unbounded number of channel uses are required to see
play

Unbounded number of channel uses are required to see quantum - PowerPoint PPT Presentation

Introduction Two copies n copies Discussion Unbounded number of channel uses are required to see quantum capacity T. Cubitt, D. Elkouss, W. Matthews, M. Ozols, D. P erez-Garc a, S. Strelchuk University of Cambridge, Universidad


  1. Introduction Two copies n copies Discussion Unbounded number of channel uses are required to see quantum capacity T. Cubitt, D. Elkouss, W. Matthews, M. Ozols, D. P´ erez-Garc´ ıa, S. Strelchuk University of Cambridge, Universidad Complutense de Madrid Detecting quantum capacity Slide 1/25

  2. Introduction Two copies n copies Discussion Motivation 1 Does N have capacity? N 2 What is the capacity of N ? Classical Channel Quantum Channel Mutual information Coherent information Single use of the channel Unbounded number of channel uses Do we need to consider an unbounded number of channel uses to detect quantum capacity? Detecting quantum capacity Slide 2/25

  3. Introduction Two copies n copies Discussion Motivation Main result For any n, there exist a channel N , for which the coherent information is zero for n copies of the channel, but has with positive capacity. 0 0 − − + + I coh I coh N N Detecting quantum capacity Slide 3/25

  4. Introduction Two copies n copies Discussion Outline Introduction 1 Construction of N such that Q ( 1 ) ( N ) = 0 but Q ( N ) > 0 2 Construction of N such that Q ( n ) ( N ) = 0 but Q ( N ) > 0 3 Discussion 4 Detecting quantum capacity Slide 4/25

  5. Introduction Two copies n copies Discussion Outline Introduction 1 Construction of N such that Q ( 1 ) ( N ) = 0 but Q ( N ) > 0 2 Construction of N such that Q ( n ) ( N ) = 0 but Q ( N ) > 0 3 Discussion 4 Detecting quantum capacity Slide 5/25

  6. Introduction Two copies n copies Discussion Quantum Channels 101 Isometric representation N ( ρ ) = tr E ( V ρ V † ) N A B B V N A c E N N c ( ρ ) = tr B ( V ρ V † ) A E Channel-state duality A } Φ + I ⊗ N (Φ + ) B N Detecting quantum capacity Slide 6/25

  7. Introduction Two copies n copies Discussion Quantum Communications A ρ AA ′ C D B N Definition The capacity is the maximum rate at which arbitrarily faithful communication is possible. Detecting quantum capacity Slide 7/25

  8. Introduction Two copies n copies Discussion Quantum Capacity Coherent information (Nielsen-Schumacher ‘96): I coh ( N , ρ ) = H ( N ( ρ )) − H ( N c ( ρ )) Coherent information after n -uses of a channel: Q ( n ) ( N ) = 1 I coh ( N ⊗ n , ρ ) n max ρ Quantum capacity of a channel (Lloyd ‘97, Shor ‘02, Devetak ‘05) : n → ∞ Q ( n ) ( N ) Q ( N ) = lim Superadditivity of the coherent information (DiVincenzo-Shor-Smolin ’98): Q ( N ) > Q ( 1 ) ( N ) = 0 Detecting quantum capacity Slide 8/25

  9. Introduction Two copies n copies Discussion Other capacities Classical capacity (Hastings ‘09): C ( N ) > C ( 1 ) ( N ) Private capacity (Smith-Renes-Smolin ‘08): P ( N ) > P ( 1 ) ( N ) Classical zero-error capacity of a classical channel (Shannon ‘56): C 0 ( N ) > C ( 1 ) 0 ( N ) Quantum zero-error capacity of a quantum channel (Shirokov ‘14): ∀ n ∃ N ; Q ( n ) 0 ( N ) = 0, Q 0 ( N ) > 0 Detecting quantum capacity Slide 9/25

  10. Introduction Two copies n copies Discussion Outline Introduction 1 Construction of N such that Q ( 1 ) ( N ) = 0 but Q ( N ) > 0 2 Construction of N such that Q ( n ) ( N ) = 0 but Q ( N ) > 0 3 Discussion 4 Detecting quantum capacity Slide 10/25

  11. Introduction Two copies n copies Discussion Superactivation Theorem (Smith-Yard ‘08) There exist two zero-capacity channels E 1 / 2 , Γ s.t. Q ( E 1 / 2 ⊗ Γ ) > 0 . ‘You appear to be blind in your left eye and blind in your right eye. Why you can see with both eyes is beyond me. ..” (Oppenheim ‘08) Detecting quantum capacity Slide 11/25

  12. Introduction Two copies n copies Discussion Component channels Erasure channel E p ( ρ A ) := ( 1 − p ) ρ B + p | e �� e | B � � ∃ D ; D ◦ E c if p � 1 / 2 Q ( E p ) = 0 p = E p . E 1 / 2 is an erasure channel with p = 1 / 2 . PPT channel If the CJ of N has PPT then Q ( N ) = 0 (P. Horodecki-M. Horodecki-R. Horodecki ’00). Γ is a PPT channel with CJ close to a pbit. Detecting quantum capacity Slide 12/25

  13. Introduction Two copies n copies Discussion Pbits Definition A bipartite key ab : φ ab = | φ �� φ | ab , | φ � ab := 1 2 ( | 00 � + | 11 � ) ab ; √ A shield AB (dim A = dim B ) and state σ AB ; A pbit is a state of the form γ abAB := U � φ ab ⊗ σ AB � U † U is a global unitary of the form: � 1 i , j = 0 | i �� i | a ⊗ | j �� j | b ⊗ U AB ij . Properties � 1 If we trace AB and Bob dephases locally: γ ab = 1 i = 0 | ii �� ii | ab . 2 If Bob gets A he can “untwist” with a local unitary: ab become maximally entangled. Plan: Γ distributes pbits, E 1 / 2 is used to transmit the shield. Detecting quantum capacity Slide 13/25

  14. Introduction Two copies n copies Discussion Approximate pbits Theorem (K. Horodecki-M. Horodecki-P. Horodecki-Oppenheim ‘09) There exist PPT states arbitrarily close to a perfect pbit. Beginning with: ρ abAB = 1 | φ + �� φ + | ab ⊗ σ + AB + | φ − �� φ − | ab ⊗ σ − AB � � 2 γ abAB : obtain some ˜ Is PPT. Is ǫ -close to a perfect pbit. Remark γ abAB as CJ has zero capacity. The channel Γ with ˜ Detecting quantum capacity Slide 14/25

  15. Introduction Two copies n copies Discussion Proof of Smith-Yard Protocol Send one half of the maximally entangled state through Γ . Now Alice and Bob share a pbit (up to ǫ ) . Alice sends her part of the shield through E 1 / 2 . Evaluate for pbit, by continuity the result holds up to f ( ǫ ) . Coherent information With probability 1 2 , Bob gets the shield and he can untwist the pbit. With probability 1 2 , the channel erases (they are left with γ ab ). ˜ This yields Q ( 1 ) ( E 1 / 2 ⊗ Γ ) � 1 2 − f ( ǫ ) Detecting quantum capacity Slide 15/25

  16. Introduction Two copies n copies Discussion Switch channels Direct sum channels (Fukuda-Wolf ‘07) The control input is measured in C B 1 the computational basis The output of the measurement D N i B 2 “chooses” the channel applied to the data input Lemma (Fukuda-Wolf ‘07) � � � Q ( 1 ) Q ( 1 ) ( N i ) P i ⊗ N i = max i i Detecting quantum capacity Slide 16/25

  17. Introduction Two copies n copies Discussion Corollary: N such that Q ( 1 ) ( N ) = 0, Q ( N ) > 0 Channel N Take N 1 as the PPT channel C B 1 with CJ state arbitrarily close to a pbit ( Γ ) N i D B 2 Take N 2 = E 1 / 2 Proof Maximize coherent information of component channels. Clearly Q ( 1 ) ( N ) = 0. By taking N ⊗ N we have access to Γ ⊗ E 1 / 2 . Hence Q ( 2 ) ( N ) > 0. Detecting quantum capacity Slide 17/25

  18. Introduction Two copies n copies Discussion Outline Introduction 1 Construction of N such that Q ( 1 ) ( N ) = 0 but Q ( N ) > 0 2 Construction of N such that Q ( n ) ( N ) = 0 but Q ( N ) > 0 3 Discussion 4 Detecting quantum capacity Slide 18/25

  19. Introduction Two copies n copies Discussion Plan Use a switch with two component channels one can share a PPT pbit the other an erasure channel to send the shield. “Converse”: Q ( n ) = 0 Make pbit creation unreliable (Pr ( fail ) = κ ). Boost the erasure probability of the erasure channel. “Achievable”: Q > 0, via Q ( t + 1 ) > 0 for some t + 1 > n : Make the shield with t parts so that giving Bob any part of Alice’s shield unlocks the entanglement in the key. With the first use of channel (try to) establish this pbit between Alice and Bob. Send t pieces of the shield over t erasure channel uses. Probability that at least one piece gets through: 1 − p t . Detecting quantum capacity Slide 19/25

  20. Introduction Two copies n copies Discussion Channel C B 1 Take N 1 = E p Take N 2 as a noisy PPT-pbit channel (˜ D N i B 2 Γ κ ) where ˜ Γ κ := ( 1 − κ ) Γ + κ | e �� e | Requirement : even if we trace out all but one of the subsystems of the shield the reduced state should be close to a pbit. Proof similar to (K. Horodecki-M. Horodecki-P. Horodecki-Oppenheim ‘09). Detecting quantum capacity Slide 20/25

  21. Introduction Two copies n copies Discussion “Converse” Lemma (Converse) If κ ∈ ( 0, 1 ] , for p large enough Q ( n ) ( N ) = 0 . Proof. � � κ ⊗ E ⊗ ( n − l ) ˜ Restrict to Q ( 1 ) ( N i ) . Let I l := I coh Γ ⊗ l , ρ p I l � κ l p n − l (− S ( ρ l )) ( all erase ) +( 1 − κ l ) p n − l I coh ( Γ ⊗ l ⊗ E ⊗ n − l , ρ l ) ( all E p erase ) 1 +( 1 − p n − l ) S ( ρ l ) ( other cases ) I l � (− κ l p n − l + 1 − p n − l ) S ( ρ l ) � ( 1 − ( 1 + κ n ) p n ) S ( ρ l ) , We find that I l � 0 if p � ( 1 + κ n ) − 1 / n . Detecting quantum capacity Slide 21/25

  22. Introduction Two copies n copies Discussion “Achievability” Lemma (Achievability) For p ∈ ( 0, 1 ) , κ ∈ ( 0, 1 / 2 ) , there exists a channel N and t ∈ N such that Q ( t + 1 ) ( N ) > 0 . Protocol : Choose ˜ Γ κ for 1st use and (try) create pbit, choose E p for uses 2 . . . t + 1 and send Alice’s t parts of the shield. ( t + 1 ) Q ( t + 1 ) ( N ) � I coh ( ˜ Γ ⊗ E ⊗ t p , ρ ) � κ I coh ( E 1 ⊗ E ⊗ t p , ρ ) ( no pbit ) +( 1 − κ ) p t I coh ( Γ ⊗ E t 1 , ρ ) ( got a pbit but no shield ) +( 1 − κ )( 1 − p t ) I coh ( Γ ⊗ I ⊗ E t − 1 , ρ ) ( got a pbit + shield ) 1 � ( 1 − κ )( 1 − p t − f ( ǫ )) − κ Detecting quantum capacity Slide 22/25

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend