1,706 research outputs found
Quantum information with Gaussian states
Quantum optical Gaussian states are a type of important robust quantum states
which are manipulatable by the existing technologies. So far, most of the
important quantum information experiments are done with such states, including
bright Gaussian light and weak Gaussian light. Extending the existing results
of quantum information with discrete quantum states to the case of continuous
variable quantum states is an interesting theoretical job. The quantum Gaussian
states play a central role in such a case. We review the properties and
applications of Gaussian states in quantum information with emphasis on the
fundamental concepts, the calculation techniques and the effects of
imperfections of the real-life experimental setups.
Topics here include the elementary properties of Gaussian states and relevant
quantum information device, entanglement-based quantum tasks such as quantum
teleportation, quantum cryptography with weak and strong Gaussian states and
the quantum channel capacity, mathematical theory of quantum entanglement and
state estimation for Gaussian states.Comment: 170 pages. Minors of the published version are corrected and listed
in the Acknowledgement part of this versio
Lecture Notes on Network Information Theory
These lecture notes have been converted to a book titled Network Information
Theory published recently by Cambridge University Press. This book provides a
significantly expanded exposition of the material in the lecture notes as well
as problems and bibliographic notes at the end of each chapter. The authors are
currently preparing a set of slides based on the book that will be posted in
the second half of 2012. More information about the book can be found at
http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of
the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/
Secure Multiterminal Source Coding with Side Information at the Eavesdropper
The problem of secure multiterminal source coding with side information at
the eavesdropper is investigated. This scenario consists of a main encoder
(referred to as Alice) that wishes to compress a single source but
simultaneously satisfying the desired requirements on the distortion level at a
legitimate receiver (referred to as Bob) and the equivocation rate --average
uncertainty-- at an eavesdropper (referred to as Eve). It is further assumed
the presence of a (public) rate-limited link between Alice and Bob. In this
setting, Eve perfectly observes the information bits sent by Alice to Bob and
has also access to a correlated source which can be used as side information. A
second encoder (referred to as Charlie) helps Bob in estimating Alice's source
by sending a compressed version of its own correlated observation via a
(private) rate-limited link, which is only observed by Bob. For instance, the
problem at hands can be seen as the unification between the Berger-Tung and the
secure source coding setups. Inner and outer bounds on the so called
rates-distortion-equivocation region are derived. The inner region turns to be
tight for two cases: (i) uncoded side information at Bob and (ii) lossless
reconstruction of both sources at Bob --secure distributed lossless
compression. Application examples to secure lossy source coding of Gaussian and
binary sources in the presence of Gaussian and binary/ternary (resp.) side
informations are also considered. Optimal coding schemes are characterized for
some cases of interest where the statistical differences between the side
information at the decoders and the presence of a non-zero distortion at Bob
can be fully exploited to guarantee secrecy.Comment: 26 pages, 16 figures, 2 table
- …