1,839 research outputs found

    On Weak Odd Domination and Graph-based Quantum Secret Sharing

    Full text link
    A weak odd dominated (WOD) set in a graph is a subset B of vertices for which there exists a distinct set of vertices C such that every vertex in B has an odd number of neighbors in C. We point out the connections of weak odd domination with odd domination, [sigma,rho]-domination, and perfect codes. We introduce bounds on \kappa(G), the maximum size of WOD sets of a graph G, and on \kappa'(G), the minimum size of non WOD sets of G. Moreover, we prove that the corresponding decision problems are NP-complete. The study of weak odd domination is mainly motivated by the design of graph-based quantum secret sharing protocols: a graph G of order n corresponds to a secret sharing protocol which threshold is \kappa_Q(G) = max(\kappa(G), n-\kappa'(G)). These graph-based protocols are very promising in terms of physical implementation, however all such graph-based protocols studied in the literature have quasi-unanimity thresholds (i.e. \kappa_Q(G)=n-o(n) where n is the order of the graph G underlying the protocol). In this paper, we show using probabilistic methods, the existence of graphs with smaller \kappa_Q (i.e. \kappa_Q(G)< 0.811n where n is the order of G). We also prove that deciding for a given graph G whether \kappa_Q(G)< k is NP-complete, which means that one cannot efficiently double check that a graph randomly generated has actually a \kappa_Q smaller than 0.811n.Comment: Subsumes arXiv:1109.6181: Optimal accessing and non-accessing structures for graph protocol

    Optimal accessing and non-accessing structures for graph protocols

    Full text link
    An accessing set in a graph is a subset B of vertices such that there exists D subset of B, such that each vertex of V\B has an even number of neighbors in D. In this paper, we introduce new bounds on the minimal size kappa'(G) of an accessing set, and on the maximal size kappa(G) of a non-accessing set of a graph G. We show strong connections with perfect codes and give explicitly kappa(G) and kappa'(G) for several families of graphs. Finally, we show that the corresponding decision problems are NP-Complete

    New Protocols and Lower Bound for Quantum Secret Sharing with Graph States

    Full text link
    We introduce a new family of quantum secret sharing protocols with limited quantum resources which extends the protocols proposed by Markham and Sanders and by Broadbent, Chouha, and Tapp. Parametrized by a graph G and a subset of its vertices A, the protocol consists in: (i) encoding the quantum secret into the corresponding graph state by acting on the qubits in A; (ii) use a classical encoding to ensure the existence of a threshold. These new protocols realize ((k,n)) quantum secret sharing i.e., any set of at least k players among n can reconstruct the quantum secret, whereas any set of less than k players has no information about the secret. In the particular case where the secret is encoded on all the qubits, we explore the values of k for which there exists a graph such that the corresponding protocol realizes a ((k,n)) secret sharing. We show that for any threshold k> n-n^{0.68} there exists a graph allowing a ((k,n)) protocol. On the other hand, we prove that for any k< 79n/156 there is no graph G allowing a ((k,n)) protocol. As a consequence there exists n_0 such that the protocols introduced by Markham and Sanders admit no threshold k when the secret is encoded on all the qubits and n>n_0

    Parametrized Complexity of Weak Odd Domination Problems

    Full text link
    Given a graph G=(V,E)G=(V,E), a subset BVB\subseteq V of vertices is a weak odd dominated (WOD) set if there exists DVBD \subseteq V {\setminus} B such that every vertex in BB has an odd number of neighbours in DD. κ(G)\kappa(G) denotes the size of the largest WOD set, and κ(G)\kappa'(G) the size of the smallest non-WOD set. The maximum of κ(G)\kappa(G) and Vκ(G)|V|-\kappa'(G), denoted κQ(G)\kappa_Q(G), plays a crucial role in quantum cryptography. In particular deciding, given a graph GG and k>0k>0, whether κQ(G)k\kappa_Q(G)\le k is of practical interest in the design of graph-based quantum secret sharing schemes. The decision problems associated with the quantities κ\kappa, κ\kappa' and κQ\kappa_Q are known to be NP-Complete. In this paper, we consider the approximation of these quantities and the parameterized complexity of the corresponding problems. We mainly prove the fixed-parameter intractability (W[1][1]-hardness) of these problems. Regarding the approximation, we show that κQ\kappa_Q, κ\kappa and κ\kappa' admit a constant factor approximation algorithm, and that κ\kappa and κ\kappa' have no polynomial approximation scheme unless P=NP.Comment: 16 pages, 5 figure

    Quantum network communication -- the butterfly and beyond

    Full text link
    We study the k-pair communication problem for quantum information in networks of quantum channels. We consider the asymptotic rates of high fidelity quantum communication between specific sender-receiver pairs. Four scenarios of classical communication assistance (none, forward, backward, and two-way) are considered. (i) We obtain outer and inner bounds of the achievable rate regions in the most general directed networks. (ii) For two particular networks (including the butterfly network) routing is proved optimal, and the free assisting classical communication can at best be used to modify the directions of quantum channels in the network. Consequently, the achievable rate regions are given by counting edge avoiding paths, and precise achievable rate regions in all four assisting scenarios can be obtained. (iii) Optimality of routing can also be proved in classes of networks. The first class consists of directed unassisted networks in which (1) the receivers are information sinks, (2) the maximum distance from senders to receivers is small, and (3) a certain type of 4-cycles are absent, but without further constraints (such as on the number of communicating and intermediate parties). The second class consists of arbitrary backward-assisted networks with 2 sender-receiver pairs. (iv) Beyond the k-pair communication problem, observations are made on quantum multicasting and a static version of network communication related to the entanglement of assistance.Comment: 15 pages, 17 figures. Final versio

    On the Minimum Degree up to Local Complementation: Bounds and Complexity

    Full text link
    The local minimum degree of a graph is the minimum degree reached by means of a series of local complementations. In this paper, we investigate on this quantity which plays an important role in quantum computation and quantum error correcting codes. First, we show that the local minimum degree of the Paley graph of order p is greater than sqrt{p} - 3/2, which is, up to our knowledge, the highest known bound on an explicit family of graphs. Probabilistic methods allows us to derive the existence of an infinite number of graphs whose local minimum degree is linear in their order with constant 0.189 for graphs in general and 0.110 for bipartite graphs. As regards the computational complexity of the decision problem associated with the local minimum degree, we show that it is NP-complete and that there exists no k-approximation algorithm for this problem for any constant k unless P = NP.Comment: 11 page

    Trade-offs in multi-party Bell inequality violations in qubit networks

    Full text link
    Two overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations of a few inequalities at once. Here we systematically study monogamy relations between correlation Bell inequalities both within quantum theory and under the sole assumption of no signalling. We first investigate the trade-offs in Bell violations arising from the uncertainty relation for complementary binary observables, and exhibit several network configurations in which a tight trade-off arises in this fashion. We then derive a tight trade-off relation which cannot be obtained from the uncertainty relation showing that it does not capture monogamy entirely. The results are extended to Bell inequalities involving different number of parties and find applications in device-independent secret sharing and device-independent randomness extraction. Although two multipartite Bell inequalities may be violated simultaneously, we show that genuine multi-party non-locality, as evidenced by a generalised Svetlichny inequality, does exhibit monogamy property. Finally, using the relations derived we reveal the existence of flat regions in the set of quantum correlations.Comment: 15 pages, 5 figure
    corecore