1,629 research outputs found

    Estimating the Information Rate of a Channel with Classical Input and Output and a Quantum State (Extended Version)

    Full text link
    We consider the problem of transmitting classical information over a time-invariant channel with memory. A popular class of time-invariant channels with memory are finite-state-machine channels, where a \emph{classical} state evolves over time and governs the relationship between the classical input and the classical output of the channel. For such channels, various techniques have been developed for estimating and bounding the information rate. In this paper we consider a class of time-invariant channels where a \emph{quantum} state evolves over time and governs the relationship between the classical input and the classical output of the channel. We propose algorithms for estimating and bounding the information rate of such channels. In particular, we discuss suitable graphical models for doing the relevant computations.Comment: This is an extended version of a paper that appears in Proc. 2017 IEEE International Symposium on Information Theory, Aachen, Germany, June 201

    Bounding and Estimating the Classical Information Rate of Quantum Channels with Memory

    Full text link
    We consider the scenario of classical communication over a finite-dimensional quantum channel with memory using a separable-state input ensemble and local output measurements. We propose algorithms for estimating the information rate of such communication setups, along with algorithms for bounding the information rate based on so-called auxiliary channels. Some of the algorithms are extensions of their counterparts for (classical) finite-state-machine channels. Notably, we discuss suitable graphical models for doing the relevant computations. Moreover, the auxiliary channels are learned in a data-driven approach; i.e., only input/output sequences of the true channel are needed, but not the channel model of the true channel.Comment: This work has been submitted to the IEEE Transactions on Information Theory for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Factor Graphs for Quantum Information Processing

    Full text link
    [...] In this thesis, we are interested in generalizing factor graphs and the relevant methods toward describing quantum systems. Two generalizations of classical graphical models are investigated, namely double-edge factor graphs (DeFGs) and quantum factor graphs (QFGs). Conventionally, a factor in a factor graph represents a nonnegative real-valued local functions. Two different approaches to generalize factors in classical factor graphs yield DeFGs and QFGs, respectively. We proposed/re-proposed and analyzed generalized versions of belief-propagation algorithms for DeFGs/QFGs. As a particular application of the DeFGs, we investigate the information rate and their upper/lower bounds of classical communications over quantum channels with memory. In this study, we also propose a data-driven method for optimizing the upper/lower bounds on information rate.Comment: This is the finial version of the thesis of Michael X. Cao submitted in April 2021 in partial fulfillment of the requirements for the degree of doctor of philosophy in information engineering at the Chinese university of Hong Kon

    Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

    Full text link
    The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous paper (Boyer, Gelles, and Mor, 2009), but it avoids the classical information-theoretical analysis that caused problems with composability. We show that this modified BB84 protocol is as secure against collective attacks as the original BB84 protocol, and that it requires more bits for testing.Comment: 6 pages; 1 figur

    Quantum logarithmic Sobolev inequalities and rapid mixing

    Get PDF
    A family of logarithmic Sobolev inequalities on finite dimensional quantum state spaces is introduced. The framework of non-commutative \bL_p-spaces is reviewed and the relationship between quantum logarithmic Sobolev inequalities and the hypercontractivity of quantum semigroups is discussed. This relationship is central for the derivation of lower bounds for the logarithmic Sobolev (LS) constants. Essential results for the family of inequalities are proved, and we show an upper bound to the generalized LS constant in terms of the spectral gap of the generator of the semigroup. These inequalities provide a framework for the derivation of improved bounds on the convergence time of quantum dynamical semigroups, when the LS constant and the spectral gap are of the same order. Convergence bounds on finite dimensional state spaces are particularly relevant for the field of quantum information theory. We provide a number of examples, where improved bounds on the mixing time of several semigroups are obtained; including the depolarizing semigroup and quantum expanders.Comment: Updated manuscript, 30 pages, no figure

    Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices

    Full text link
    Device independent quantum key distribution aims to provide a higher degree of security than traditional QKD schemes by reducing the number of assumptions that need to be made about the physical devices used. The previous proof of security by Pironio et al. applies only to collective attacks where the state is identical and independent and the measurement devices operate identically for each trial in the protocol. We extend this result to a more general class of attacks where the state is arbitrary and the measurement devices have no memory. We accomplish this by a reduction of arbitrary adversary strategies to qubit strategies and a proof of security for qubit strategies based on the previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits for clarit

    Fundamental And Practical Problems of QKD Security - the Actual and the Perceived Situation

    Full text link
    It is widely believed that quantum key distribution (QKD) has been proved unconditionally secure for realistic models applicable to various current experimental schemes. Here we summarize briefly why this is not the case, from both the viewpoints of fundamental quantitative security and applicable models of security analysis, with some morals drawn.Comment: This paper is being revised. It will appear later. 14 pages, 2 figure
    • …
    corecore