215 research outputs found

    Quantum superadditivity in linear optics networks: sending bits via multiple access Gaussian channels

    Full text link
    We study classical capacity regions of quantum Gaussian multiple access channels (MAC). In classical variants of such channels, whilst some capacity superadditivity-type effects such as the so called {\it water filling effect} may be achieved, a fundamental classical additivity law can still be identified, {\it viz.} adding resources to one sender is never advantageous to other senders in sending their respective information to the receiver. Here, we show that quantum resources allows violation of this law, by providing two illustrative schemes of experimentally feasible Gaussian MACs.Comment: 4 pages, 2 figure

    Gaussian bosonic synergy: quantum communication via realistic channels of zero quantum capacity

    Full text link
    As with classical information, error-correcting codes enable reliable transmission of quantum information through noisy or lossy channels. In contrast to the classical theory, imperfect quantum channels exhibit a strong kind of synergy: there exist pairs of discrete memoryless quantum channels, each of zero quantum capacity, which acquire positive quantum capacity when used together. Here we show that this "superactivation" phenomenon also occurs in the more realistic setting of optical channels with attenuation and Gaussian noise. This paves the way for its experimental realization and application in real-world communications systems.Comment: 5 pages, 4 figures, one appendi

    Schemes of transmission of classical information via quantum channels with many senders: discrete and continuous variables cases

    Full text link
    Superadditivity effects in the classical capacity of discrete multi-access channels (MACs) and continuous variable (CV) Gaussian MACs are analysed. New examples of the manifestation of superadditivity in the discrete case are provided including, in particular, a channel which is fully symmetric with respect to all senders. Furthermore, we consider a class of channels for which {\it input entanglement across more than two copies of the channels is necessary} to saturate the asymptotic rate of transmission from one of the senders to the receiver. The 5-input entanglement of Shor error correction codewords surpass the capacity attainable by using arbitrary two-input entanglement for these channels. In the CV case, we consider the properties of the two channels (a beam-splitter channel and a "non-demolition" XP gate channel) analyzed in [Czekaj {\it et al.}, Phys. Rev. A {\bf 82}, 020302 (R) (2010)] in greater detail and also consider the sensitivity of capacity superadditivity effects to thermal noise. We observe that the estimates of amount of two-mode squeezing required to achieve capacity superadditivity are more optimistic than previously reported.Comment: 19 pages, 11 figure

    Cores of Cooperative Games in Information Theory

    Get PDF
    Cores of cooperative games are ubiquitous in information theory, and arise most frequently in the characterization of fundamental limits in various scenarios involving multiple users. Examples include classical settings in network information theory such as Slepian-Wolf source coding and multiple access channels, classical settings in statistics such as robust hypothesis testing, and new settings at the intersection of networking and statistics such as distributed estimation problems for sensor networks. Cooperative game theory allows one to understand aspects of all of these problems from a fresh and unifying perspective that treats users as players in a game, sometimes leading to new insights. At the heart of these analyses are fundamental dualities that have been long studied in the context of cooperative games; for information theoretic purposes, these are dualities between information inequalities on the one hand and properties of rate, capacity or other resource allocation regions on the other.Comment: 12 pages, published at http://www.hindawi.com/GetArticle.aspx?doi=10.1155/2008/318704 in EURASIP Journal on Wireless Communications and Networking, Special Issue on "Theory and Applications in Multiuser/Multiterminal Communications", April 200

    Continuous Variable Quantum Cryptography using Two-Way Quantum Communication

    Full text link
    Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes with Gaussian statistics. Such protocols have shown the possibility of reaching very high secret-key rates, even in the presence of strong losses in the quantum communication channel. Despite this robustness to loss, their security can be affected by more general attacks where extra Gaussian noise is introduced by the eavesdropper. In this general scenario we show a "hardware solution" for enhancing the security thresholds of these protocols. This is possible by extending them to a two-way quantum communication where subsequent uses of the quantum channel are suitably combined. In the resulting two-way schemes, one of the honest parties assists the secret encoding of the other with the chance of a non-trivial superadditive enhancement of the security thresholds. Such results enable the extension of quantum cryptography to more complex quantum communications.Comment: 12 pages, 7 figures, REVTe
    • 

    corecore