701 research outputs found
Belief propagation decoding of quantum channels by passing quantum messages
Belief propagation is a powerful tool in statistical physics, machine
learning, and modern coding theory. As a decoding method, it is ubiquitous in
classical error correction and has also been applied to stabilizer-based
quantum error correction. The algorithm works by passing messages between nodes
of the factor graph associated with the code and enables efficient decoding, in
some cases even up to the Shannon capacity of the channel. Here we construct a
belief propagation algorithm which passes quantum messages on the factor graph
and is capable of decoding the classical-quantum channel with pure state
outputs. This gives explicit decoding circuits whose number of gates is
quadratic in the blocklength of the code. We also show that this decoder can be
modified to work with polar codes for the pure state channel and as part of a
polar decoder for transmitting quantum information over the amplitude damping
channel. These represent the first explicit capacity-achieving decoders for
non-Pauli channels.Comment: v3: final version for publication; v2: improved discussion of the
algorithm; 7 pages & 2 figures. v1: 6 pages, 1 figur
A Minimax Converse for Quantum Channel Coding
We prove a one-shot "minimax" converse bound for quantum channel coding
assisted by positive partial transpose channels between sender and receiver.
The bound is similar in spirit to the converse by Polyanskiy, Poor, and Verdu
[IEEE Trans. Info. Theory 56, 2307-2359 (2010)] for classical channel coding,
and also enjoys the saddle point property enabling the order of optimizations
to be interchanged. Equivalently, the bound can be formulated as a semidefinite
program satisfying strong duality. The convex nature of the bound implies
channel symmetries can substantially simplify the optimization, enabling us to
explicitly compute the finite blocklength behavior for several simple qubit
channels. In particular, we find that finite blocklength converse statements
for the classical erasure channel apply to the assisted quantum erasure
channel, while bounds for the classical binary symmetric channel apply to both
the assisted dephasing and depolarizing channels. This implies that these qubit
channels inherit statements regarding the asymptotic limit of large
blocklength, such as the strong converse or second-order converse rates, from
their classical counterparts. Moreover, for the dephasing channel, the finite
blocklength bounds are as tight as those for the classical binary symmetric
channel, since coding for classical phase errors yields equivalently-performing
unassisted quantum codes.Comment: merged with arXiv:1504.04617 version 1 ; see version
On privacy amplification, lossy compression, and their duality to channel coding
We examine the task of privacy amplification from information-theoretic and
coding-theoretic points of view. In the former, we give a one-shot
characterization of the optimal rate of privacy amplification against classical
adversaries in terms of the optimal type-II error in asymmetric hypothesis
testing. This formulation can be easily computed to give finite-blocklength
bounds and turns out to be equivalent to smooth min-entropy bounds by Renner
and Wolf [Asiacrypt 2005] and Watanabe and Hayashi [ISIT 2013], as well as a
bound in terms of the divergence by Yang, Schaefer, and Poor
[arXiv:1706.03866 [cs.IT]]. In the latter, we show that protocols for privacy
amplification based on linear codes can be easily repurposed for channel
simulation. Combined with known relations between channel simulation and lossy
source coding, this implies that privacy amplification can be understood as a
basic primitive for both channel simulation and lossy compression. Applied to
symmetric channels or lossy compression settings, our construction leads to
proto- cols of optimal rate in the asymptotic i.i.d. limit. Finally, appealing
to the notion of channel duality recently detailed by us in [IEEE Trans. Info.
Theory 64, 577 (2018)], we show that linear error-correcting codes for
symmetric channels with quantum output can be transformed into linear lossy
source coding schemes for classical variables arising from the dual channel.
This explains a "curious duality" in these problems for the (self-dual) erasure
channel observed by Martinian and Yedidia [Allerton 2003; arXiv:cs/0408008] and
partly anticipates recent results on optimal lossy compression by polar and
low-density generator matrix codes.Comment: v3: updated to include equivalence of the converse bound with smooth
entropy formulations. v2: updated to include comparison with the one-shot
bounds of arXiv:1706.03866. v1: 11 pages, 4 figure
Generalized decoding, effective channels, and simplified security proofs in quantum key distribution
Prepare and measure quantum key distribution protocols can be decomposed into
two basic steps: delivery of the signals over a quantum channel and
distillation of a secret key from the signal and measurement records by
classical processing and public communication. Here we formalize the
distillation process for a general protocol in a purely quantum-mechanical
framework and demonstrate that it can be viewed as creating an ``effective''
quantum channel between the legitimate users Alice and Bob. The process of
secret key generation can then be viewed as entanglement distribution using
this channel, which enables application of entanglement-based security proofs
to essentially any prepare and measure protocol. To ensure secrecy of the key,
Alice and Bob must be able to estimate the channel noise from errors in the
key, and we further show how symmetries of the distillation process simplify
this task. Applying this method, we prove the security of several key
distribution protocols based on equiangular spherical codes.Comment: 9.1 pages REVTeX. (v3): published version. (v2): revised for improved
presentation; content unchange
- …