1,839 research outputs found
On Weak Odd Domination and Graph-based Quantum Secret Sharing
A weak odd dominated (WOD) set in a graph is a subset B of vertices for which
there exists a distinct set of vertices C such that every vertex in B has an
odd number of neighbors in C. We point out the connections of weak odd
domination with odd domination, [sigma,rho]-domination, and perfect codes. We
introduce bounds on \kappa(G), the maximum size of WOD sets of a graph G, and
on \kappa'(G), the minimum size of non WOD sets of G. Moreover, we prove that
the corresponding decision problems are NP-complete. The study of weak odd
domination is mainly motivated by the design of graph-based quantum secret
sharing protocols: a graph G of order n corresponds to a secret sharing
protocol which threshold is \kappa_Q(G) = max(\kappa(G), n-\kappa'(G)). These
graph-based protocols are very promising in terms of physical implementation,
however all such graph-based protocols studied in the literature have
quasi-unanimity thresholds (i.e. \kappa_Q(G)=n-o(n) where n is the order of the
graph G underlying the protocol). In this paper, we show using probabilistic
methods, the existence of graphs with smaller \kappa_Q (i.e. \kappa_Q(G)<
0.811n where n is the order of G). We also prove that deciding for a given
graph G whether \kappa_Q(G)< k is NP-complete, which means that one cannot
efficiently double check that a graph randomly generated has actually a
\kappa_Q smaller than 0.811n.Comment: Subsumes arXiv:1109.6181: Optimal accessing and non-accessing
structures for graph protocol
Optimal accessing and non-accessing structures for graph protocols
An accessing set in a graph is a subset B of vertices such that there exists
D subset of B, such that each vertex of V\B has an even number of neighbors in
D. In this paper, we introduce new bounds on the minimal size kappa'(G) of an
accessing set, and on the maximal size kappa(G) of a non-accessing set of a
graph G. We show strong connections with perfect codes and give explicitly
kappa(G) and kappa'(G) for several families of graphs. Finally, we show that
the corresponding decision problems are NP-Complete
New Protocols and Lower Bound for Quantum Secret Sharing with Graph States
We introduce a new family of quantum secret sharing protocols with limited
quantum resources which extends the protocols proposed by Markham and Sanders
and by Broadbent, Chouha, and Tapp. Parametrized by a graph G and a subset of
its vertices A, the protocol consists in: (i) encoding the quantum secret into
the corresponding graph state by acting on the qubits in A; (ii) use a
classical encoding to ensure the existence of a threshold. These new protocols
realize ((k,n)) quantum secret sharing i.e., any set of at least k players
among n can reconstruct the quantum secret, whereas any set of less than k
players has no information about the secret. In the particular case where the
secret is encoded on all the qubits, we explore the values of k for which there
exists a graph such that the corresponding protocol realizes a ((k,n)) secret
sharing. We show that for any threshold k> n-n^{0.68} there exists a graph
allowing a ((k,n)) protocol. On the other hand, we prove that for any k<
79n/156 there is no graph G allowing a ((k,n)) protocol. As a consequence there
exists n_0 such that the protocols introduced by Markham and Sanders admit no
threshold k when the secret is encoded on all the qubits and n>n_0
Parametrized Complexity of Weak Odd Domination Problems
Given a graph , a subset of vertices is a weak odd
dominated (WOD) set if there exists such that
every vertex in has an odd number of neighbours in . denotes
the size of the largest WOD set, and the size of the smallest
non-WOD set. The maximum of and , denoted
, plays a crucial role in quantum cryptography. In particular
deciding, given a graph and , whether is of
practical interest in the design of graph-based quantum secret sharing schemes.
The decision problems associated with the quantities , and
are known to be NP-Complete. In this paper, we consider the
approximation of these quantities and the parameterized complexity of the
corresponding problems. We mainly prove the fixed-parameter intractability
(W-hardness) of these problems. Regarding the approximation, we show that
, and admit a constant factor approximation
algorithm, and that and have no polynomial approximation
scheme unless P=NP.Comment: 16 pages, 5 figure
Quantum network communication -- the butterfly and beyond
We study the k-pair communication problem for quantum information in networks
of quantum channels. We consider the asymptotic rates of high fidelity quantum
communication between specific sender-receiver pairs. Four scenarios of
classical communication assistance (none, forward, backward, and two-way) are
considered. (i) We obtain outer and inner bounds of the achievable rate regions
in the most general directed networks. (ii) For two particular networks
(including the butterfly network) routing is proved optimal, and the free
assisting classical communication can at best be used to modify the directions
of quantum channels in the network. Consequently, the achievable rate regions
are given by counting edge avoiding paths, and precise achievable rate regions
in all four assisting scenarios can be obtained. (iii) Optimality of routing
can also be proved in classes of networks. The first class consists of directed
unassisted networks in which (1) the receivers are information sinks, (2) the
maximum distance from senders to receivers is small, and (3) a certain type of
4-cycles are absent, but without further constraints (such as on the number of
communicating and intermediate parties). The second class consists of arbitrary
backward-assisted networks with 2 sender-receiver pairs. (iv) Beyond the k-pair
communication problem, observations are made on quantum multicasting and a
static version of network communication related to the entanglement of
assistance.Comment: 15 pages, 17 figures. Final versio
On the Minimum Degree up to Local Complementation: Bounds and Complexity
The local minimum degree of a graph is the minimum degree reached by means of
a series of local complementations. In this paper, we investigate on this
quantity which plays an important role in quantum computation and quantum error
correcting codes. First, we show that the local minimum degree of the Paley
graph of order p is greater than sqrt{p} - 3/2, which is, up to our knowledge,
the highest known bound on an explicit family of graphs. Probabilistic methods
allows us to derive the existence of an infinite number of graphs whose local
minimum degree is linear in their order with constant 0.189 for graphs in
general and 0.110 for bipartite graphs. As regards the computational complexity
of the decision problem associated with the local minimum degree, we show that
it is NP-complete and that there exists no k-approximation algorithm for this
problem for any constant k unless P = NP.Comment: 11 page
Trade-offs in multi-party Bell inequality violations in qubit networks
Two overlapping bipartite binary input Bell inequalities cannot be
simultaneously violated as this would contradict the usual no-signalling
principle. This property is known as monogamy of Bell inequality violations and
generally Bell monogamy relations refer to trade-offs between simultaneous
violations of multiple inequalities. It turns out that multipartite Bell
inequalities admit weaker forms of monogamies that allow for violations of a
few inequalities at once. Here we systematically study monogamy relations
between correlation Bell inequalities both within quantum theory and under the
sole assumption of no signalling. We first investigate the trade-offs in Bell
violations arising from the uncertainty relation for complementary binary
observables, and exhibit several network configurations in which a tight
trade-off arises in this fashion. We then derive a tight trade-off relation
which cannot be obtained from the uncertainty relation showing that it does not
capture monogamy entirely. The results are extended to Bell inequalities
involving different number of parties and find applications in
device-independent secret sharing and device-independent randomness extraction.
Although two multipartite Bell inequalities may be violated simultaneously, we
show that genuine multi-party non-locality, as evidenced by a generalised
Svetlichny inequality, does exhibit monogamy property. Finally, using the
relations derived we reveal the existence of flat regions in the set of quantum
correlations.Comment: 15 pages, 5 figure
- …