requirements (CNOT gates, T gates and qubit numbers) by phase estimation, QSP, and QETU, in lattice and molecular problems.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Fault-Tolerant Operation of Bosonic Qubits with Discrete-Variable Ancillae
Authors:
Qian Xu,
Pei Zeng,
Daohong Xu,
Liang Jiang
Abstract:
Fault-tolerant quantum computation with bosonic qubits often necessitates the use of noisy discrete-variable ancillae. In this work, we establish a comprehensive and practical fault-tolerance framework for such a hybrid system and synthesize it with fault-tolerant protocols by combining bosonic quantum error correction (QEC) and advanced quantum control techniques. We introduce essential building…
▽ More
Fault-tolerant quantum computation with bosonic qubits often necessitates the use of noisy discrete-variable ancillae. In this work, we establish a comprehensive and practical fault-tolerance framework for such a hybrid system and synthesize it with fault-tolerant protocols by combining bosonic quantum error correction (QEC) and advanced quantum control techniques. We introduce essential building blocks of error-corrected gadgets by leveraging ancilla-assisted bosonic operations using a generalized variant of path-independent quantum control (GPI). Using these building blocks, we construct a universal set of error-corrected gadgets that tolerate a single photon loss and an arbitrary ancilla fault for four-legged cat qubits. Notably, our construction only requires dispersive coupling between bosonic modes and ancillae, as well as beam-splitter coupling between bosonic modes, both of which have been experimentally demonstrated with strong strengths and high accuracy. Moreover, each error-corrected bosonic qubit is only comprised of a single bosonic mode and a three-level ancilla, featuring the hardware efficiency of bosonic QEC in the full fault-tolerant setting. We numerically demonstrate the feasibility of our schemes using current experimental parameters in the circuit-QED platform. Finally, we present a hardware-efficient architecture for fault-tolerant quantum computing by concatenating the four-legged cat qubits with an outer qubit code utilizing only beam-splitter couplings. Our estimates suggest that the overall noise threshold can be reached using existing hardware. These developed fault-tolerant schemes extend beyond their applicability to four-legged cat qubits and can be adapted for other rotation-symmetrical codes, offering a promising avenue toward scalable and robust quantum computation with bosonic qubits.
△ Less
Submitted 31 October, 2023;
originally announced October 2023.
-
Pilot-reference-free continuous-variable quantum key distribution with efficient decoy-state analysis
Authors:
Anran **,
Xingjian Zhang,
Liang Jiang,
Richard V. Penty,
Pei Zeng
Abstract:
Continuous-variable quantum key distribution (CV QKD) using optical coherent detectors is practically favorable due to its low implementation cost, flexibility of wavelength division multiplexing, and compatibility with standard coherent communication technologies. However, the security analysis and parameter estimation of CV QKD are complicated due to the infinite-dimensional latent Hilbert space…
▽ More
Continuous-variable quantum key distribution (CV QKD) using optical coherent detectors is practically favorable due to its low implementation cost, flexibility of wavelength division multiplexing, and compatibility with standard coherent communication technologies. However, the security analysis and parameter estimation of CV QKD are complicated due to the infinite-dimensional latent Hilbert space. Also, the transmission of strong reference pulses undermines the security and complicates the experiments. In this work, we tackle these two problems by presenting a time-bin-encoding CV protocol with a simple phase-error-based security analysis valid under general coherent attacks. With the key encoded into the relative intensity between two optical modes, the need for global references is removed. Furthermore, phase randomization can be introduced to decouple the security analysis of different photon-number components. We can hence tag the photon number for each round, effectively estimate the associated privacy using a carefully designed coherent-detection method, and independently extract encryption keys from each component. Simulations manifest that the protocol using multi-photon components increases the key rate by two orders of magnitude compared to the one using only the single-photon component. Meanwhile, the protocol with four-intensity decoy analysis is sufficient to yield tight parameter estimation with a short-distance key-rate performance comparable to the best Bennett-Brassard-1984 implementation.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Simple and high-precision Hamiltonian simulation by compensating Trotter error with linear combination of unitary operations
Authors:
Pei Zeng,
**zhao Sun,
Liang Jiang,
Qi Zhao
Abstract:
Trotter and linear-combination-of-unitary (LCU) are two popular Hamiltonian simulation methods. We propose Hamiltonian simulation algorithms using LCU to compensate Trotter error, which enjoy both of their advantages. By adding few gates after the Kth-order Trotter, we realize a better time scaling than 2Kth-order Trotter. Our first algorithm exponentially improves the accuracy scaling of the Kth-…
▽ More
Trotter and linear-combination-of-unitary (LCU) are two popular Hamiltonian simulation methods. We propose Hamiltonian simulation algorithms using LCU to compensate Trotter error, which enjoy both of their advantages. By adding few gates after the Kth-order Trotter, we realize a better time scaling than 2Kth-order Trotter. Our first algorithm exponentially improves the accuracy scaling of the Kth-order Trotter formula. In the second algorithm, we consider the detailed structure of Hamiltonians and construct LCU for Trotter errors with commutator scaling. Consequently, for lattice Hamiltonians, the algorithm enjoys almost linear system-size dependence and quadratically improves the accuracy of the Kth-order Trotter.
△ Less
Submitted 8 December, 2022;
originally announced December 2022.
-
Experimental mode-pairing measurement-device-independent quantum key distribution without global phase-locking
Authors:
Hao-Tao Zhu,
Yizhi Huang,
Hui Liu,
Pei Zeng,
Mi Zou,
Yunqi Dai,
Shibiao Tang,
Hao Li,
Lixing You,
Zhen Wang,
Yu-Ao Chen,
Xiongfeng Ma,
Teng-Yun Chen,
Jian-Wei Pan
Abstract:
In the past two decades, quantum key distribution networks based on telecom fibers have been implemented on metropolitan and intercity scales. One of the bottlenecks lies in the exponential decay of the key rate with respect to the transmission distance. Recently proposed schemes mainly focus on achieving longer distances by creating a long-arm single-photon interferometer over two communication p…
▽ More
In the past two decades, quantum key distribution networks based on telecom fibers have been implemented on metropolitan and intercity scales. One of the bottlenecks lies in the exponential decay of the key rate with respect to the transmission distance. Recently proposed schemes mainly focus on achieving longer distances by creating a long-arm single-photon interferometer over two communication parties. Despite their advantageous performance over long communication distances, the requirement of phase-locking between two independent lasers is technically challenging. By adopting the recently-proposed mode-pairing idea, we realize high-performance quantum key distribution without global phase-locking. Using two independent off-the-shelf lasers, we show a quadratic key-rate improvement over the conventional measurement-device-independent schemes in the regime of metropolitan and intercity distances. For longer distances, we also boost the key rate performance by three orders of magnitude via 304 km commercial fiber and 407 km ultra-low-loss fiber. We expect this ready-to-implement high-performance scheme to be widely used in future intercity quantum communication networks.
△ Less
Submitted 9 February, 2023; v1 submitted 11 August, 2022;
originally announced August 2022.
-
Scalable fast benchmarking for individual quantum gates with local twirling
Authors:
Yihong Zhang,
Wenjun Yu,
Pei Zeng,
Guoding Liu,
Xiongfeng Ma
Abstract:
With the development of controllable quantum systems, fast and practical characterization for multi-qubit gates is essential for building high-fidelity quantum computing devices. The usual way to fulfill this requirement via randomized benchmarking asks for the complicated implementation of numerous multi-qubit twirling gates. How to efficiently and reliably estimate the fidelity of a quantum proc…
▽ More
With the development of controllable quantum systems, fast and practical characterization for multi-qubit gates is essential for building high-fidelity quantum computing devices. The usual way to fulfill this requirement via randomized benchmarking asks for the complicated implementation of numerous multi-qubit twirling gates. How to efficiently and reliably estimate the fidelity of a quantum process remains an open problem. In this work, we propose a character-cycle benchmarking protocol and a character-average benchmarking protocol only using local twirling gates to estimate the process fidelity of an individual multi-qubit operation. Our protocols can characterize a large class of quantum gates including and beyond the Clifford group via the local gauge transformation, which forms a universal gate set for quantum computing. We numerically demonstrate our protocols for a non-Clifford gate -- controlled-$(TX)$ and a Clifford gate -- five-qubit quantum error-correcting encoding circuit. The numerical results show that our protocols can efficiently and reliably characterize the gate process fidelities. Compared with the cross-entropy benchmarking, the simulation results show that the character-average benchmarking achieves three orders of magnitude improvements in terms of sampling complexity.
△ Less
Submitted 9 February, 2023; v1 submitted 19 March, 2022;
originally announced March 2022.
-
Quantum key distribution surpassing the repeaterless rate-transmittance bound without global phase locking
Authors:
Pei Zeng,
Hongyi Zhou,
Weijie Wu,
Xiongfeng Ma
Abstract:
Quantum key distribution -- the establishment of information-theoretically secure keys based on quantum physics -- is mainly limited by its practical performance, which is characterised by the dependence of the key rate on the channel transmittance $R(η)$. Recently, schemes based on single-photon interference have been proposed to improve the key rate to $R=O(\sqrtη)$ by overcoming the point-to-po…
▽ More
Quantum key distribution -- the establishment of information-theoretically secure keys based on quantum physics -- is mainly limited by its practical performance, which is characterised by the dependence of the key rate on the channel transmittance $R(η)$. Recently, schemes based on single-photon interference have been proposed to improve the key rate to $R=O(\sqrtη)$ by overcoming the point-to-point secret key capacity bound with interferometers. Unfortunately, all of these schemes require challenging global phase locking to realise a stable long-arm single-photon interferometer with a precision of approximately 100 nm over fibres that are hundreds of kilometres long. Aiming to address this problem, we propose a mode-pairing measurement-device-independent quantum key distribution scheme in which the encoded key bits and bases are determined during data post-processing. Using conventional second-order interference, this scheme can achieve a key rate of $R=O(\sqrtη)$ without global phase locking when the local phase fluctuation is mild. We expect this high-performance scheme to be ready-to-implement with off-the-shelf optical devices.
△ Less
Submitted 30 January, 2022; v1 submitted 12 January, 2022;
originally announced January 2022.
-
Quantum Complementarity Approach to Device-Independent Security
Authors:
Xingjian Zhang,
Pei Zeng,
Tian Ye,
Hoi-Kwong Lo,
Xiongfeng Ma
Abstract:
Complementarity is an essential feature of quantum mechanics. The preparation of an eigenstate of one observable implies complete randomness in its complementary observable. In quantum cryptography, complementarity allows us to formulate security analyses in terms of phase-error correction. However, in the device-independent regime that offers security without device characterization, the concept…
▽ More
Complementarity is an essential feature of quantum mechanics. The preparation of an eigenstate of one observable implies complete randomness in its complementary observable. In quantum cryptography, complementarity allows us to formulate security analyses in terms of phase-error correction. However, in the device-independent regime that offers security without device characterization, the concept becomes much subtler. Security proofs of device-independent quantum cryptography tasks are often complex and quite different from those of their more standard device-dependent cousins. The existing proofs pose huge challenges to experiments, among which large data-size requirement is a crux. Here, we show the complementarity security origin of the device-independent tasks. By linking complementarity with quantum nonlocality, we recast the device-independent scheme into a quantum error correction protocol. Going beyond the identical-and-independent-distribution case, we consider the most general attack. We generalize the sample entropy in classical Shannon theory for the finite-size analysis. Our method exhibits good finite-size performance and brings the device-independent scheme to a more practical regime. Applying it to the data in a recent ion-trap-based device-independent quantum key distribution experiment, one could reduce the requirement on data size to less than a third. Furthermore, the complementarity approach can be naturally extended to advantage key distillation to ease experiments by tolerating higher loss and lower transmittance.
△ Less
Submitted 11 October, 2022; v1 submitted 27 November, 2021;
originally announced November 2021.
-
Bootstrap** Calabi-Yau Quantum Mechanics
Authors:
Bao-ning Du,
Min-xin Huang,
Pei-xuan Zeng
Abstract:
Recently, a novel bootstrap method for numerical calculations in matrix models and quantum mechanical systems is proposed. We apply the method to certain quantum mechanical systems derived from some well-known local toric Calabi-Yau geometries, where the exact quantization conditions have been conjecturally related to topological string theory. We find that the bootstrap method provides a promisin…
▽ More
Recently, a novel bootstrap method for numerical calculations in matrix models and quantum mechanical systems is proposed. We apply the method to certain quantum mechanical systems derived from some well-known local toric Calabi-Yau geometries, where the exact quantization conditions have been conjecturally related to topological string theory. We find that the bootstrap method provides a promising alternative for the precision numerical calculations of the energy eigenvalues. An improvement in our approach is to use a larger set of two-dimensional operators instead of one-dimensional ones. We also apply our improved bootstrap methods to some non-relativistic models in the recent literature and demonstrate better numerical accuracies.
△ Less
Submitted 16 November, 2021;
originally announced November 2021.
-
Universal quantum algorithmic cooling on a quantum computer
Authors:
Pei Zeng,
**zhao Sun,
Xiao Yuan
Abstract:
Quantum cooling, a deterministic process that drives any state to the lowest eigenstate, has been widely used from studying ground state properties of chemistry and condensed matter quantum physics, to general optimization problems. However, the cooling procedure is generally non-unitary, hence its realization on a quantum computer either requires deep circuits or assumes specific input states wit…
▽ More
Quantum cooling, a deterministic process that drives any state to the lowest eigenstate, has been widely used from studying ground state properties of chemistry and condensed matter quantum physics, to general optimization problems. However, the cooling procedure is generally non-unitary, hence its realization on a quantum computer either requires deep circuits or assumes specific input states with variational circuits. Here, we propose universal quantum cooling algorithms that overcome these limitations. By utilizing a dual phase representation of decaying functions, we show how to universally and deterministically realize a general cooling procedure with shallow quantum circuits. We demonstrate its applications in cooling an arbitrary input state with known ground state energy, corresponding to satisfactory, linear algebra tasks, and quantum state compiling tasks, and preparing unknown eigenvalues and eigenstates, corresponding to quantum many-body problems. Compared to quantum phase estimation, our method uses only one ancillary qubit and much shallower circuits, showing exponential improvement of the circuit complexity with respect to the final state infidelity. We numerically benchmark the algorithms for the $8$-qubit Heisenberg model and verify its feasibility for accurately finding eigenenergies and obtaining eigenstate measurements. Our work paves the way for efficient and universal quantum algorithmic cooling with near-term as well as universal fault-tolerant quantum devices.
△ Less
Submitted 2 June, 2022; v1 submitted 30 September, 2021;
originally announced September 2021.
-
Reference-frame-independent design of phase-matching quantum key distribution
Authors:
Anran **,
Pei Zeng,
Richard V. Penty,
Xiongfeng Ma
Abstract:
The recently proposed phase-matching quantum key distribution offers means to overcome the linear key rate-transmittance bound. Since the key information is encoded onto the phases of coherent states, the misalignment between the two remote reference frames would yield errors and significantly degrade the key generation rate from the ideal case. In this work, we propose a reference-frame-independe…
▽ More
The recently proposed phase-matching quantum key distribution offers means to overcome the linear key rate-transmittance bound. Since the key information is encoded onto the phases of coherent states, the misalignment between the two remote reference frames would yield errors and significantly degrade the key generation rate from the ideal case. In this work, we propose a reference-frame-independent design of phase-matching quantum key distribution by introducing high-dimensional key encoding space. With encoded phases spanning the unit circle, the error statistics at arbitrary fixed phase reference difference can be recovered and treated separately, from which the misalignment angle can be identified. By naturally extending the binary encoding symmetry and complementarity to high dimensions, we present a security proof of this high-dimensional phase-matching quantum key distribution and demonstrate with simulation that a 17-dimensional protocol is completely immune to any degree of fixed misalignment and robust to slow phase fluctuations. We expect the high-dimensional protocol to be a practical reference-frame-independent design for general phase-encoding schemes where high-dimensional encoding is relatively easy to implement.
△ Less
Submitted 15 September, 2021;
originally announced September 2021.
-
Characterizing correlation within multipartite quantum systems via local randomized measurements
Authors:
Zhenhuan Liu,
Pei Zeng,
You Zhou,
Mile Gu
Abstract:
Given a quantum system on many qubits split into a few different parties, how many total correlations are there between these parties? Such a quantity, aimed to measure the deviation of the global quantum state from an uncorrelated state with the same local statistics, plays an important role in understanding multipartite correlations within complex networks of quantum states. Yet, the experimenta…
▽ More
Given a quantum system on many qubits split into a few different parties, how many total correlations are there between these parties? Such a quantity, aimed to measure the deviation of the global quantum state from an uncorrelated state with the same local statistics, plays an important role in understanding multipartite correlations within complex networks of quantum states. Yet, the experimental access of this quantity remains challenging as it tends to be non-linear, and hence often requires tomography which becomes quickly intractable as dimensions of relevant quantum systems scale. Here, we introduce a much more experimentally accessible quantifier of total correlations, which can be estimated using only single-qubit measurements. It requires far fewer measurements than state tomography and obviates the need to coherently interfere multiple copies of a given state. Thus, we provide a tool for proving multipartite correlations that can be applied to near-term quantum devices.
△ Less
Submitted 11 February, 2022; v1 submitted 18 August, 2021;
originally announced August 2021.
-
One-shot dynamical resource theory
Authors:
Xiao Yuan,
Pei Zeng,
Minbo Gao,
Qi Zhao
Abstract:
A fundamental problem in resource theory is to study the manipulation of the resource. Focusing on a general dynamical resource theory of quantum channels, here we consider tasks of one-shot resource distillation and dilution with a single copy of the resource. For any target of unitary channel or pure state preparation channel, we establish a universal strategy to determine upper and lower bounds…
▽ More
A fundamental problem in resource theory is to study the manipulation of the resource. Focusing on a general dynamical resource theory of quantum channels, here we consider tasks of one-shot resource distillation and dilution with a single copy of the resource. For any target of unitary channel or pure state preparation channel, we establish a universal strategy to determine upper and lower bounds on rates that convert between any given resource and the target. We show that the rates are related to resource measures based on the channel robustness and the channel hypothesis testing entropy, with regularization factors of the target resource measures. The strategy becomes optimal with converged bounds when the channel robustness is finite and measures of the target resource collapse to the same value. The single-shot result also applies to asymptotic parallel manipulation of channels to obtain asymptotic resource conversion rates. We give several examples of dynamical resources, including the purity, classical capacity, quantum capacity, non-uniformity, coherence, and entanglement of quantum channels. Our results are applicable to general dynamical resource theories with potential applications in quantum communication, fault-tolerant quantum computing, and quantum thermodynamics.
△ Less
Submitted 4 December, 2020;
originally announced December 2020.
-
Recent advances on quantum key distribution overcoming the linear secret key capacity bound
Authors:
Yingqiu Mao,
Pei Zeng,
Teng-Yun Chen
Abstract:
A crucial goal for quantum key distribution (QKD) is to transmit unconditionally secure keys over long distances. Previous studies show that the key rate of point-to-point QKD is limited by a secret key rate capacity bound, and higher key rates would require quantum repeaters. In 2018, the seminal twin-field (TF) QKD protocol was proposed to provide a remarkable solution to overcoming the linear s…
▽ More
A crucial goal for quantum key distribution (QKD) is to transmit unconditionally secure keys over long distances. Previous studies show that the key rate of point-to-point QKD is limited by a secret key rate capacity bound, and higher key rates would require quantum repeaters. In 2018, the seminal twin-field (TF) QKD protocol was proposed to provide a remarkable solution to overcoming the linear secret key capacity bound. This article presents an up-to-date survey on recent developments in this area, including the security proofs of phase-matching QKD and other TF-QKD type protocols, the theoretical examinations of these protocols under realistic conditions, and the recent experimental demonstrations.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
Robust shadow estimation
Authors:
Senrui Chen,
Wenjun Yu,
Pei Zeng,
Steven T. Flammia
Abstract:
Efficiently estimating properties of large and strongly coupled quantum systems is a central focus in many-body physics and quantum information theory. While quantum computers promise speedups for many such tasks, near-term devices are prone to noise that will generally reduce the accuracy of such estimates. Here we show how to mitigate errors in the shadow estimation protocol recently proposed by…
▽ More
Efficiently estimating properties of large and strongly coupled quantum systems is a central focus in many-body physics and quantum information theory. While quantum computers promise speedups for many such tasks, near-term devices are prone to noise that will generally reduce the accuracy of such estimates. Here we show how to mitigate errors in the shadow estimation protocol recently proposed by Huang, Kueng, and Preskill. By adding an experimentally friendly calibration stage to the standard shadow estimation scheme, our robust shadow estimation algorithm can obtain an unbiased estimate of the classical shadow of a quantum system and hence extract many useful properties in a sample-efficient and noise-resilient manner given only minimal assumptions on the experimental conditions. We give rigorous bounds on the sample complexity of our protocol and demonstrate its performance with several numerical experiments.
△ Less
Submitted 25 June, 2021; v1 submitted 18 November, 2020;
originally announced November 2020.
-
Phase-Matching Quantum Cryptographic Conferencing
Authors:
Shuai Zhao,
Pei Zeng,
Wen-Fei Cao,
Xin-Yu Xu,
Yi-Zheng Zhen,
Xiongfeng Ma,
Li Li,
Nai-Le liu,
Kai Chen
Abstract:
Quantum cryptographic conferencing (QCC) holds promise for distributing information-theoretic secure keys among multiple users over long distance. Limited by the fragility of Greenberger-Horne-Zeilinger (GHZ) state, QCC networks based on directly distributing GHZ states at long distance still face big challenge. Another two potential approaches are measurement device independent QCC and conference…
▽ More
Quantum cryptographic conferencing (QCC) holds promise for distributing information-theoretic secure keys among multiple users over long distance. Limited by the fragility of Greenberger-Horne-Zeilinger (GHZ) state, QCC networks based on directly distributing GHZ states at long distance still face big challenge. Another two potential approaches are measurement device independent QCC and conference key agreement with single-photon interference, which was proposed based on the post-selection of GHZ states and the post-selection of W state, respectively. However, implementations of the former protocol are still heavily constrained by the transmission rate $η$ of optical channels and the complexity of the setups for post-selecting GHZ states. Meanwhile, the latter protocol cannot be cast to a measurement device independent prepare-and-measure scheme. Combining the idea of post-selecting GHZ state and recently proposed twin-field quantum key distribution protocols, we report a QCC protocol based on weak coherent state interferences named phase-matching quantum cryptographic conferencing, which is immune to all detector side-channel attacks. The proposed protocol can improve the key generation rate from $\mathrm{O}(η^N)$ to $\mathrm{O}(η^{N-1})$ compared with the measurement device independent QCC protocols. Meanwhile, it can be easily scaled up to multiple parties due to its simple setup.
△ Less
Submitted 28 June, 2020; v1 submitted 23 June, 2020;
originally announced June 2020.
-
Single-copies estimation of entanglement negativity
Authors:
You Zhou,
Pei Zeng,
Zhenhuan Liu
Abstract:
Entanglement plays a central role in quantum information processing, indicating the non-local correlation of quantum matters. However, few effective ways are known to detect the amount of entanglement of an unknown quantum state. In this work, we propose a scheme to estimate the entanglement negativity of any bi-partition of a composite system. The proposed scheme is based on the random unitary ev…
▽ More
Entanglement plays a central role in quantum information processing, indicating the non-local correlation of quantum matters. However, few effective ways are known to detect the amount of entanglement of an unknown quantum state. In this work, we propose a scheme to estimate the entanglement negativity of any bi-partition of a composite system. The proposed scheme is based on the random unitary evolution and local measurements on the single-copy quantum states, which is more practical compared with former methods based on collective measurements on many copies of the identical state. Meanwhile, we generalize the scheme to quantify the total multi-partite correlation. We demonstrate the efficiency of the scheme with theoretical statistical analysis and numerical simulations. The proposed scheme is quite suitable for state-of-the-art quantum platforms, which can serve as not only a useful benchmarking tool to advance the quantum technology, but also a probe to study fundamental quantum physics, such as the entanglement dynamics.
△ Less
Submitted 23 April, 2020;
originally announced April 2020.
-
Quantum gate verification and its application in property testing
Authors:
Pei Zeng,
You Zhou,
Zhenhuan Liu
Abstract:
To guarantee the normal functioning of quantum devices in different scenarios, appropriate benchmarking tool kits are quite significant. Inspired by the recent progress on quantum state verification, here we establish a general framework of verifying a target unitary gate. In both the non-adversarial and adversarial scenarios, we provide efficient methods to evaluate the performance of verificatio…
▽ More
To guarantee the normal functioning of quantum devices in different scenarios, appropriate benchmarking tool kits are quite significant. Inspired by the recent progress on quantum state verification, here we establish a general framework of verifying a target unitary gate. In both the non-adversarial and adversarial scenarios, we provide efficient methods to evaluate the performance of verification strategies for any qudit unitary gate. Furthermore, we figure out the optimal strategy and its realization with local operations. Specifically, for the commonly-used quantum gates like single qubit and qudit gates, multi-qubit Clifford gates, and multi-qubit Controlled-Z(X) gates, we provide efficient verification protocols. Besides, we discuss the application of gate verification for the detection of entanglement-preserving property of quantum channels and further quantify the robustness measure of them. We believe that the gate verification is a promising way to benchmark a large-scale quantum circuit as well as to test its property.
△ Less
Submitted 18 January, 2020; v1 submitted 15 November, 2019;
originally announced November 2019.
-
Symmetry-protected privacy: beating the rate-distance linear bound over a noisy channel
Authors:
Pei Zeng,
Weijie Wu,
Xiongfeng Ma
Abstract:
There are two main factors limiting the performance of quantum key distribution --- channel transmission loss and noise. Previously, a linear bound was believed to put an upper limit on the rate-transmittance performance. Remarkably, the recently proposed twin-field and phase-matching quantum key distribution schemes have been proven to overcome the linear bound. In practice, due to the intractabl…
▽ More
There are two main factors limiting the performance of quantum key distribution --- channel transmission loss and noise. Previously, a linear bound was believed to put an upper limit on the rate-transmittance performance. Remarkably, the recently proposed twin-field and phase-matching quantum key distribution schemes have been proven to overcome the linear bound. In practice, due to the intractable phase fluctuation of optical signals in transmission, these schemes suffer from large error rates, which renders the experimental realization extremely challenging. Here, we close this gap by proving the security based on a different principle --- encoding symmetry. With the symmetry-based security proof, we can decouple the privacy from the channel disturbance, and eventually remove the limitation of secure key distribution on bit error rates. That is, the phase-matching scheme can yield positive key rates even with high bit error rates up to 50%. In simulation, with typical experimental parameters, the key rate is able to break the linear bound with an error rate of 13%. Meanwhile, we provide a finite-data size analysis for the scheme, which can break the bound with a reasonable data size of $10^{12}$. Encouraged by high loss- and error-tolerance, we expect the approach based on symmetry-protected privacy will provide a new insight to the security of quantum key distribution.
△ Less
Submitted 13 October, 2019;
originally announced October 2019.
-
Surpassing the rate-transmittance linear bound of quantum key distribution
Authors:
Xiao-Tian Fang,
Pei Zeng,
Hui Liu,
Mi Zou,
Weijie Wu,
Yan-Lin Tang,
Ying-Jie Sheng,
Yao Xiang,
Weijun Zhang,
Hao Li,
Zhen Wang,
Lixing You,
Ming-Jun Li,
Hao Chen,
Yu-Ao Chen,
Qiang Zhang,
Cheng-Zhi Peng,
Xiongfeng Ma,
Teng-Yun Chen,
Jian-Wei Pan
Abstract:
Quantum key distribution (QKD offers a long-term solution to establish information-theoretically secure keys between two distant users. In practice, with a careful characterization of quantum sources and the decoy-state method, measure-device-independent quantum key distribution (MDI-QKD) provides secure key distribution. While short-distance fibre-based QKD has already been available for real-lif…
▽ More
Quantum key distribution (QKD offers a long-term solution to establish information-theoretically secure keys between two distant users. In practice, with a careful characterization of quantum sources and the decoy-state method, measure-device-independent quantum key distribution (MDI-QKD) provides secure key distribution. While short-distance fibre-based QKD has already been available for real-life implementation, the bottleneck of practical QKD lies on the limited transmission distance. Due to photon losses in transmission, it was believed that the key generation rate is bounded by a linear function of the channel transmittance, $O(η)$, without a quantum repeater, which puts an upper bound on the maximal secure transmission distance. Interestingly, a new phase-encoding MDI-QKD scheme, named twin-field QKD, has been suggested to beat the linear bound, while another variant, named phase-matching quantum key distribution (PM-QKD), has been proven to have a quadratic key-rate improvement, $O(\sqrtη)$. In reality, however, the intrinsic optical mode mismatch of independent lasers, accompanied by phase fluctuation and drift, impedes the successful experimental implementation of the new schemes. Here, we solve this problem with the assistance of the laser injection technique and the phase post-compensation method. In the experiment, the key rate surpasses the linear key-rate bound via 302 km and 402 km commercial-fibre channels, achieving a key rate over 4 orders of magnitude higher than the existing results in literature. Furthermore, with a 502 km ultralow-loss fibre, our system yields a secret key rate of 0.118 bps. We expect this new type of QKD schemes to become a new standard for future QKD.
△ Less
Submitted 4 August, 2019;
originally announced August 2019.
-
Randomness quantification of coherent detection
Authors:
Hongyi Zhou,
Pei Zeng,
Mohsen Razavi,
Xiongfeng Ma
Abstract:
Continuous-variable quantum cryptographic systems, including random number generation and key distribution, are often based on coherent detection. The essence of the security analysis lies in the randomness quantification. Previous analyses employ a semi-quantum picture, where the strong local oscillator limit is assumed. Here, we investigate the randomness of homodyne detection in a full quantum…
▽ More
Continuous-variable quantum cryptographic systems, including random number generation and key distribution, are often based on coherent detection. The essence of the security analysis lies in the randomness quantification. Previous analyses employ a semi-quantum picture, where the strong local oscillator limit is assumed. Here, we investigate the randomness of homodyne detection in a full quantum scenario by accounting for the shot noise in the local oscillator, which requires us to develop randomness measures in the infinite-dimensional scenario. Similar to the finite-dimensional case, our introduced measure of randomness corresponds to the relative entropy of coherence defined for an infinite-dimensional system. Our results are applicable to general coherent detection systems, in which the local oscillator is inevitably of finite power. As an application example, we employ the analysis method to a practical vacuum-fluctuation quantum random number generator and explore the limits of generation rate given a continuous-wave laser.
△ Less
Submitted 21 July, 2018;
originally announced July 2018.
-
Phase-Matching Quantum Key Distribution
Authors:
Xiongfeng Ma,
Pei Zeng,
Hongyi Zhou
Abstract:
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information carrier can be easily lost in the channel. For all the current implementations, the key rate is bounded by the channel transmission probability,…
▽ More
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information carrier can be easily lost in the channel. For all the current implementations, the key rate is bounded by the channel transmission probability, $η$. Rather surprisingly, by matching the phases of two coherent states and encoding the key information into the common phase, this linear key-rate constraint can be overcome---the secure key rate scales with the square root of the transmission probability, $O(\sqrtη)$, as proposed in twin-field quantum key distribution [Nature (London) 557, 400 (2018)]. To achieve this, we develop an optical-mode-based security proof that is different from the conventional qubit-based security proofs. Furthermore, the proposed scheme is measurement device independent, i.e., it is immune to all possible detection attacks. The simulation result shows that the key rate can even exceed the transmission probability $η$ between two communication parties. In addition, we apply phase postcompensation to devise a practical version of the scheme without phase locking, which makes the proposed scheme feasible with the current technology. This means that quantum key distribution can enjoy both sides of the world---practicality and security.
△ Less
Submitted 23 April, 2019; v1 submitted 14 May, 2018;
originally announced May 2018.
-
Towards practical high-speed high dimensional quantum key distribution using partial mutual unbiased basis of photon's orbital angular momentum
Authors:
Fumin Wang,
Pei Zeng,
Xiaoli Wang,
Hong Gao,
Fuli Li,
Pei Zhang
Abstract:
Quantum Key Distribution (QKD) guarantees the security of communication with quantum physics. Most of widely adopted QKD protocols currently encode the key information with binary signal format---qubit, such as the polarization states. Therefore the transmitted information efficiency of the quantum key is intrinsically upper bounded by 1 bit per photon. High dimensional quantum system is a potenti…
▽ More
Quantum Key Distribution (QKD) guarantees the security of communication with quantum physics. Most of widely adopted QKD protocols currently encode the key information with binary signal format---qubit, such as the polarization states. Therefore the transmitted information efficiency of the quantum key is intrinsically upper bounded by 1 bit per photon. High dimensional quantum system is a potential candidate for increasing the capacity of single photon. However, due to the difficulty in manipulating and measuring high dimensional quantum systems, the experimental high dimensional QKD is still at its infancy. Here we propose a sort of practical high-speed high dimensional QKD using partial mutual unbiased basis (PMUB) of photon's orbital angular momentum (OAM). Different from the previous OAM encoding, the high dimensional Hilbert space we used is expanded by the OAM states with same mode order, which can be extended to considerably high dimensions and implemented under current state of the art. Because all the OAM states are in the same mode order, the coherence will be well kept after long-distance propagation, and the detection can be achieved by using passive linear optical elements with very high speed. We show that our protocol has high key generation rate and analyze the anti-noise ability under atmospheric turbulence. Furthermore, the security of our protocol based on PMUB is rigorously proved. Our protocol paves a brand new way for the application of photon's OAM in high dimensional QKD field, which can be a breakthrough for high efficiency quantum communications.
△ Less
Submitted 19 January, 2018;
originally announced January 2018.