98 research outputs found
Unsteady waves generated by two ships with different speeds
This paper discusses the development of a methodology to predict the waves generated by two ships with different speeds and the development of an uncoupled method to predict the encountering, overtaking and crossing scenarios
All Inequalities for the Relative Entropy
The relative entropy of two n-party quantum states is an important quantity
exhibiting, for example, the extent to which the two states are different. The
relative entropy of the states formed by reducing two n-party to a smaller
number of parties is always less than or equal to the relative entropy of
the two original n-party states. This is the monotonicity of relative entropy.
Using techniques from convex geometry, we prove that monotonicity under
restrictions is the only general inequality satisfied by relative entropies. In
doing so we make a connection to secret sharing schemes with general access
structures.
A suprising outcome is that the structure of allowed relative entropy values
of subsets of multiparty states is much simpler than the structure of allowed
entropy values. And the structure of allowed relative entropy values (unlike
that of entropies) is the same for classical probability distributions and
quantum states.Comment: 15 pages, 3 embedded eps figure
On the optimization of bipartite secret sharing schemes
Optimizing the ratio between the maximum length of the shares and the length of the secret value in secret sharing schemes for general access structures is an extremely difficult and long-standing open problem. In this paper, we study it for bipartite access structures, in which the set of participants
is divided in two parts, and all participants in each part play an equivalent role. We focus on the search of lower bounds by using a special class of polymatroids that is introduced here, the bipartite ones. We present a method based on linear programming to compute, for every given bipartite access structure, the best lower bound that can be obtained by this combinatorial method. In addition, we obtain some general lower bounds that improve the previously known ones, and we construct optimal secret sharing schemes for a family of bipartite access structures.Postprint (author’s final draft
On the rate-distortion region for multiple descriptions
10.1109/TIT.2002.1013140IEEE Transactions on Information Theory4872012-2021IETT
- …