Erasing correlations, destroying entanglement and other new challenges for quantum information theory Aram Harrow, Bristol Peter Shor, MIT quant-ph/0511219.

Slides:



Advertisements
Similar presentations
Improved Simulation of Stabilizer Circuits Scott Aaronson (UC Berkeley) Joint work with Daniel Gottesman (Perimeter)
Advertisements

Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Toby Cubitt, Jenxin Chen, Aram Harrow arXiv: and Toby Cubitt, Graeme Smith arXiv: Super-Duper-Activation of Quantum Zero-Error Capacities.
Information theory Multi-user information theory A.J. Han Vinck Essen, 2004.
Quantum Computing MAS 725 Hartmut Klauck NTU
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Spin chains and channels with memory Martin Plenio (a) & Shashank Virmani (a,b) quant-ph/ , to appear prl (a)Institute for Mathematical Sciences.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
Quantum information as high-dimensional geometry Patrick Hayden McGill University Perspectives in High Dimensions, Cleveland, August 2010.
Short course on quantum computing Andris Ambainis University of Latvia.
Bell inequality & entanglement
Quantum Computing MAS 725 Hartmut Klauck NTU
Stronger Subadditivity Fernando G.S.L. Brandão University College London -> Microsoft Research Coogee 2015 based on arXiv: with Aram Harrow Jonathan.
Classical capacities of bidirectional channels Charles Bennett, IBM Aram Harrow, MIT/IBM, Debbie Leung, MSRI/IBM John Smolin,
Quantum communication from Alice to Bob Andreas Winter, Bristol quant-ph/ Aram Harrow, MIT Igor Devetak, USC.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Gate robustness: How much noise will ruin a quantum gate? Aram Harrow and Michael Nielsen, quant-ph/0212???
Quantum Computation and Error Correction Ali Soleimani.
Quantum Circuits for Clebsch- GordAn and Schur duality transformations D. Bacon (Caltech), I. Chuang (MIT) and A. Harrow (MIT) quant-ph/ more.
DEFENSE!. Applications of Coherent Classical Communication and Schur duality to quantum information theory Aram Harrow MIT Physics June 28, 2005 Committee:
Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.
Quantum Circuits for Clebsch- Gordon and Schur duality transformations D. Bacon (Caltech), I. Chuang (MIT) and A. Harrow (MIT) quant-ph/
A Family of Quantum Protocols Igor Devetak, IBM Aram Harrow, MIT Andreas Winter, Bristol quant-ph/ IEEE Symposium on Information Theory June 28,
Oded Regev (Tel Aviv University) Ben Toner (CWI, Amsterdam) Simulating Quantum Correlations with Finite Communication.
CSEP 590tv: Quantum Computing
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Algorithms II Andrew C. Yao Tsinghua University & Chinese U. of Hong Kong.
Coherent Classical Communication Aram Harrow (MIT) quant-ph/
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
NO INPUT IS DETECTED ON RGB1. Quantum Circuits for Clebsch- Gordon and Schur duality transformations D. Bacon (Caltech), I. Chuang (MIT) and A. Harrow.
Erasing correlations, destroying entanglement and other new challenges for quantum information theory Aram Harrow, Bristol Peter Shor, MIT quant-ph/
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Shannon Theory Patrick Hayden (McGill) 17 July 2005, Q-Logic Meets Q-Info.
Introduction to Quantum Shannon Theory Patrick Hayden (McGill University) 12 February 2007, BIRS Quantum Structures Workshop | 
Alice and Bob’s Excellent Adventure
ENTROPIC CHARACTERISTICS OF QUANTUM CHANNELS AND THE ADDITIVITY PROBLEM A. S. Holevo Steklov Mathematical Institute, Moscow.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
On the Dimension of Subspaces with Bounded Schmidt Rank Toby Cubitt, Ashley Montanaro, Andreas Winter and also Aram Harrow, Debbie Leung (who says there's.
The private capacities of a secret shared reference frame Patrick Hayden (McGill) with: PRA 75: (2005) ??? Stephen Bartlett Robert Spekkens arXiv:quant-ph/
Counterexamples to the maximal p -norm multiplicativity conjecture Patrick Hayden (McGill University) || | | N(½)N(½) p C&QIC, Santa Fe 2008.
1 hardware of quantum computer 1. quantum registers 2. quantum gates.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Quantum Information Theory Patrick Hayden (McGill) 4 August 2005, Canadian Quantum Information Summer School.
What is Qu antum In formation and T echnology? Prof. Ivan H. Deutsch Dept. of Physics and Astronomy University of New Mexico Second Biannual Student Summer.
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
The Classically Enhanced Father Protocol
Detecting Incapacity Graeme Smith IBM Research Joint Work with John Smolin QECC 2011 December 6, 2011 TexPoint fonts used in EMF. Read the TexPoint manual.
A generalization of quantum Stein’s Lemma Fernando G.S.L. Brandão and Martin B. Plenio Tohoku University, 13/09/2008.
Coherent Classical Communication Aram Harrow, MIT Quantum Computing Graduate Research Fellow Objective Objective ApproachStatus Determine.
On Minimum Reversible Entanglement Generating Sets Fernando G.S.L. Brandão Cambridge 16/11/2009.
Communication Complexity Guy Feigenblat Based on lecture by Dr. Ely Porat Some slides where adapted from various sources Complexity course Computer science.
Multipartite Entanglement and its Role in Quantum Algorithms Special Seminar: Ph.D. Lecture by Yishai Shimoni.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Antonio Acín
Dualities in quantum information theory Igor Devetak CSI, EE-S, USC quant-ph/
B OUNDS ON E NTANGLEMENT D ISTILLATION & S ECRET K EY A GREEMENT C APACITIES FOR Q UANTUM B ROADCAST C HANNELS Kaushik P. Seshadreesan Joint work with.
Coherent Communication of Classical Messages Aram Harrow (MIT) quant-ph/
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
1 Transactional Nature of Quantum Information Subhash Kak Computer Science, Oklahoma State Univ © Subhash Kak, June 2009.
Simulation and Design of Stabilizer Quantum Circuits Scott Aaronson and Boriska Toth CS252 Project December 10, X X +Z Z +ZI +IX
Random Access Codes and a Hypercontractive Inequality for
Fernando G.S.L. Brandão and Martin B. Plenio
Unconstrained distillation capacities of
Quantum Information Theory Introduction
General Strong Polarization
Presentation transcript:

Erasing correlations, destroying entanglement and other new challenges for quantum information theory Aram Harrow, Bristol Peter Shor, MIT quant-ph/ IHP, 23 Feb 2006

outline General rules for reversing protocols Coherent erasure of classical correlations Disentangling power of quantum operations and entanglement spread as a resource in quantum communication

qubit[q ! q] |0 i A ! |0 i B and |1 i A ! |1 i B ebit[qq] the state (|0 i A |0 i B + |1 i A |1 i B )/ p 2 cbit[c ! c] |0 i A ! |0 i B |0 i E and |1 i A ! |1 i B |1 i E Everything is a resource cobit[q ! qq] |0 i A ! |0 i A |0 i B and |1 i A ! |1 i A |1 i B resource inequalities super-dense coding: [q ! q] + [qq] > 2[c ! c] In fact, [q ! q] + [qq] = 2 [q ! qq] 2 [q ! qq]

(disentangling power) -[qq] [qq] y = (relation between time-reversal and exchange symmetry) [q à q][q ! q] y = |0 i A |0 i B ! |0 i A and |1 i A |1 i B ! |1 i A (coherent erasure??) [q à qq] (?)[q ! qq] y = Undoing things is also a resource reversalmeaning

[qq ! q] > [q ! q] - [q ! qq] = [q ! qq] - [qq] = ([q ! q] - [qq]) / 2 What good is coherent erasure?  |0 i A +  |1 i A !  |0 i A |0 i B +  |1 i A |1 i B (using [q ! qq]) !  |0 i B +  |1 i B (using [qq ! q]) [q ! qq] + [qq ! q] > [q ! q] entanglement-assisted communication only In fact, these are all equalities! (Proof: reverse SDC.) = = |x i |y i E (I ­ X x Z y )|  i XZ Alice Bob |i|i |x i |y i |x i |y i

application to unitary gates U is a bipartite unitary gate (e.g. CNOT) Known: U > C[c ! c] implies U > C[q ! qq] Corollary: If entanglement is free then C ! E (U) = C à E (U y ). Time reversal means: U y > C [q à qq] = C [qq à q] - C [qq]

How to find a gate with asymmetric capacities? Problem: If U is nonlocal, it has nonzero quantum capacities in both directions. Are they equal? Yes, if U is 2 £ 2. No, in general, but for a dramatic separation we will need a gate that violates time-reversal symmetry. U m |x i A |0 i B = |x i A |x i B for 0 6 x < 2 m U m |x i A |y i B = |x i A |y-1 i B for 0 < y 6 x < 2 m U m |x i A |y i B = |x i A |y i B for 0 6 x < y < 2 m the construction: (U m acts on 2 m £ 2 m dimensions)

Upper bound by simulation: 1. Jointly test whether y=0, 0 x. 2. Either send x to Bob using m[q ! qq], map y ! y-1 or do nothing. 3. Test whether y=x, 0 6 y x. m[q ! qq] + O((log m)(log m/  )) ([q ! q] + [q à q]) & U m Alice’s input x … 2 m -1 Bob’s input y C ! (U m ) = m À O(log 2 m) > C à E (U m ) U m > m[q ! qq] U m |x i A |0 i B = |x i A |x i B for 0 6 x<2 m U m |x i A |y i B = |x i A |y-1 i B for 0<y 6 x<2 m U m |x i A |y i B = |x i A |y i B for 0 6 x<y<2 m PICTURE STOLEN FROM CHARLIE BENNETT

Alice’s input x … 2 m -1 Bob’s input y C à E (U m y ) > m À O(log 2 m) > E(U m y ) U m y |x i A |x i B = |x i A |0 i B for 0 6 x<2 m U m y |x i A |y i B = |x i A |y+1 i B for 0 6 y<x<2 m U m y |x i A |y i B = |x i A |y i B for 0 6 x<y<2 m PICTURE STOLEN FROM CHARLIE BENNETT Meaning: U m ¼ m [q ! qq] and U m y ¼ m [q à qq] (almost worthless w/o ent. assistance!) Rerverse everything: U m y > m[q à qq] and m[q à qq] + O((log m)(log m/  )) ([q ! q] + [q à q]) & U m y

disentanglement clean resource inequalities: means that  ­ n can be asymptotically converted to  ­ n while discarding only o(n) entanglement. (equivalently: while generating a sublinear amount of local entropy.) Example: [q ! q] > [qq] and [q ! q] > -[qq] clean Example: U m > m[qq], but can only destroy O(log 2 m) [qq] U m y > -m[qq], but can only create O(log 2 m) [qq] clean

You can’t just throw it away Q: Why not? A: Given unlimited EPR pairs, try creating the state Hayden & Winter [quant-ph/ ] proved that this requires ¼ n bits of communication.

spread: a LU+EPR monotone Entanglement measures are usually LOCC monotones. e.g. for pure states  AB, the entropy of entanglement E(  ) = S(  A ) cannot increase on average under LOCC. Under LU + EPR, Alice and Bob have free EPR pairs and local unitaries, but classical communication is expensive.  (  A ) := S 0 (  A ) - S 1 (  A ) > 0 is a LU+EPR monotone S 0 (  ) := log rank(  ) and S 1 = - log ||  || 1 Useful because it can increase by at most one per cbit sent. [Hayden & Winter- q-ph/ ] approximate version:   (  ) := min {  (  ) : ||  -  || 1 6  }

spread: another resource you didn’t know you needed 1. Entanglement dilution: |  i AB is partially entangled. E = S(  A ). goal: |  i ­ nE+o(n) ! |  i ­ n even the weaker |  i ­1 ! |  i ­ n requires  (n ½ ) cbits (in either direction). why? concentration requires no communication: |  i ­ n ! |  i ­ nE+  with probability p(  ), where p(  ) ¼ Gaussian with mean 0 and std. dev O(n ½ ), meaning |  i ­ n  LU   p p(  )|  i A |  i B |  i ­ nE+  Thus  ((  A ) ­ n ) ~ n ½ and creating |  i ­ n means creating O(n ½ ) entanglement spread, which requires communication. (possible [Lo&Popescu, q-ph/ ], necessary [Hayden&Winter, q-ph/ ; Harrow&Lo, q-ph/ ])

spread: another resource you didn’t know you needed 2. Quantum Reverse Shannon Theorem for general inputs generalizes entanglement dilution. Goal: Simulate n copies of a channel N :A’ ! B or its isometric extension U N :A’ ! AB. Input  ­ n requires I(R;B)  [c ! c] + H(B) [qq]. note: H(B):=H( N (  )) [Bennett, Devetak, Harrow, Shor, Winter] General inputs reduce (via e.g. the Schur transform) to the case of coherent superpositions of different  ­ n, which require consuming different amounts of entanglement. Example: noiseless channel, superposition of |0 i and I/2 inputs. But! Varying  changes I(R;B) at the same time as it changes H(B), so we can use max  H(B) [qq] + ( max  H(B) + max  H(R)-H(A) ) [c ! c]. Still terrible! Is this really optimal?

“Clueless-Eve” Channel on d +1 dimensional Hilbert space conceals information about its input and output from the environment  0  A    j j  BE    d ( j = 1 …d )  j  A   0 j  BE If source is 0, creates entangled state between Bob and Eve. If source is nonzero, sends the nonzero value to Eve and zero to Bob. Malicious Non tensor product RA input  NTP =  00   m RA + (   j j   d )  m RA is not decohered by the Clueless-Eve channel, and so it should not be decohered by a faithful simulation of it R B E A  NTP sadly, this appears optimal SLIDE STOLEN FROM CHARLIE BENNETT

m qubits communication Alice’s Encoder Bob’s Decoder Local Environment Local environments could contain information on whether A was zero or nonzero. If A is nonzero, entropy of L A will be  H(E)+log( md ). Otherwise it will be less,  H(E), by conservation of entropy. Because local environments know whether A is zero or not, they necessarily decohere the 2 terms in the superposition 0 0 R A Sender- receiver entanglement E E’B LALA LBLB Local Environment Output fidelity evaluated here. Non tensor product RA input  NTP = (  00   m + (   j j   d )  m ) /  to attempted simulation of n instances of Clueless-Eve Channel  0  A    j j  BE    d   j  A   0 j  BE SLIDE STOLEN FROM CHARLIE BENNETT

Spread: where to buy it 1. Classical communication in either direction: |x i A |x i B |  i AB ­ n ! |x i A |x i B |  i ­ x |00 i ­ n-x uses POVM with elements 2. embezzle it! [q-ph/ , Hayden-van Dam] spread n with error  using a size S=n/  embezzling state

s-bits?? In some ways, spread smells like a resource. Example: The spread capacity of a unitary gate U is E(U) + E(U y ). This is a lower bound on the number of cbits needed to simulate U, even given free entanglement. (Corollary: to prove E(U) À C + (U), we can’t use simulation-based upper bounds.) (Interesting aside: E(U)+E(U^\dag) also upper-bounds C_+^E(U) [Berry&Sanders, q-ph/ ] ) But it has no canonical instantiation! -cbits are too strong -partially entangled states: |  i ­ n scales as p n, and isn’t known to be universal -embezzling states are non-i.i.d. and give big errors -unitaries are too strong (unless E(U) À C + (U)…)