channel superactivation and quantum data hiding filechannel superactivation and quantum data hiding...

1
Channel Superactivation and Quantum Data Hiding Joseph M. Renes 1 Quantum Shannon Theory: The (Very) Broad Strokes Ultimately we are after maximal entanglement between (A)lice and (B)ob, i.e. a state unitarily equivalent to |ΦAB = 1 p 2 k | k A | k B . All the protocols of the quantum family tree boil down to generating maximal entanglement in some way. Alice A B Bob Alice’s Lab Bob’s Lab |ΦAB One characterization of entanglement is the entropic statement H (A | B )= -1. But to build protocols, we characterize entanglement in one of three alternate ways: 1.1 Entanglement via Decoupling AB is maximally entangled if A is decoupled from everything but B (and maximally-mixed). Alice A Everything\AB Alice’s Lab Entropically: H (A | E )= H (A )= 1 AB is maximally entangled. See [2]. 1.2 Entanglement via Secrecy AB is maximally entangled if Alice can generate a classical random variable X A (e.g. a coin toss) which Bob can perfectly replicate, but is uncorrelated with anything else. Everything\AB Alice A X A X B B Bob Alice’s Lab Bob’s Lab X A = X B H ( X A | B )= 0 and H ( X A | E )= H ( X A )= 1 AB is maximally entangled. See [1]. 1.3 Entanglement via Complementary Classical Correlation (my own personal favorite) AB is maximally entangled if there are two conjugate measurements Alice can make, leading to classical random variables X A and Z , either of which Bob can perfectly predict. Alice A X A Z A X B Z B B Bob Alice’s Lab Bob’s Lab X A = X B Z A = Z B H ( X A | B )= H ( Z A | B )= 0 AB is maximally entangled. See [4]. 2 Channel Superactivation The quantum capacity Q(N A B ) of a quantum channel N A B from Alice to Bob char- acterizes its ability to generate entanglement between them. Channel superactivation refers to the strange phenomenon that two channels can separately each have zero ca- pacity, Q(N 1 )= 0 and Q(N 2 )= 0, yet together have nonzero capacity, Q(N 1 ⊗N 2 ) > 0. 2.1 Entanglement Generation over Quantum Channels To generate entanglement between Alice and Bob using a channel N A B , Alice encodes half of an entangled state and sends it to Bob, who decodes it. The encoding and decoding operations depend on the channel. N A B Encoder Decoder B send A Alice Alice’s Lab B recv Bob Bob’s Lab From [4], the capacity Q(N ) > 1 - H ( X A | B ) - H ( Z A | B ), for B the output of the channel. 2.2 Private States and the Horodecki Channel N H The superactivation effect discovered by Smith & Yard [5] relies on a channel N A B H incapable of generating entanglement, but nevertheless capable of generating a secret key [3]. Quantumly, secret keys are similar to entangled states, except that Alice holds two systems: one which becomes the key X A upon measurement and another which shields the key from any eavesdropper. (Generally, the shield can be distributed between Alice and Bob.) A key A shield Alice B Bob E (St)Eve Entropic characterization: H ( X A | B )= 0 and H ( Z A | BA shield )= 0. Same as entanglement, except Bob needs the shield to predict the conjugate observable Z A . So send it to him! 2.3 Superactivation Channel superactivation is now easy: send the shield through the 50% erasure channel! N A B H Encoder Decoder N A B Erase B send A A shield Alice B recv B shield Bob Since N H produces a private state, H ( X A | B recv )= 0; because it cannot produce entangle- ment, H ( Z A | B recv )= 1. Half the time Bob obtains the shield from the erasure channel, in which case they share entanglement. So altogether N H and N Erase together can generate entanglement at (at least) half the rate at which N H generates private states. 3 Quantum Data Hiding From channel superactivation of the Smith & Yard form, we can construct a set of quan- tum data hiding states. Quantum data hiding refers to a set of orthogonal quantum states ρ AB z which cannot be reliably distinguished using local operations and classical communication (LOCC) [6]. The set we can construct here are immune to 1-way LOCC. A Alice B Bob ρ AB z ?? ?? 3.1 Forward Communication Doesn’t Help To construct the set, we just need to remember that forward classical communication from Alice to Bob cannot increase Q(N ). Consider the states ρ A shield B recv z created by the Z A measurement of A .(z is the outcome of the measurement and labels the state). ρ A shield B recv z N H A B Encoder Decoder B send A shield A Z A Alice B recv Bob • Since the properly-decoded output of N H is a private state, H ( Z A |A shield B recv )= 0, and the ρ z must be disjoint, i.e. perfectly distinguishable. • But by the analysis of 2.3, H ( Z A | B recv )= 1, or else Q(N H ) > 0. Thus, Bob’s marginal states ρ B recv z are perfectly indistinguishable. • Finally, since forward communication cannot increase Q, attempts by Alice to measure the A shield system and communicate the result to Bob are futile. Hence, the ρ A shield B recv z are a set of data hiding states immune to 1-way LOCC, a fact which follows immediately using the formalism of 1.3! References [1] I. Devetak. IEEE Trans. Inf. Theory, 51(1):44– 55, 2005. [2]P. Hayden, M. Horodecki, A. Winter, and J. Yard. Open Sys. & Inf. Dyn., 15(1):7–19, 2008. [3] K. Horodecki, L. Pankowski, and M. Horodecki. IEEE TIT, 54(6):2621–2625, 2008. [4] J. M. Renes and J. Boileau. Phys. Rev. A, 78(3):032335–12, 2008. [5] G. Smith and J. Yard. Science, page 1162242, 2008. [6]B. M. Terhal, D. P. DiVincenzo, and D. W. Leung. Phys. Rev. Lett., 86(25):5807, 2001.

Upload: vodiep

Post on 23-May-2019

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Channel Superactivation and Quantum Data Hiding fileChannel Superactivation and Quantum Data Hiding Joseph M. Renes 1Quantum Shannon Theory: The (Very) Broad Strokes Ultimately we

Channel Superactivation and Quantum Data HidingJoseph M. Renes

1 Quantum Shannon Theory: The (Very) Broad Strokes

Ultimately we are after maximal entanglement between (A)lice and (B)ob, i.e. a stateunitarily equivalent to |Φ⟩AB =

1p2

k |k⟩A |k⟩B. All the protocols of the quantum familytree boil down to generating maximal entanglement in some way.

Alice A B Bob

Alice’s Lab Bob’s Lab

|Φ⟩AB

One characterization of entanglement is the entropic statement H(A|B) = −1. But tobuild protocols, we characterize entanglement in one of three alternate ways:

1.1 Entanglement via Decoupling

AB is maximally entangled if A is decoupled from everything but B (and maximally-mixed).

Alice A

Everything\ABAlice’s Lab

Entropically: H(A|E) = H(A) = 1⇒ AB is maximally entangled. See [2].

1.2 Entanglement via Secrecy

AB is maximally entangled if Alice can generate a classical random variable X A (e.g. acoin toss) which Bob can perfectly replicate, but is uncorrelated with anything else.

Everything\AB

Alice A X A X B B Bob

Alice’s Lab Bob’s LabX A= X B

H(X A|B) = 0 and H(X A|E) = H(X A) = 1⇒ AB is maximally entangled. See [1].

1.3 Entanglement via Complementary Classical Correlation (my own personal favorite)

AB is maximally entangled if there are two conjugate measurements Alice can make,leading to classical random variables X A and Z , either of which Bob can perfectly predict.

Alice A

X A

ZA

X B

ZB

B Bob

Alice’s Lab Bob’s LabX A= X B

ZA= ZB

H(X A|B) = H(ZA|B) = 0⇒ AB is maximally entangled. See [4].

2 Channel Superactivation

The quantum capacity Q(N A→B) of a quantum channel N A→B from Alice to Bob char-acterizes its ability to generate entanglement between them. Channel superactivationrefers to the strange phenomenon that two channels can separately each have zero ca-pacity, Q(N1) = 0 and Q(N2) = 0, yet together have nonzero capacity, Q(N1⊗N2)> 0.

2.1 Entanglement Generation over Quantum Channels

To generate entanglement between Alice and Bob using a channel N A→B, Alice encodeshalf of an entangled state and sends it to Bob, who decodes it. The encoding and decodingoperations depend on the channel.

N A→BEncoder Decoder

BsendAAlice

Alice’s Lab

Brecv Bob

Bob’s Lab

From [4], the capacity Q(N )> 1−H(X A|B)−H(ZA|B), for B the output of the channel.

2.2 Private States and the Horodecki ChannelNH

The superactivation effect discovered by Smith & Yard [5] relies on a channel N A→BH

incapable of generating entanglement, but nevertheless capable of generating a secretkey [3]. Quantumly, secret keys are similar to entangled states, except that Alice holdstwo systems: one which becomes the key X A upon measurement and another whichshields the key from any eavesdropper. (Generally, the shield can be distributed between Alice and Bob.)

Akey

Ashield

Alice

B

Bob

E(St)Eve

Entropic characterization: H(X A|B) = 0 and H(ZA|BAshield) = 0. Same as entanglement,except Bob needs the shield to predict the conjugate observable ZA. So send it to him!

2.3 Superactivation

Channel superactivation is now easy: send the shield through the 50% erasure channel!

N A→BHEncoder Decoder

N A→BErase

Bsend

A

Ashield

Alice

Brecv

Bshield

Bob

Since NH produces a private state, H(X A|Brecv) = 0; because it cannot produce entangle-ment, H(ZA|Brecv) = 1. Half the time Bob obtains the shield from the erasure channel, inwhich case they share entanglement. So altogether NH and NErase together can generateentanglement at (at least) half the rate at which NH generates private states.

3 Quantum Data Hiding

From channel superactivation of the Smith & Yard form, we can construct a set of quan-tum data hiding states. Quantum data hiding refers to a set of orthogonal quantumstates ρAB

z which cannot be reliably distinguished using local operations and classicalcommunication (LOCC) [6]. The set we can construct here are immune to 1-way LOCC.

A

Alice

B

Bob

ρABz?? ??

3.1 Forward Communication Doesn’t Help

To construct the set, we just need to remember that forward classical communicationfrom Alice to Bob cannot increase Q(N ). Consider the states ρAshieldBrecv

z created by the ZA

measurement of A. (z is the outcome of the measurement and labels the state).

ρAshieldBrecvz

N HA→BEncoder Decoder

Bsend

AshieldA

ZA

Alice

Brecv

Bob

• Since the properly-decoded output of NH is a private state,

H(ZA|AshieldBrecv) = 0,

and the ρz must be disjoint, i.e. perfectly distinguishable.

• But by the analysis of 2.3,

H(ZA|Brecv) = 1,

or else Q(NH)> 0. Thus, Bob’s marginal states ρBrecvz are perfectly indistinguishable.

• Finally, since forward communication cannot increase Q, attempts by Alice to measurethe Ashield system and communicate the result to Bob are futile.

Hence, the ρAshieldBrecvz are a set of data hiding states immune to 1-way

LOCC, a fact which follows immediately using the formalism of 1.3!

References

[1] I. Devetak. IEEE Trans. Inf. Theory, 51(1):44– 55, 2005.

[2] P. Hayden, M. Horodecki, A. Winter, and J. Yard. Open Sys. & Inf. Dyn., 15(1):7–19, 2008.

[3] K. Horodecki, L. Pankowski, and M. Horodecki. IEEE TIT, 54(6):2621–2625, 2008.

[4] J. M. Renes and J. Boileau. Phys. Rev. A, 78(3):032335–12, 2008.

[5] G. Smith and J. Yard. Science, page 1162242, 2008.

[6] B. M. Terhal, D. P. DiVincenzo, and D. W. Leung. Phys. Rev. Lett., 86(25):5807, 2001.