32 research outputs found
Converse bounds for private communication over quantum channels
This paper establishes several converse bounds on the private transmission
capabilities of a quantum channel. The main conceptual development builds
firmly on the notion of a private state, which is a powerful, uniquely quantum
method for simplifying the tripartite picture of privacy involving local
operations and public classical communication to a bipartite picture of quantum
privacy involving local operations and classical communication. This approach
has previously led to some of the strongest upper bounds on secret key rates,
including the squashed entanglement and the relative entropy of entanglement.
Here we use this approach along with a "privacy test" to establish a general
meta-converse bound for private communication, which has a number of
applications. The meta-converse allows for proving that any quantum channel's
relative entropy of entanglement is a strong converse rate for private
communication. For covariant channels, the meta-converse also leads to
second-order expansions of relative entropy of entanglement bounds for private
communication rates. For such channels, the bounds also apply to the private
communication setting in which the sender and receiver are assisted by
unlimited public classical communication, and as such, they are relevant for
establishing various converse bounds for quantum key distribution protocols
conducted over these channels. We find precise characterizations for several
channels of interest and apply the methods to establish several converse bounds
on the private transmission capabilities of all phase-insensitive bosonic
channels.Comment: v3: 53 pages, 3 figures, final version accepted for publication in
IEEE Transactions on Information Theor
Converse bounds for private communication over quantum channels
© 1963-2012 IEEE. This paper establishes several converse bounds on the private transmission capabilities of a quantum channel. The main conceptual development builds firmly on the notion of a private state, which is a powerful, uniquely quantum method for simplifying the tripartite picture of privacy involving local operations and public classical communication to a bipartite picture of quantum privacy involving local operations and classical communication. This approach has previously led to some of the strongest upper bounds on secret key rates, including the squashed entanglement and the relative entropy of entanglement. Here, we use this approach along with a 'privacy test' to establish a general meta-converse bound for private communication, which has a number of applications. The meta-converse allows for proving that any quantum channel's relative entropy of entanglement is a strong converse rate for private communication. For covariant channels, the meta-converse also leads to second-order expansions of relative entropy of entanglement bounds for private communication rates. For such channels, the bounds also apply to the private communication setting in which the sender and the receiver are assisted by unlimited public classical communication, and as such, they are relevant for establishing various converse bounds for quantum key distribution protocols conducted over these channels. We find precise characterizations for several channels of interest and apply the methods to establish converse bounds on the private transmission capabilities of all phase-insensitive bosonic channels
Converse Bounds for Private Communication Over Quantum Channels
This paper establishes several converse bounds on the private transmission capabilities of a quantum channel. The main conceptual development builds firmly on the notion of a private state, which is a powerful, uniquely quantum method for simplifying the tripartite picture of privacy involving local operations and public classical communication to a bipartite picture of quantum privacy involving local operations and classical communication. This approach has previously led to some of the strongest upper bounds on secret key rates, including the squashed entanglement and the relative entropy of entanglement. Here, we use this approach along with a “privacy test” to establish a general meta-converse bound for private communication, which has a number of applications. The meta-converse allows for proving that any quantum channel’s relative entropy of entanglement is a strong converse rate for private communication. For covariant channels, the meta-converse also leads to second-order expansions of relative entropy of entanglement bounds for private communication rates. For such channels, the bounds also apply to the private communication setting in which the sender and the receiver are assisted by unlimited public classical communication, and as such, they are relevant for establishing various converse bounds for quantum key distribution protocols conducted over these channels. We find precise characterizations for several channels of interest and apply the methods to establish converse bounds on the private transmission capabilities of all phase-insensitive bosonic channels
Photonic Engineering for CV-QKD over Earth-Satellite Channels
Quantum Key Distribution (QKD) via satellite offers up the possibility of
unconditionally secure communications on a global scale. Increasing the secret
key rate in such systems, via photonic engineering at the source, is a topic of
much ongoing research. In this work we investigate the use of photon-added
states and photon-subtracted states, derived from two mode squeezed vacuum
states, as examples of such photonic engineering. Specifically, we determine
which engineered-photonic state provides for better QKD performance when
implemented over channels connecting terrestrial receivers with Low-Earth-Orbit
satellites. We quantify the impact the number of photons that are added or
subtracted has, and highlight the role played by the adopted model for
atmospheric turbulence and loss on the predicted key rates. Our results are
presented in terms of the complexity of deployment used, with the simplest
deployments ignoring any estimate of the channel, and the more sophisticated
deployments involving a feedback loop that is used to optimize the key rate for
each channel estimation. The optimal quantum state is identified for each
deployment scenario investigated.Comment: Updated reference lis
Optimal secure quantum teleportation of coherent states of light
We investigate quantum teleportation of ensembles of coherent states of light with a Gaussian distributed displacement in phase space. Recently, the following general question has been addressed in [P. Liuzzo-Scorpo et al., arXiv:1705.03017]: Given a limited amount of entanglement and mean energy available as resources, what is the maximal fidelity that can be achieved on average in the teleportation of such an alphabet of states? Here, we consider a variation of this question, where Einstein-Podolsky-Rosen steering is used as a resource rather than plain entanglement. We provide a solution by means of an optimisation within the space of Gaussian quantum channels, which allows for an intuitive visualisation of the problem. We first show that not all channels are accessible with a finite degree of steering, and then prove that practical schemes relying on asymmetric two-mode Gaussian states enable one to reach the maximal fidelity at the border with the inaccessible region. Our results provide a rigorous quantitative assessment of steering as a resource for secure quantum teleportation beyond the so-called no-cloning threshold. The schemes we propose can be readily implemented experimentally by a conventional Braunstein-Kimble continuous variable teleportation protocol involving homodyne detections and corrective displacements with an optimally tuned gain. These protocols can be integrated as elementary building blocks in quantum networks, for reliable storage and transmission of quantum optical states
Floodlight quantum key distribution: Demonstrating a framework for high-rate secure communication
Floodlight quantum key distribution (FL-QKD) is a radically different QKD paradigm that can achieve gigabit-per-second secret-key rates over metropolitan area distances without multiplexing [Q. Zhuang et al., Phys. Rev. A 94, 012322 (2016)]. It is a two-way protocol that transmits many photons per bit duration and employs a high-gain optical amplifier, neither of which can be utilized by existing QKD protocols, to mitigate channel loss. FL-QKD uses an optical bandwidth that is substantially larger than the modulation rate and performs decoding with a unique broadband homodyne receiver. Essential to FL-QKD is Alice's injection of photons from a photon-pair source—in addition to the light used for key generation—into the light she sends to Bob. This injection enables Alice and Bob to quantify Eve's intrusion and thus secure FL-QKD against collective attacks. Our proof-of-concept experiment included 10 dB propagation loss—equivalent to 50 km of low-loss fiber—and achieved a 55 Mbit/s secret-key rate (SKR) for a 100 Mbit/s modulation rate, as compared to the state-of-the-art system's 1 Mbit/s SKR for a 1 Gbit/s modulation rate [M. Lucamarini et al., Opt. Express 21, 24550 (2013)], representing ∼500-fold and ∼50 fold improvements in secret-key efficiency (bits per channel use) and SKR (bits per second), respectively.United States. Office of Naval Research (Grant N00014-13-1-0774)United States. Air Force Office of Scientific Research (Grant FA9550-14-1-0052)United States. Army Research Office (United States. Defense Advanced Research Projects Agency. Quiness Program. Grant W31P4Q-12-1-0019)United States. Office of Naval Research. Defense University Research Instrumentation Program (Grant N00014-14-1-0808
Quantum reading capacity: General definition and bounds
Quantum reading refers to the task of reading out classical information
stored in a read-only memory device. In any such protocol, the transmitter and
receiver are in the same physical location, and the goal of such a protocol is
to use these devices (modeled by independent quantum channels), coupled with a
quantum strategy, to read out as much information as possible from a memory
device, such as a CD or DVD. As a consequence of the physical setup of quantum
reading, the most natural and general definition for quantum reading capacity
should allow for an adaptive operation after each call to the channel, and this
is how we define quantum reading capacity in this paper. We also establish
several bounds on quantum reading capacity, and we introduce an
environment-parametrized memory cell with associated environment states,
delivering second-order and strong converse bounds for its quantum reading
capacity. We calculate the quantum reading capacities for some exemplary memory
cells, including a thermal memory cell, a qudit erasure memory cell, and a
qudit depolarizing memory cell. We finally provide an explicit example to
illustrate the advantage of using an adaptive strategy in the context of
zero-error quantum reading capacity.Comment: v3: 17 pages, 2 figures, final version published in IEEE Transactions
on Information Theor
Resonant Multilevel Amplitude Damping Channels
We introduce a new set of quantum channels: resonant multilevel amplitude
damping (ReMAD) channels. Among other instances, they can describe energy
dissipation effects in multilevel atomic systems induced by the interaction
with a zero-temperature bosonic environment. At variance with the already known
class of multilevel amplitude damping (MAD) channels, this new class of maps
allows the presence of an environment unable to discriminate transitions with
identical energy gaps. After characterizing the algebra of their composition
rules, by analyzing the qutrit case, we show that this new set of channels can
exhibit degradability and antidegradability in vast regions of the allowed
parameter space. There we compute their quantum capacity and private classical
capacity. We show that these capacities can be computed exactly also in regions
of the parameter space where the channels aren't degradable nor antidegradable