scispace - formally typeset
Search or ask a question

Showing papers by "Andreas Winter published in 2008"


Journal ArticleDOI
TL;DR: This paper advocates a unified approach to an important class of problems in quantum Shannon theory, consisting of those that are bipartite, unidirectional, and memoryless.
Abstract: Quantum Shannon theory is loosely defined as a collection of coding theorems, such as classical and quantum source compression, noisy channel coding theorems, entanglement distillation, etc., which characterize asymptotic properties of quantum and classical channels and states. In this paper, we advocate a unified approach to an important class of problems in quantum Shannon theory, consisting of those that are bipartite, unidirectional, and memoryless.

239 citations


Journal ArticleDOI
TL;DR: A short proof that the coherent information is an achievable rate for the transmission of quantum information through a noisy quantum channel and a modification yielding unitarily invariant ensembles of maximally entangled codes is given.
Abstract: We give a short proof that the coherent information is an achievable rate for the transmission of quantum information through a noisy quantum channel. Our method is to produce random codes by performing a unitarily covariant projective measurement on a typical subspace of a tensor power state. We show that, provided the rank of each measurement operator is sufficiently small, the transmitted data will, with high probability, be decoupled from the channel environment. We also show that our construction leads to random codes whose average input is close to a product state and outline a modification yielding unitarily invariant ensembles of maximally entangled codes.

188 citations


Journal ArticleDOI
TL;DR: For all p > 1, the existence of quantum channels with non-multiplicative maximal output p-norms has been shown in this paper, where the violations are large; in all cases, the minimum output Renyi entropy of order p for a product channel need not be significantly greater than the minimum entropy of its individual factors.
Abstract: For all p > 1, we demonstrate the existence of quantum channels with non-multiplicative maximal output p-norms. Equivalently, for all p > 1, the minimum output Renyi entropy of order p of a quantum channel is not additive. The violations found are large; in all cases, the minimum output Renyi entropy of order p for a product channel need not be significantly greater than the minimum output entropy of its individual factors. Since p = 1 corresponds to the von Neumann entropy, these counterexamples demonstrate that if the additivity conjecture of quantum information theory is true, it cannot be proved as a consequence of any channel-independent guarantee of maximal p-norm multiplicativity. We also show that a class of channels previously studied in the context of approximate encryption lead to counterexamples for all p > 2.

162 citations


Journal ArticleDOI
TL;DR: A regularized formula for the entanglement-assisted (EA) capacity region for quantum multiple-access channels (QMAC) is found and the Holevo-Schumacher-Westmoreland theorem may be obtained from a modification of the EA protocol.
Abstract: We find a regularized formula for the entanglement-assisted (EA) capacity region for quantum multiple-access channels (QMAC). We illustrate the capacity region calculation with the example of the collective phase-flip channel which admits a single-letter characterization. On the way, we provide a first-principles proof of the EA coding theorem based on a packing argument. We observe that the Holevo-Schumacher-Westmoreland theorem may be obtained from a modification of our EA protocol. We remark on the existence of a family hierarchy of protocols for multiparty scenarios with a single receiver, in analogy to the two-party case. In this way, we relate several previous results regarding QMACs.

138 citations


Journal ArticleDOI
TL;DR: For all p > 1, it is demonstrated the existence of quantum channels with non-multiplicative maximal output p-norms, and a class of channels previously studied in the context of approximate encryption lead to counterexamples for all p > 2.
Abstract: For all p > 1, we demonstrate the existence of quantum channels with non-multiplicative maximal output p-norms. Equivalently, for all p >1, the minimum output Renyi entropy of order p of a quantum channel is not additive. The violations found are large; in all cases, the minimum output Renyi entropy of order p for a product channel need not be significantly greater than the minimum output entropy of its individual factors. Since p=1 corresponds to the von Neumann entropy, these counterexamples demonstrate that if the additivity conjecture of quantum information theory is true, it cannot be proved as a consequence of any channel-independent guarantee of maximal p-norm multiplicativity. We also show that a class of channels previously studied in the context of approximate encryption lead to counterexamples for all p > 2.

122 citations


Journal ArticleDOI
TL;DR: An upper bound for the quantum channel capacity that is both additive and convex is presented and seems to be quite tight, and for degradable quantum channels, it coincides with the unassisted channel capacity.
Abstract: In this paper, we present an upper bound for the quantum channel capacity that is both additive and convex. Our bound can be interpreted as the capacity of a channel for high-fidelity quantum communication when assisted by a family of channels that have no capacity on their own. This family of assistance channels, which we call symmetric side channels, consists of all channels mapping symmetrically to their output and environment. The bound seems to be quite tight, and for degradable quantum channels, it coincides with the unassisted channel capacity. Using this symmetric side channel capacity, we find new upper bounds on the capacity of the depolarizing channel. We also briefly indicate an analogous notion for distilling entanglement using the same class of (one-way) channels, yielding one of the few entanglement measures that is monotonic under local operations with one-way classical communication (1-LOCC), but not under the more general class of local operations with classical communication (LOCC).

103 citations


Journal ArticleDOI
TL;DR: Hayden et al. as mentioned in this paper considered the question of how large a subspace of a given bipartite quantum system can be when the subspace contains only highly entangled states.
Abstract: We consider the question of how large a subspace of a given bipartite quantum system can be when the subspace contains only highly entangled states This is motivated in part by results of Hayden et al [e-print arXiv:quant-ph∕0407049; Commun Math Phys, 265, 95 (2006)], which show that in large d×d-dimensional systems there exist random subspaces of dimension almost d2, all of whose states have entropy of entanglement at least logd−O(1) It is also a generalization of results on the dimension of completely entangled subspaces, which have connections with the construction of unextendible product bases Here we take as entanglement measure the Schmidt rank, and determine, for every pair of local dimensions dA and dB, and every r, the largest dimension of a subspace consisting only of entangled states of Schmidt rank r or larger This exact answer is a significant improvement on the best bounds that can be obtained using the random subspace techniques in Hayden et al We also determine the converse: the l

94 citations


Journal ArticleDOI
TL;DR: It is shown that genuine multiparty quantum correlations can exist on its own, without a supporting background of genuine multipartite classical correlations, even in macroscopic systems.
Abstract: We show that genuine multiparty quantum correlations can exist on its own, without a supporting background of genuine multiparty classical correlations, even in macroscopic systems. Such possibilities can have important implications in the physics of quantum information and phase transitions.

85 citations


Journal ArticleDOI
TL;DR: This paper characterize which noisy channels/distributions are useful for obtaining oblivious transfer from noisy resources and introduces the problem of computing the oblivious-transfer capacity of a noisy resource, which measures the optimal way of implementing OT from a noisy channel/distribution.
Abstract: In this paper, we deal with the task of obtaining oblivious transfer (OT) from noisy resources. We characterize which noisy channels/distributions are useful for obtaining OT. We also introduce the problem of computing the oblivious-transfer capacity of a noisy resource, which measures the optimal way of implementing OT from a noisy channel/distribution. We show that for honest-but-curious sender, the oblivious-transfer capacity of noisy resources is strictly positive. Several open questions are raised.

74 citations


Journal ArticleDOI
TL;DR: It is demonstrated here by a careful random selection argument that also at p = 0, and consequently for sufficiently small p, there exist counterexamples of additivity, and conjecture however that violations ofAdditivity exist for all p < 1.
Abstract: Complementing recent progress on the additivity conjecture of quantum information theory, showing that the minimum output p-Renyi entropies of channels are not generally additive for p > 1, we demonstrate here by a careful random selection argument that also at p = 0, and consequently for sufficiently small p, there exist counterexamples.

55 citations


Journal ArticleDOI
TL;DR: This work shows that sufficient unbiasedness for a set of binary observables is good enough to obtain maximally strong uncertainty relations in terms of the Shannon entropy, and proves nearly optimal relations for the collision entropy.
Abstract: Uncertainty relations provide one of the most powerful formulations of the quantum mechanical principle of complementarity. Yet, very little is known about such uncertainty relations for more than two measurements. Here, we show that sufficient unbiasedness for a set of binary observables, in the sense of mutual anticommutation, is good enough to obtain maximally strong uncertainty relations in terms of the Shannon entropy. We also prove nearly optimal relations for the collision entropy. This is the first systematic and explicit approach to finding an arbitrary number of measurements for which we obtain maximally strong uncertainty relations. Our results have immediate applications to quantum cryptography.

Journal ArticleDOI
TL;DR: In this article, the authors introduce a new state discrimination problem in which we are given additional information about the state after the measurement, or more generally after a quantum memory bound applies.
Abstract: We introduce a new state discrimination problem in which we are given additional information about the state after the measurement, or more generally, after a quantum memory bound applies. The following special case plays an important role in quantum cryptographic protocols in the bounded storage model: Given a string x encoded in an unknown basis chosen from a set of mutually unbiased bases (MUBs), you may perform any measurement, but then store at most q qubits of quantum information, and an unlimited amount of classical information. Later on, you learn which basis was used. How well can you compute a function f(x) of x, given the initial measurement outcome, the q qubits, and the additional basis information? We first show a lower bound on the success probability for any balanced function, and any number of mutually unbiased bases, beating the naive strategy of simply guessing the basis. We then show that for two bases, any Boolean function f(x) can be computed perfectly if you are allowed to store just a single qubit, independent of the number of possible input strings x. However, we show how to construct three bases, such that you need to store all qubits in order to compute f(x) perfectly. We then investigate how much advantage the additional basis information can give for a Boolean function. To this end, we prove optimal bounds for the success probability for the AND and the XOR function for up to three mutually unbiased bases. Our result shows that the gap in success probability can be maximal: without the basis information, you can never do better than guessing the basis, but with this information, you can compute f(x) perfectly. We also give an example where the extra information does not give any advantage at all.

Journal ArticleDOI
TL;DR: Using random Gaussian vectors and an information-uncertainty relation, this paper showed that the coherent information is an achievable rate for entanglement transmission through a noisy quantum channel.
Abstract: Using random Gaussian vectors and an information-uncertainty relation, we give a proof that the coherent information is an achievable rate for entanglement transmission through a noisy quantum channel. The codes are random subspaces selected according to the Haar measure, but distorted as a function of the sender's input density operator. Using large deviations techniques, we show that classical data transmitted in either of two Fourier-conjugate bases for the coding subspace can be decoded with low probability of error. A recently discovered information-uncertainty relation then implies that the quantum mutual information for entanglement encoded into the subspace and transmitted through the channel will be high. The monogamy of quantum correlations finally implies that the environment of the channel cannot be significantly coupled to the entanglement which, concluding, ensures the existence of a decoding by the receiver.

Journal ArticleDOI
TL;DR: In this paper, the authors introduced the notion of non-malleability of quantum state encryption in dimension d and showed that such a scheme is equivalent to a unitary 2-design.
Abstract: We introduce the notion of "non-malleability" of a quantum state encryption scheme (in dimension d): in addition to the requirement that an adversary cannot learn information about the state, here we demand that no controlled modification of the encrypted state can be effected. We show that such a scheme is equivalent to a "unitary 2-design" [Dankert et al.], as opposed to normal encryption which is a unitary 1-design. Our other main results include a new proof of the lower bound of (d^2-1)^2+1 on the number of unitaries in a 2-design [Gross et al.], which lends itself to a generalization to approximate 2-design. Furthermore, while in prime power dimension there is a unitary 2-design with =< d^5 elements, we show that there are always approximate 2-designs with O(epsilon^{-2} d^4 log d) elements.

Journal ArticleDOI
TL;DR: In this paper, the authors studied the entanglement properties of thermal states of quantum harmonic oscillator systems as functions of the Hamiltonian and the temperature and proved the physical intuition that at sufficiently high temperatures the thermal state becomes fully separable and deduced bounds on the critical temperature at which this happens.
Abstract: In the present paper we study the entanglement properties of thermal (a.k.a. Gibbs) states of quantum harmonic oscillator systems as functions of the Hamiltonian and the temperature. We prove the physical intuition that at sufficiently high temperatures the thermal state becomes fully separable and we deduce bounds on the critical temperature at which this happens. We show that the bound becomes tight for a wide class of Hamiltonians with sufficient translation symmetry. We find, that at the crossover the thermal energy is of the order of the energy of the strongest normal mode of the system and quantify the degree of entanglement below the critical temperature. Finally, we discuss the example of a ring topology in detail and compare our results with previous work in an entanglement-phase diagram.

Journal ArticleDOI
TL;DR: In this paper, the authors consider the problem of computing the best possible constants of domination for the norms corresponding to various restricted sets of measurements, thereby determining the worst case and best case performance of these sets relative to the set of all measurements.
Abstract: Every sufficiently rich set of measurements on a fixed quantum system defines a statistical norm on the states of that system via the optimal bias that can be achieved in distinguishing the states using measurements from that set (assuming equal priors). The Holevo-Helstrom theorem says that for the set of all measurements this norm is the trace norm. For finite dimension any norm is lower and upper bounded by constant (though dimension dependent) multiples of the trace norm, so we set ourselves the task of computing or bounding the best possible "constants of domination" for the norms corresponding to various restricted sets of measurements, thereby determining the worst case and best case performance of these sets relative to the set of all measurements. We look at the case where the allowed set consists of a single measurement, namely the uniformly random continuous POVM and its approximations by 2-designs and 4-designs respectively. Here we find asymptotically tight bounds for the constants of domination. Furthermore, we analyse the multipartite setting with any LOCC measurement allowed. In the case of two parties, we show that the lower domination constant is the same as that of a tensor product of local uniformly random POVMs (up to a constant). This answers in the affirmative an open question about the (near-)optimality of bipartite data hiding: The bias that can be achieved by LOCC in discriminating two orthogonal states of a d x d bipartite system is Omega(1/d), which is known to be tight. Finally, we use our analysis to derive certainty relations (in the sense of Sanchez-Ruiz) for any such measurements and to lower bound the locally accessible information for bipartite systems.

Journal ArticleDOI
TL;DR: In this paper, a necessary and sufficient condition for bipartite pure-state transformations by partial transpose operations is given. But the condition is only applicable to the case where the final state has Schmidt rank 3.
Abstract: Motivated by the desire to better understand the class of quantum operations on bipartite systems that completely preserve positivity of partial transpose (PPT operations) and its relation to the class LOCC (local operations and classical communication), we present some results on deterministic bipartite pure-state transformations by PPT operations. Restricting our attention to the case in which we start with a rank $\mathit{K}$ maximally entangled state, we give a necessary condition for transforming it into a given pure state, which we show is also sufficient when $\mathit{K}$ is 2 and the final state has Schmidt rank 3. We show that it is sufficient for all $\mathit{K}$ and all final states provided a conjecture about a certain family of semidefinite programs is true. We also demonstrate that the phenomenon of catalysis can occur under PPT operations and that, unlike LOCC catalysis, a maximally entangled state can be a catalyst. Finally, we give a necessary and sufficient condition for the possibility of transforming a rank $\mathit{K}$ maximally entangled state to an arbitrary pure state by PPT operations assisted by some maximally entangled catalyst.

Journal ArticleDOI
TL;DR: In this article, direct quantum coding theorem for random quantum codes is proved for a large class of quantum codes, where only privacy has to be checked. But the problem is separated into two parts: proof of distinguishability of codewords by receiver, and of indistinguishability of codewords by environment (privacy).
Abstract: We prove direct quantum coding theorem for random quantum codes. The problem is separated into two parts: proof of distinguishability of codewords by receiver, and of indistinguishability of codewords by environment (privacy). For a large class of codes, only privacy has to be checked.

Proceedings ArticleDOI
05 May 2008
TL;DR: This work determines the optimal error probability and measurement to discriminate many copies of particular data hiding states (extremal d times d Werner states) by a linear programming approach and puts a lower bound on the bias with which states can be distinguished by separable operations.
Abstract: Motivated by the recent discovery of a quantum Chernoff theorem for asymptotic state discrimination, we investigate the distinguishability of two bipartite mixed states under the constraint of local operations and classical communication (LOCC), in the limit of many copies. While for two pure states a result of Walgate et al. shows that LOCC is just as powerful as global measurements, data hiding states (DiVincenzo et al.) show that locality can impose severe restrictions on the distinguishability of even orthogonal states. Here we determine the optimal error probability and measurement to discriminate many copies of particular data hiding states (extremal d times d Werner states) by a linear programming approach. Surprisingly, the single-copy optimal measurement remains optimal for n copies, in the sense that the best strategy is measuring each copy separately, followed by a simple classical decision rule. We also put a lower bound on the bias with which states can be distinguished by separable operations. This is a shortened version of a paper [1] recently submitted to Communications in Mathematical Physics; here the proofs have been omitted.

Posted Content
TL;DR: A computable criterion is introduced which certifies that a probability dis-tribution between two honest parties and an eavesdropper cannot be (asymptotically)distilled into a secret key.
Abstract: Within entanglement theory there are criteria which certify that some quantum states cannot be distilled into pure entanglement. An example is the positive partial transposition criterion. Here we present, for the first time, the analogous thing for secret correlations. We introduce a computable criterion which certifies that a probability distribution between two honest parties and an eavesdropper cannot be (asymptotically) distilled into a secret key. The existence of non-distillable correlations with positive secrecy cost, also known as bound information, is an open question. This criterion may be the key for finding bound information. However, if it turns out that this criterion does not detect bound information, then, a very interesting consequence follows: any distribution with positive secrecy cost can increase the secrecy content of another distribution. In other words, all correlations with positive secrecy cost constitute a useful resource.

Posted Content
28 Jan 2008
TL;DR: In this paper, a necessary and sufficient condition for bipartite pure state transformations by partial transpose operations is given. But it is not shown how to transform a rank K maximally entangled state to an arbitrary pure state assisted by a catalyst.
Abstract: Motivated by the desire to better understand the class of quantum operations on bipartite systems that preserve positivity of partial transpose (PPT operations) and its relation to the class LOCC (local operations and classical communication), we present some results on deterministic bipartite pure state transformations by PPT operations. Restricting our attention to the case where we start with a rank K maximally entangled state, we give a necessary condition for transforming it into a given pure state, which we show is also sufficient when K is two and the final state has Schmidt rank three. We show that it is sufficient for all K and all final states provided a conjecture about a certain family of semidefinite programs is true. We also demonstrate that the phenomenon of catalysis can occur under PPT operations and that, unlike LOCC catalysis, a maximally entangled state can be a catalyst. Finally, we give a necessary and sufficient condition for the possibility of transforming a rank K maximally entangled state to an arbitrary pure state by PPT operations assisted by some maximally entangled catalyst.

01 Jan 2008
TL;DR: This paper advocates a unified approach to an important class of problems in quantum Shannon theory, consisting of those that are bipartite, unidirectional, and memoryless, and develops the rules of a resource calculus which allows us to manipulate and combine resource inequalities.
Abstract: Quantum Shannon theory is loosely defined as a collection of coding theorems, such as classical and quantum source compression, noisy channel coding theorems, entangle- ment distillation, etc., which characterize asymptotic properties of quantum and classical channels and states. In this paper, we advocate a unified approach to an important class of problems in quantum Shannon theory, consisting of those that are bipartite, unidirectional, and memoryless. We formalize two principles that have long been tacitly under- stood. First, we describe how the Church of the larger Hilbert space allows us to move flexibly between states, channels, en- sembles, and their purifications. Second, we introduce finite and asymptotic (quantum) information processing resources as the basic objects of quantum Shannon theory and recast the protocols used in direct coding theorems as inequalities between resources. We develop the rules of a resource calculus which allows us to manipulate and combine resource inequalities. This framework simplifies many coding theorem proofs and provides structural insights into the logical dependencies among coding theorems. We review the above-mentioned basic coding results and show howasubsetofthemcanbeunifiedintoafamilyofrelatedresource inequalities. Finally, we use this family to find optimal tradeoff curves for all protocols involving one noisy quantum resource and two noiseless ones.