215 research outputs found
Quantum superadditivity in linear optics networks: sending bits via multiple access Gaussian channels
We study classical capacity regions of quantum Gaussian multiple access
channels (MAC). In classical variants of such channels, whilst some capacity
superadditivity-type effects such as the so called {\it water filling effect}
may be achieved, a fundamental classical additivity law can still be
identified, {\it viz.} adding resources to one sender is never advantageous to
other senders in sending their respective information to the receiver. Here, we
show that quantum resources allows violation of this law, by providing two
illustrative schemes of experimentally feasible Gaussian MACs.Comment: 4 pages, 2 figure
Gaussian bosonic synergy: quantum communication via realistic channels of zero quantum capacity
As with classical information, error-correcting codes enable reliable
transmission of quantum information through noisy or lossy channels. In
contrast to the classical theory, imperfect quantum channels exhibit a strong
kind of synergy: there exist pairs of discrete memoryless quantum channels,
each of zero quantum capacity, which acquire positive quantum capacity when
used together. Here we show that this "superactivation" phenomenon also occurs
in the more realistic setting of optical channels with attenuation and Gaussian
noise. This paves the way for its experimental realization and application in
real-world communications systems.Comment: 5 pages, 4 figures, one appendi
Schemes of transmission of classical information via quantum channels with many senders: discrete and continuous variables cases
Superadditivity effects in the classical capacity of discrete multi-access
channels (MACs) and continuous variable (CV) Gaussian MACs are analysed. New
examples of the manifestation of superadditivity in the discrete case are
provided including, in particular, a channel which is fully symmetric with
respect to all senders. Furthermore, we consider a class of channels for which
{\it input entanglement across more than two copies of the channels is
necessary} to saturate the asymptotic rate of transmission from one of the
senders to the receiver. The 5-input entanglement of Shor error correction
codewords surpass the capacity attainable by using arbitrary two-input
entanglement for these channels. In the CV case, we consider the properties of
the two channels (a beam-splitter channel and a "non-demolition" XP gate
channel) analyzed in [Czekaj {\it et al.}, Phys. Rev. A {\bf 82}, 020302 (R)
(2010)] in greater detail and also consider the sensitivity of capacity
superadditivity effects to thermal noise. We observe that the estimates of
amount of two-mode squeezing required to achieve capacity superadditivity are
more optimistic than previously reported.Comment: 19 pages, 11 figure
Recommended from our members
A tutorial on cue combination and Signal Detection Theory: Using changes in sensitivity to evaluate how observers integrate sensory information
Many sensory inputs contain multiple sources of information (âcuesâ), such as two sounds of different frequencies, or a voice heard in unison with moving lips. Often, each cue provides a separate estimate of the same physical attribute, such as the size or location of an object. An ideal observer can exploit such redundant sensory information to improve the accuracy of their perceptual judgments. For example, if each cue is modeled as an independent, Gaussian, random variable, then combining Ncues should provide up to a âN improvement in detection/discrimination sensitivity. Alternatively, a less efficient observer may base their decision on only a subset of the available information, and so gain little or no benefit from having access to multiple sources of information. Here we use Signal Detection Theory to formulate and compare various models of cue-combination, many of which are commonly used to explain empirical data. We alert the reader to the key assumptions inherent in each model, and provide formulas for deriving quantitative predictions. Code is also provided for simulating each model, allowing expected levels of measurement error to be quantified. Based on these results, it is shown that predicted sensitivity often differs surprisingly little between qualitatively distinct models of combination. This means that sensitivity alone is not sufficient for understanding decision efficiency, and the implications of this are discussed
Cores of Cooperative Games in Information Theory
Cores of cooperative games are ubiquitous in information theory, and arise
most frequently in the characterization of fundamental limits in various
scenarios involving multiple users. Examples include classical settings in
network information theory such as Slepian-Wolf source coding and multiple
access channels, classical settings in statistics such as robust hypothesis
testing, and new settings at the intersection of networking and statistics such
as distributed estimation problems for sensor networks. Cooperative game theory
allows one to understand aspects of all of these problems from a fresh and
unifying perspective that treats users as players in a game, sometimes leading
to new insights. At the heart of these analyses are fundamental dualities that
have been long studied in the context of cooperative games; for information
theoretic purposes, these are dualities between information inequalities on the
one hand and properties of rate, capacity or other resource allocation regions
on the other.Comment: 12 pages, published at
http://www.hindawi.com/GetArticle.aspx?doi=10.1155/2008/318704 in EURASIP
Journal on Wireless Communications and Networking, Special Issue on "Theory
and Applications in Multiuser/Multiterminal Communications", April 200
Continuous Variable Quantum Cryptography using Two-Way Quantum Communication
Quantum cryptography has been recently extended to continuous variable
systems, e.g., the bosonic modes of the electromagnetic field. In particular,
several cryptographic protocols have been proposed and experimentally
implemented using bosonic modes with Gaussian statistics. Such protocols have
shown the possibility of reaching very high secret-key rates, even in the
presence of strong losses in the quantum communication channel. Despite this
robustness to loss, their security can be affected by more general attacks
where extra Gaussian noise is introduced by the eavesdropper. In this general
scenario we show a "hardware solution" for enhancing the security thresholds of
these protocols. This is possible by extending them to a two-way quantum
communication where subsequent uses of the quantum channel are suitably
combined. In the resulting two-way schemes, one of the honest parties assists
the secret encoding of the other with the chance of a non-trivial superadditive
enhancement of the security thresholds. Such results enable the extension of
quantum cryptography to more complex quantum communications.Comment: 12 pages, 7 figures, REVTe
- âŠ