555 research outputs found
Cloning the entanglement of a pair of quantum bits
It is shown that any quantum operation that perfectly clones the entanglement
of all maximally-entangled qubit pairs cannot preserve separability. This
``entanglement no-cloning'' principle naturally suggests that some approximate
cloning of entanglement is nevertheless allowed by quantum mechanics. We
investigate a separability-preserving optimal cloning machine that duplicates
all maximally-entangled states of two qubits, resulting in 0.285 bits of
entanglement per clone, while a local cloning machine only yields 0.060 bits of
entanglement per clone.Comment: 4 pages Revtex, 2 encapsulated Postscript figures, one added autho
Information-theoretic interpretation of quantum error-correcting codes
Quantum error-correcting codes are analyzed from an information-theoretic
perspective centered on quantum conditional and mutual entropies. This approach
parallels the description of classical error correction in Shannon theory,
while clarifying the differences between classical and quantum codes. More
specifically, it is shown how quantum information theory accounts for the fact
that "redundant" information can be distributed over quantum bits even though
this does not violate the quantum "no-cloning" theorem. Such a remarkable
feature, which has no counterpart for classical codes, is related to the
property that the ternary mutual entropy vanishes for a tripartite system in a
pure state. This information-theoretic description of quantum coding is used to
derive the quantum analogue of the Singleton bound on the number of logical
bits that can be preserved by a code of fixed length which can recover a given
number of errors.Comment: 14 pages RevTeX, 8 Postscript figures. Added appendix. To appear in
Phys. Rev.
Quantum bit commitment under Gaussian constraints
Quantum bit commitment has long been known to be impossible. Nevertheless,
just as in the classical case, imposing certain constraints on the power of the
parties may enable the construction of asymptotically secure protocols. Here,
we introduce a quantum bit commitment protocol and prove that it is
asymptotically secure if cheating is restricted to Gaussian operations. This
protocol exploits continuous-variable quantum optical carriers, for which such
a Gaussian constraint is experimentally relevant as the high optical
nonlinearity needed to effect deterministic non-Gaussian cheating is
inaccessible.Comment: 9 pages, 6 figure
What information theory can tell us about quantum reality
An investigation of Einstein's ``physical'' reality and the concept of
quantum reality in terms of information theory suggests a solution to quantum
paradoxes such as the Einstein-Podolsky-Rosen (EPR) and the Schroedinger-cat
paradoxes. Quantum reality, the picture based on unitarily evolving
wavefunctions, is complete, but appears incomplete from the observer's point of
view for fundamental reasons arising from the quantum information theory of
measurement. Physical reality, the picture based on classically accessible
observables is, in the worst case of EPR experiments, unrelated to the quantum
reality it purports to reflect. Thus, quantum information theory implies that
only correlations, not the correlata, are physically accessible: the mantra of
the Ithaca interpretation of quantum mechanics.Comment: LaTeX with llncs.cls, 11 pages, 6 postscript figures, Proc. of 1st
NASA Workshop on Quantum Computation and Quantum Communication (QCQC 98
Optimal probabilistic cloning and purification of quantum states
We investigate the probabilistic cloning and purification of quantum states.
The performance of these probabilistic operations is quantified by the average
fidelity between the ideal and actual output states. We provide a simple
formula for the maximal achievable average fidelity and we explictly show how
to construct a probabilistic operation that achieves this fidelity. We
illustrate our method on several examples such as the phase covariant cloning
of qubits, cloning of coherent states, and purification of qubits transmitted
via depolarizing channel and amplitude damping channel. Our examples reveal
that the probabilistic cloner may yield higher fidelity than the best
deterministic cloner even when the states that should be cloned are linearly
dependent and are drawn from a continuous set.Comment: 9 pages, 2 figure
Two-way quantum communication channels
We consider communication between two parties using a bipartite quantum
operation, which constitutes the most general quantum mechanical model of
two-party communication. We primarily focus on the simultaneous forward and
backward communication of classical messages. For the case in which the two
parties share unlimited prior entanglement, we give inner and outer bounds on
the achievable rate region that generalize classical results due to Shannon. In
particular, using a protocol of Bennett, Harrow, Leung, and Smolin, we give a
one-shot expression in terms of the Holevo information for the
entanglement-assisted one-way capacity of a two-way quantum channel. As
applications, we rederive two known additivity results for one-way channel
capacities: the entanglement-assisted capacity of a general one-way channel,
and the unassisted capacity of an entanglement-breaking one-way channel.Comment: 21 pages, 3 figure
Relativistically covariant state-dependent cloning of photons
The influence of the relativistic covariance requirement on the optimality of
the symmetric state-dependent 1 -> 2 cloning machine is studied. Namely, given
a photonic qubit whose basis is formed from the momentum-helicity eigenstates,
the change to the optimal cloning fidelity is calculated taking into account
the Lorentz covariance unitarily represented by Wigner's little group. To
pinpoint some of the interesting results, we found states for which the optimal
fidelity of the cloning process drops to 2/3 which corresponds to the fidelity
of the optimal classical cloner. Also, an implication for the security of the
BB84 protocol is analyzed.Comment: corrected, rewritten and accepted in PR
Entanglement enhanced classical capacity of quantum communication channels with correlated noise in arbitrary dimensions
We study the capacity of d-dimensional quantum channels with memory modeled
by correlated noise. We show that, in agreement with previous results on Pauli
qubit channels, there are situations where maximally entangled input states
achieve higher values of mutual information than product states. Moreover, a
strong dependence of this effect on the nature of the noise correlations as
well as on the parity of the space dimension is found. We conjecture that when
entanglement gives an advantage in terms of mutual information, maximally
entangled states saturate the channel capacity.Comment: 10 pages, 5 figure
Extending Hudson's theorem to mixed quantum states
According to Hudson's theorem, any pure quantum state with a positive Wigner
function is necessarily a Gaussian state. Here, we make a step towards the
extension of this theorem to mixed quantum states by finding upper and lower
bounds on the degree of non-Gaussianity of states with positive Wigner
functions. The bounds are expressed in the form of parametric functions
relating the degree of non-Gaussianity of a state, its purity, and the purity
of the Gaussian state characterized by the same covariance matrix. Although our
bounds are not tight, they permit us to visualize the set of states with
positive Wigner functions.Comment: 4 pages, 2 figure
Capacity of a bosonic memory channel with Gauss-Markov noise
We address the classical capacity of a quantum bosonic memory channel with
additive noise, subject to an input energy constraint. The memory is modeled by
correlated noise emerging from a Gauss-Markov process. Under reasonable
assumptions, we show that the optimal modulation results from a "quantum
water-filling" solution above a certain input energy threshold, similar to the
optimal modulation for parallel classical Gaussian channels. We also derive
analytically the optimal multimode input state above this threshold, which
enables us to compute the capacity of this memory channel in the limit of an
infinite number of modes. The method can also be applied to a more general
noise environment which is constructed by a stationary Gauss process. The
extension of our results to the case of broadband bosonic channels with colored
Gaussian noise should also be straightforward.Comment: 11 pages, 4 figures, final corrections mad
- …