-
Modified Axelrod Model Showing Opinion Convergence And Polarization In Realistic Scale-Free Networks
Authors:
X. Zou,
H. F. Chau
Abstract:
Axelrod model is an opinion dynamics model such that each agent on a two-dimensional lattice has a finite number of possible opinions. The model is not realistic as all agents will eventually share the same opinion on every issue. Here we identify certain limitations inherent in the Axelrod model and address them by modifying some of the model's rules. Specifically, by considering agents in a scal…
▽ More
Axelrod model is an opinion dynamics model such that each agent on a two-dimensional lattice has a finite number of possible opinions. The model is not realistic as all agents will eventually share the same opinion on every issue. Here we identify certain limitations inherent in the Axelrod model and address them by modifying some of the model's rules. Specifically, by considering agents in a scale-free network and incorporating a more realistic interaction rule with continuous values representing agents' opinions, our modified model offers a more comprehensive exploration of opinion dynamics. Computer simulation of our model shows a notable trend in opinion polarization on all features in the majority of reasonable simulation parameters. To mitigate this polarization, we introduce agents that work actively to reduce opinion differences. However, our findings indicate limited success in the approach. This research contributes to the understanding of opinion dynamics within society and highlights the nuanced complexities that arise when considering factors such as network structure and continuous opinion values. Our results prompt further exploration and open avenues for future investigations into effective methods of reducing opinion polarization.
△ Less
Submitted 30 December, 2024;
originally announced January 2025.
-
Fully Passive Quantum Conference Key Agreement
Authors:
Jinjie Li,
Wenyuan Wang,
H. F. Chau
Abstract:
Quantum Conference Key Agreement (CKA) provides a secure method for multi-party communication. A recently developed interference-based prepare-and-measure quantum CKA possesses the advantages of measurement-device-independence, namely, being immune to side-channels from the detector side. Besides, it achieves good key rate performance, especially for high-loss channels, due to the use of single ph…
▽ More
Quantum Conference Key Agreement (CKA) provides a secure method for multi-party communication. A recently developed interference-based prepare-and-measure quantum CKA possesses the advantages of measurement-device-independence, namely, being immune to side-channels from the detector side. Besides, it achieves good key rate performance, especially for high-loss channels, due to the use of single photon interference. Meanwhile, several fully passive QKD schemes have been proposed, which eliminate all side channels from the source modulation side. We extend the fully passive idea to an interference-based CKA, which has a high level of implementation security for many-user communication.
△ Less
Submitted 9 September, 2024; v1 submitted 22 July, 2024;
originally announced July 2024.
-
One-Shot Min-Entropy Calculation Of Classical-Quantum States And Its Application To Quantum Cryptography
Authors:
Rong Wang,
H. F. Chau
Abstract:
In quantum Shannon theory, various kinds of quantum entropies are used to characterize the capacities of noisy physical systems. Among them, min-entropy and its smooth version attract wide interest especially in the field of quantum cryptography as they can be used to bound the information obtained by an adversary. However, calculating the exact value or non-trivial bounds of min-entropy are extre…
▽ More
In quantum Shannon theory, various kinds of quantum entropies are used to characterize the capacities of noisy physical systems. Among them, min-entropy and its smooth version attract wide interest especially in the field of quantum cryptography as they can be used to bound the information obtained by an adversary. However, calculating the exact value or non-trivial bounds of min-entropy are extremely difficult because the composite system dimension may scale exponentially with the dimension of its subsystem. Here, we develop a one-shot lower bound calculation technique for the min-entropy of a classical-quantum state that is applicable to both finite and infinite dimensional reduced quantum states. Moreover, we show our technique is of practical interest in at least three situations. First, it offers an alternative tight finite-data analysis for the BB84 quantum key distribution scheme. Second, it gives the best finite-key bound known to date for a variant of device independent quantum key distribution protocol. Third, it provides a security proof for a novel source-independent continuous-variable quantum random number generation protocol. These results show the effectiveness and wide applicability of our approach.
△ Less
Submitted 10 June, 2025; v1 submitted 21 June, 2024;
originally announced June 2024.
-
Efficient Fault-Tolerant Single Qubit Gate Approximation And Universal Quantum Computation Without Using The Solovay-Kitaev Theorem
Authors:
H. F. Chau
Abstract:
Arbitrarily accurate fault-tolerant (FT) universal quantum computation can be carried out using the Clifford gates Z, S, CNOT plus the non-Clifford T gate. Moreover, a recent improvement of the Solovay-Kitaev theorem by Kuperberg implies that to approximate any single-qubit gate to an accuracy of $ε> 0$ requires $\text{O}(\log^c[1/ε])$ quantum gates with $c > 1.44042$. Can one do better? That was…
▽ More
Arbitrarily accurate fault-tolerant (FT) universal quantum computation can be carried out using the Clifford gates Z, S, CNOT plus the non-Clifford T gate. Moreover, a recent improvement of the Solovay-Kitaev theorem by Kuperberg implies that to approximate any single-qubit gate to an accuracy of $ε> 0$ requires $\text{O}(\log^c[1/ε])$ quantum gates with $c > 1.44042$. Can one do better? That was the question asked by Nielsen and Chuang in their quantum computation textbook. Specifically, they posted a challenge to efficiently approximate single-qubit gate, fault-tolerantly or otherwise, using $Ω(\log[1/ε])$ gates chosen from a finite set. Here I give a partial answer to this question by showing that this is possible using $\text{O}(\log[1/ε] \log\log[1/ε] \log\log\log[1/ε] \cdots)$ FT gates chosen from a finite set depending on the value of $ε$. The key idea is to construct an approximation of any phase gate in a FT way by recursion to any given accuracy $ε> 0$. This method is straightforward to implement, easy to understand, and interestingly does not involve the Solovay-Kitaev theorem.
△ Less
Submitted 30 June, 2024; v1 submitted 7 June, 2024;
originally announced June 2024.
-
A Unifying Quantum Speed Limit For Time-Independent Hamiltonian Evolution
Authors:
H. F. Chau,
Wenxin Zeng
Abstract:
Quantum speed limit (QSL) is the study of fundamental limits on the evolution time of quantum systems. For instance, under the action of a time-independent Hamiltonian, the evolution time between an initial and a final quantum state obeys various mutually complementary lower bounds. They include the Mandelstam-Tamm, Margolus-Levitin, Luo-Zhang, dual ML and Lee-Chau bounds. Here we show that the Ma…
▽ More
Quantum speed limit (QSL) is the study of fundamental limits on the evolution time of quantum systems. For instance, under the action of a time-independent Hamiltonian, the evolution time between an initial and a final quantum state obeys various mutually complementary lower bounds. They include the Mandelstam-Tamm, Margolus-Levitin, Luo-Zhang, dual ML and Lee-Chau bounds. Here we show that the Mandelstam-Tamm bound can be obtained by optimizing the Lee-Chau bound over a certain parameter. More importantly, we report a QSL that includes all the above bounds as special cases before optimizing over the physically meaningless reference energy level of a quantum system. This unifying bound depends on a certain parameter $p$. For any fixed $p$, we find all pairs of time-independent Hamiltonian and initial pure quantum state that saturate this unifying bound. More importantly, these pairs allow us to compute this bound accurately and efficiently using an oracle that returns certain $p$th moments related to the absolute value of energy of the quantum state. Moreover, this oracle can be simulated by a computationally efficient and accurate algorithm for finite-dimensional quantum systems as well as for certain infinite-dimensional quantum states with bounded and continuous energy spectra. This makes our computational method feasible in a lot of practical situations. We compare the performance of this bound for the case of a fixed $p$ as well as the case of optimizing over $p$ with existing QSLs. We find that if the dimension of the underlying Hilbert space is $\lesssim 2000$, our unifying bound optimized over $p$ can be computed accurately in a few minutes using Mathematica code with just-in-time compilation in a typical desktop. Besides, this optimized unifying QSL is at least as good as all the existing ones combined and can occasionally be a few percent to a few times better.
△ Less
Submitted 15 May, 2024; v1 submitted 12 October, 2023;
originally announced October 2023.
-
$\boldsymbol{α_{>}(ε) = α_{<}(ε)}$ For The Margolus-Levitin Quantum Speed Limit Bound
Authors:
H. F. Chau
Abstract:
The Margolus-Levitin (ML) bound says that for any time-independent Hamiltonian, the time needed to evolve from one quantum state to another is at least $πα(ε) / (2 \langle E-E_0 \rangle)$, where $\langle E-E_0 \rangle$ is the expected energy of the system relative to the ground state of the Hamiltonian and $α(ε)$ is a function of the fidelity $ε$ between the two state. For a long time, only a uppe…
▽ More
The Margolus-Levitin (ML) bound says that for any time-independent Hamiltonian, the time needed to evolve from one quantum state to another is at least $πα(ε) / (2 \langle E-E_0 \rangle)$, where $\langle E-E_0 \rangle$ is the expected energy of the system relative to the ground state of the Hamiltonian and $α(ε)$ is a function of the fidelity $ε$ between the two state. For a long time, only a upper bound $α_{>}(ε)$ and lower bound $α_{<}(ε)$ are known although they agree up to at least seven significant figures. Lately, Hörnedal and Sönnerborn proved an analytical expression for $α(ε)$, fully classified systems whose evolution times saturate the ML bound, and gave this bound a symplectic-geometric interpretation. Here I solve the same problem through an elementary proof of the ML bound. By explicitly finding all the states that saturate the ML bound, I show that $α_{>}(ε)$ is indeed equal to $α_{<}(ε)$. More importantly, I point out a numerical stability issue in computing $α_{>}(ε)$ and report a simple way to evaluate it efficiently and accurately.
△ Less
Submitted 4 October, 2023; v1 submitted 17 May, 2023;
originally announced May 2023.
-
Reducing The Impact Of Adaptive Optics Lag On Optical And Quantum Communications Rates From Rapidly Moving Sources
Authors:
Kai Sum Chan,
H. F. Chau
Abstract:
Wavefront of light passing through turbulent atmosphere gets distorted. This causes signal loss in free-space optical communication as the light beam spreads and wanders at the receiving end. Frequency and/or time division multiplexing adaptive optics (AO) techniques have been used to conjugate this kind of wavefront distortion. However, if the signal beam moves relative to the atmosphere, the AO…
▽ More
Wavefront of light passing through turbulent atmosphere gets distorted. This causes signal loss in free-space optical communication as the light beam spreads and wanders at the receiving end. Frequency and/or time division multiplexing adaptive optics (AO) techniques have been used to conjugate this kind of wavefront distortion. However, if the signal beam moves relative to the atmosphere, the AO system performance degrades due to high temporal anisoplanatism. Here we solve this problem by adding a pioneer beacon that is spatially separated from the signal beam with time delay between spatially separated pulses. More importantly, our protocol works irrespective of the signal beam intensity and hence is also applicable to secret quantum communication. In particular, using semi-empirical atmospheric turbulence calculation, we show that for low earth orbit satellite-to-ground decoy state quantum key distribution with the satellite at zenith angle $< 30^\circ$, our method increases the key rate by at least $215\%$ and $40\%$ for satellite altitude $400$~km and $800$~km, respectively. Finally, we propose a modification of existing wavelength division multiplexing systems as an effective alternative solution to this problem.
△ Less
Submitted 8 April, 2023; v1 submitted 24 June, 2022;
originally announced June 2022.
-
Quantum and Classical Data Transmission through Completely Depolarising Channels in a Superposition of Cyclic Orders
Authors:
Giulio Chiribella,
Matt Wilson,
H. F. Chau
Abstract:
Completely depolarising channels are often regarded as the prototype of physical processes that are useless for communication: any message that passes through them along a well-defined trajectory is completely erased. When two such channels are used in a quantum superposition of two alternative orders, they become able to transmit some amount of classical information, but still no quantum informat…
▽ More
Completely depolarising channels are often regarded as the prototype of physical processes that are useless for communication: any message that passes through them along a well-defined trajectory is completely erased. When two such channels are used in a quantum superposition of two alternative orders, they become able to transmit some amount of classical information, but still no quantum information can pass through them. Here we show that the ability to place N completely depolarising channels in a superposition of N alternative causal orders enables a high-fidelity, heralded transmission of quantum information with error vanishing as 1/N. This phenomenon highlights a fundamental difference with the N = 2 case, where completely depolarising channels are unable to transmit quantum data, even when placed in a superposition of causal orders. The ability to place quantum channels in a superposition of orders also leads to an increase of the classical communication capacity with N, which we rigorously prove by deriving an exact single-letter expression. Our results highlight the more complex patterns of correlations arising from multiple causal orders, which are similar to the more complex patterns of entanglement arising in multipartite quantum systems.
△ Less
Submitted 6 October, 2021; v1 submitted 1 May, 2020;
originally announced May 2020.
-
Security Of Finite-Key-Length Measurement-Device-Independent Quantum Key Distribution Using Arbitrary Number Of Decoys
Authors:
H. F. Chau
Abstract:
In quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak Poissonian sources, respectively. Investigations so far are not comprehensive as they restrict to less than or equal to four decoy states. Moreover, many of them involves pure numerical studies. Here I…
▽ More
In quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak Poissonian sources, respectively. Investigations so far are not comprehensive as they restrict to less than or equal to four decoy states. Moreover, many of them involves pure numerical studies. Here I report a general security proof that works for any fixed number of decoy states and any fixed raw key length. The two key ideas involved here. The first one is the repeated application of the inversion formula for Vandermonde matrix to obtain various bounds on certain yields and error rates. The second one is the use of a recently proven generalization of the McDiarmid inequality. These techniques rise the best provably secure key rate of the measurement-device-independent version of the BB84 scheme by at least 1.25 times and increase the workable distance between the two cooperative agents from slightly less than 60 km to slightly greater than 130 km in case there are $10^{10}$ photon pulse pair sent without a quantum repeater.
△ Less
Submitted 24 June, 2020; v1 submitted 18 March, 2020;
originally announced March 2020.
-
Application of an Improved Version of McDiarmid Inequality in Finite-Key-Length Decoy-State Quantum Key Distribution
Authors:
H. F. Chau,
K. C. Joseph Ng
Abstract:
In practical decoy-state quantum key distribution, the raw key length is finite. Thus, deviation of the estimated single photon yield and single photon error rate from their respective true values due to finite sample size can seriously lower the provably secure key rate $R$. Current method to obtain a lower bound of $R$ follows an indirect path by first bounding the yields and error rates both co…
▽ More
In practical decoy-state quantum key distribution, the raw key length is finite. Thus, deviation of the estimated single photon yield and single photon error rate from their respective true values due to finite sample size can seriously lower the provably secure key rate $R$. Current method to obtain a lower bound of $R$ follows an indirect path by first bounding the yields and error rates both conditioned on the type of decoy used. These bounds are then used to deduce the single photon yield and error rate, which in turn are used to calculate a lower bound of the key rate $R$. Here we report an improved version of McDiarmid inequality in statistics and show how use it to directly compute a lower bound of $R$ via the so-called centering sequence. A novelty in this work is the optimization of the bound through the freedom of choosing possible centering sequences. The provably secure key rate of realistic 100~km long quantum channel obtained by our method is at least twice that of the state-of-the-art procedure when the raw key length $\ell_\text{raw}$ is $\approx 10^5$ to $10^6$. In fact, our method can improve the key rate significantly over a wide range of raw key length from about $10^5$ to $10^{11}$. More importantly, it is achieved by pure theoretical analysis without altering the experimental setup or the post-processing method. In a boarder context, this work introduces powerful concentration inequality techniques in statistics to tackle physics problem beyond straightforward statistical data analysis especially when the data are correlated so that tools like the central limit theorem are not applicable.
△ Less
Submitted 13 January, 2020; v1 submitted 28 June, 2019;
originally announced June 2019.
-
Chau-Wang-Wong17 Scheme Is Experimentally More Feasible Than The Six-State Scheme
Authors:
H. F. Chau,
Zhen-Qiang Yin,
Shuang Wang,
Wei Chen,
Zheng-Fu Han
Abstract:
Recently, Chau et al. [Phys. Rev. A 95, 022311 (2017)] reported a quantum-key-distribution (QKD) scheme using four-dimensional qudits. Surprisingly, as a function of the bit error rate of the raw key, the secret key rate of this scheme is equal to that of the (qubit-based) six-state scheme under one-way classical communication using ideal apparatus in the limit of arbitrarily long raw key length.…
▽ More
Recently, Chau et al. [Phys. Rev. A 95, 022311 (2017)] reported a quantum-key-distribution (QKD) scheme using four-dimensional qudits. Surprisingly, as a function of the bit error rate of the raw key, the secret key rate of this scheme is equal to that of the (qubit-based) six-state scheme under one-way classical communication using ideal apparatus in the limit of arbitrarily long raw key length. Here we explain why this is the case in spite of the fact that these two schemes are not linearly related to each other. More importantly, we find that in terms of the four-dimensional dit error rate of the raw key, the Chau et al.'s scheme can tolerate up to 21.6% using one-way classical communications, which is better than the Sheridan and Scarani's scheme [Phys. Rev. A 82, 030301(R) (2010)]. In addition, we argue the experimental advantages of the Chau et al. implementation over the standard six-state scheme and report a corresponding proof-of-principle experiment using passive basis selection with decoy states. We also compare our experiment with the recent high secret key rate implementation of the Sheridan and Scarani's scheme by Islam et al. [Sci. Adv. \text{3}, e1701491].
△ Less
Submitted 21 March, 2019;
originally announced March 2019.
-
Application Of McDiarmid Inequality In Finite-Key-Length Decoy-State Quantum Key Distribution
Authors:
H. F. Chau
Abstract:
In practical decoy-state quantum key distribution, the raw key length is finite. Thus, deviation of the estimated single photon yield and single photon error rate from their respective true values due to finite sample size can seriously lower the provably secure key rate $R$. Current method to obtain a lower bound of $R$ follows an indirect path by first bounding the yields and error rates both co…
▽ More
In practical decoy-state quantum key distribution, the raw key length is finite. Thus, deviation of the estimated single photon yield and single photon error rate from their respective true values due to finite sample size can seriously lower the provably secure key rate $R$. Current method to obtain a lower bound of $R$ follows an indirect path by first bounding the yields and error rates both conditioned on the type of decoy used. These bounds are then used to deduce the single photon yield and error rate, which in turn are used to calculate a lower bound of the key rate $R$. Here I show how to directly compute a lower bound of $R$ via McDiarmid inequality in statistics. This method increases the provably secure key rate of realistic quantum channels by at least 30% when the raw key length is $\approx 10^5$ to $10^6$. More importantly, this is achieved by pure theoretical analysis without altering the experimental setup or the post-processing method. In a boarder context, this work introduces powerful concentration inequality techniques in statistics to tackle physics problem beyond straightforward statistical data analysis.
△ Less
Submitted 13 June, 2018;
originally announced June 2018.
-
Decoy State Quantum Key Distribution With More Than Three Types Of Photon Intensity Pulses
Authors:
H. F. Chau
Abstract:
Decoy state method closes source security loophole in quantum key distribution (QKD) using laser source. In this method, accurate estimates of the detection rates of vacuum and single photon events plus the error rate of single photon events are needed to give a good enough lower bound of the secret key rate. Nonetheless, the current estimation method for these detection and error rates, which use…
▽ More
Decoy state method closes source security loophole in quantum key distribution (QKD) using laser source. In this method, accurate estimates of the detection rates of vacuum and single photon events plus the error rate of single photon events are needed to give a good enough lower bound of the secret key rate. Nonetheless, the current estimation method for these detection and error rates, which uses three types of photon intensities, is accurate up to about 1% relative error. Here I report an experimentally feasible way that greatly improves these estimates and hence increases the one-way key rate of the BB84 QKD protocol with unbiased bases selection by at least 20% on average in realistic settings. The major tricks are the use of more than three types of photon intensities plus the fact that estimating bounds of the above detection and error rates is numerically stable although these bounds are related to the inversion of a high condition number matrix.
△ Less
Submitted 23 March, 2018; v1 submitted 3 December, 2017;
originally announced December 2017.
-
Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme
Authors:
Shuang Wang,
Zhen-Qiang Yin,
H. F. Chau,
Wei Chen,
Chao Wang,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
In comparison to qubit-based protocols, qudit-based quantum key distribution (QKD) ones gen- erally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based proto- col known…
▽ More
In comparison to qubit-based protocols, qudit-based quantum key distribution (QKD) ones gen- erally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based proto- col known as the Chau15 [1]. Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Ref. [1] relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol.
△ Less
Submitted 2 July, 2017;
originally announced July 2017.
-
Qudit-Based Measurement-Device-Independent Quantum Key Distribution Using Linear Optics
Authors:
H. F. Chau,
Cardythy Wong,
Qinan Wang,
Tieqiao Huang
Abstract:
Measurement-device-independent (MDI) method is a way to solve all detector side-channel attacks in quantum key distribution (QKD). However, very little work has been done on experimentally feasible qudit-based MDI-QKD scheme although the famous (qudit-based) round-robin differential-phase-shift (RRDPS) scheme is vulnerable to attacks on uncharacterized detectors. Here we report a mother-of-all QKD…
▽ More
Measurement-device-independent (MDI) method is a way to solve all detector side-channel attacks in quantum key distribution (QKD). However, very little work has been done on experimentally feasible qudit-based MDI-QKD scheme although the famous (qudit-based) round-robin differential-phase-shift (RRDPS) scheme is vulnerable to attacks on uncharacterized detectors. Here we report a mother-of-all QKD protocol on which all provably secure qubit-based QKD schemes known to date including the RRDPS and the so-called Chau15 schemes are based. We also report an experimentally feasible MDI system via optical implementation of entanglement swapping based on a recent qudit teleportation proposal by Goyal et al. In this way, we show that all provably secure qudit-based QKD schemes discovered to date can be made MDI.
△ Less
Submitted 30 August, 2016;
originally announced August 2016.
-
Experimentally Feasible Quantum-Key-Distribution Scheme Using Qubit-Like Qudits And Its Comparison With Existing Qubit- and Qudit-Based Protocols
Authors:
H. F. Chau,
Qinan Wang,
Cardythy Wong
Abstract:
Recently, Chau introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a $2^n$-dimensional Hilbert space in the form $(|i\rangle\pm|j\rangle)/\sqrt{2}$ with $n\ge 2$. For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtaine…
▽ More
Recently, Chau introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a $2^n$-dimensional Hilbert space in the form $(|i\rangle\pm|j\rangle)/\sqrt{2}$ with $n\ge 2$. For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtained in the absence of transmission error. Here we show that by modifying the basis announcement procedure, the same experimental setup can generate $n$ bits of raw key for each qudit prepared and measured in the same basis in the noiseless situation. The reason is that in addition to the phase information, each qudit also carries information on the Hilbert subspace used. The additional $(n-1)$ bits of raw key comes from a clever utilization of this extra piece of information. We prove the unconditional security of this modified protocol and compare its performance with other existing provably secure qubit- and qudit-based protocols on market in the one-way classical communication setting. Interestingly, we find that for the case of $n=2$, the secret key rate of this modified protocol using non-degenerate random quantum code to perform one-way entanglement distillation is equal to that of the six-state scheme.
△ Less
Submitted 8 February, 2017; v1 submitted 7 March, 2016;
originally announced March 2016.
-
State-Independent Error-Disturbance Tradeoff For Measurement Operators
Authors:
S. S. Zhou,
Shengjun Wu,
H. F. Chau
Abstract:
In general, classical measurement statistics of a quantum measurement is disturbed by performing an additional incompatible quantum measurement beforehand. Using this observation, we introduce a state-independent definition of disturbance by relating it to the distinguishability problem between two classical statistical distributions --- one resulting from a single quantum measurement and the othe…
▽ More
In general, classical measurement statistics of a quantum measurement is disturbed by performing an additional incompatible quantum measurement beforehand. Using this observation, we introduce a state-independent definition of disturbance by relating it to the distinguishability problem between two classical statistical distributions --- one resulting from a single quantum measurement and the other from a succession of two quantum measurements. Interestingly, we find an error-disturbance trade-off relation for any measurements in two-dimensional Hilbert space and for measurements with mutually unbiased bases in any finite-dimensional Hilbert space. This relation shows that error should be reduced to zero in order to minimize the sum of error and disturbance. We conjecture that a similar trade-off relation can be generalized to any measurements in an arbitrary finite-dimensional Hilbert space.
△ Less
Submitted 13 September, 2015;
originally announced September 2015.
-
Quantum Key Distribution Using Qudits Each Encoding One Bit Of Raw Key
Authors:
H. F. Chau
Abstract:
All known qudit-based prepare-and-measure quantum key distribution (PM-QKD) schemes are more error resilient than their qubit-based counterparts. Their high error resiliency comes partly from the careful encoding of multiple bits of signals used to generate the raw key in each transmitted qudit so that the same eavesdropping attempt causes a higher bit error rate (BER) in the raw key. Here I show…
▽ More
All known qudit-based prepare-and-measure quantum key distribution (PM-QKD) schemes are more error resilient than their qubit-based counterparts. Their high error resiliency comes partly from the careful encoding of multiple bits of signals used to generate the raw key in each transmitted qudit so that the same eavesdropping attempt causes a higher bit error rate (BER) in the raw key. Here I show that highly error-tolerant PM-QKD schemes can be constructed simply by encoding one bit of classical information in each transmitted qudit in the form $(|i\rangle\pm|j\rangle)/\sqrt{2}$, where $|i\rangle$'s form an orthonormal basis of the $2^n$-dimensional Hilbert space. Moreover, I prove that these schemes can tolerate up to the theoretical maximum of 50\% BER for $n\ge 2$ provided that the raw key is generated under a certain technical condition, making them the most error-tolerant PM-QKD schemes involving the transmission of unentangled finite-dimensional qudits to date. This shows the potential of processing quantum information using lower-dimensional quantum signals encoded in a higher-dimensional quantum state.
△ Less
Submitted 20 November, 2015; v1 submitted 14 July, 2015;
originally announced July 2015.
-
No Superluminal Signaling Implies Unconditionally Secure Bit Commitment
Authors:
H. F. Chau,
C. -H. Fred Fung,
H. -K. Lo
Abstract:
Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple, reliable, easy to implement using existing technologies, and most importantly unconditionally secure in the sense that its security is based on a…
▽ More
Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple, reliable, easy to implement using existing technologies, and most importantly unconditionally secure in the sense that its security is based on an information-theoretic proof rather than computational complexity assumption or the existence of a trustworthy arbitrator. Here we report such a provably secure scheme involving only one-way classical communications whose unconditional security is based on no superluminal signaling (NSS). Our scheme is inspired by the earlier works by Kent, who proposed two impractical relativistic protocols whose unconditional securities are yet to be established as well as several provably unconditionally secure protocols which rely on both quantum mechanics and NSS. Our scheme is conceptually simple and shows for the first time that quantum communication is not needed to achieve unconditional security for BC. Moreover, with purely classical communications, our scheme is practical and easy to implement with existing telecom technologies. This completes the cycle of study of unconditionally secure bit commitment based on known physical laws.
△ Less
Submitted 18 November, 2014; v1 submitted 1 May, 2014;
originally announced May 2014.
-
Solution to time-energy costs of quantum channels
Authors:
Chi-Hang Fred Fung,
H. F. Chau,
Chi-Kwong Li,
Nung-Sing Sze
Abstract:
We derive a formula for the time-energy costs of general quantum channels proposed in [Phys. Rev. A 88, 012307 (2013)]. This formula allows us to numerically find the time-energy cost of any quantum channel using positive semidefinite programming. We also derive a lower bound to the time-energy cost for any channels and the exact the time-energy cost for a class of channels which includes the qudi…
▽ More
We derive a formula for the time-energy costs of general quantum channels proposed in [Phys. Rev. A 88, 012307 (2013)]. This formula allows us to numerically find the time-energy cost of any quantum channel using positive semidefinite programming. We also derive a lower bound to the time-energy cost for any channels and the exact the time-energy cost for a class of channels which includes the qudit depolarizing channels and projector channels as special cases.
△ Less
Submitted 16 December, 2014; v1 submitted 16 April, 2014;
originally announced April 2014.
-
Physical time-energy cost of a quantum process determines its information fidelity
Authors:
Chi-Hang Fred Fung,
H. F. Chau
Abstract:
A quantum system can be described and characterized by at least two different concepts, namely, its physical and informational properties. Here, we explicitly connect these two concepts, by equating the time-energy cost which is the product of the largest energy of a Hamiltonian of quantum dynamics and the evolution time, and the entanglement fidelity which is the informational difference between…
▽ More
A quantum system can be described and characterized by at least two different concepts, namely, its physical and informational properties. Here, we explicitly connect these two concepts, by equating the time-energy cost which is the product of the largest energy of a Hamiltonian of quantum dynamics and the evolution time, and the entanglement fidelity which is the informational difference between an input state and the corresponding output state produced by a quantum channel characterized by the Hamiltonian. Specifically, the worst-case entanglement fidelity between the input and output states is exactly the cosine of the channel's time-energy cost (except when the fidelity is zero). The exactness of our relation makes a strong statement about the intimate connection between information and physics. Our exact result may also be regarded as a time-energy uncertainty relation for the fastest state that achieves a certain fidelity.
△ Less
Submitted 25 August, 2014; v1 submitted 12 April, 2014;
originally announced April 2014.
-
Time-Energy Costs of Quantum Measurements
Authors:
Chi-Hang Fred Fung,
H. F. Chau
Abstract:
Time and energy of quantum processes are a tradeoff against each other. We propose to ascribe to any given quantum process a time-energy cost to quantify how much computation it performs. Here, we analyze the time-energy costs for general quantum measurements, along a similar line as our previous work for quantum channels, and prove exact and lower bound formulae for the costs. We use these formul…
▽ More
Time and energy of quantum processes are a tradeoff against each other. We propose to ascribe to any given quantum process a time-energy cost to quantify how much computation it performs. Here, we analyze the time-energy costs for general quantum measurements, along a similar line as our previous work for quantum channels, and prove exact and lower bound formulae for the costs. We use these formulae to evaluate the efficiencies of actual measurement implementations. We find that one implementation for a Bell measurement is optimal in time-energy. We also analyze the time-energy cost for unambiguous state discrimination and find evidence that only a finite time-energy cost is needed to distinguish any number of states.
△ Less
Submitted 8 May, 2014; v1 submitted 20 February, 2014;
originally announced February 2014.
-
Conditions for degradability of tripartite quantum states
Authors:
Chi-Hang Fred Fung,
Chi-Kwong Li,
Nung-Sing Sze,
H. F. Chau
Abstract:
Alice, Bob, and Eve share a pure quantum state. We introduce the notion of state degradability by asking whether the joint density of Alice and Eve can be transformed to the joint density of Alice and Bob by processing Eve's part through a quantum channel, in order words, degrading Eve. We prove necessary and sufficient conditions for state degradability and provide an efficient method to quickly…
▽ More
Alice, Bob, and Eve share a pure quantum state. We introduce the notion of state degradability by asking whether the joint density of Alice and Eve can be transformed to the joint density of Alice and Bob by processing Eve's part through a quantum channel, in order words, degrading Eve. We prove necessary and sufficient conditions for state degradability and provide an efficient method to quickly rule out degradability for a given state. The problem of determining degradability of states is different from that of quantum channels, although the notion is similar. One application of state degradability is that it can be used to test channel degradability. In particular, the degradability of the output state of a channel obtained from the maximally entangled input state gives information about the degradability of the channel.
△ Less
Submitted 9 February, 2014; v1 submitted 29 August, 2013;
originally announced August 2013.
-
Social Judgment Theory Based Model On Opinion Formation, Polarization And Evolution
Authors:
H. F. Chau,
C. Y. Wong,
F. K. Chow,
C. -H. F. Fung
Abstract:
The dynamical origin of opinion polarization in the real world is an interesting topic physical scientists may help to understand. To properly model the dynamics, the theory must be fully compatible with findings by social psychologists on microscopic opinion change. Here we introduce a generic model of opinion formation with homogeneous agents based on the well-known social judgment theory in soc…
▽ More
The dynamical origin of opinion polarization in the real world is an interesting topic physical scientists may help to understand. To properly model the dynamics, the theory must be fully compatible with findings by social psychologists on microscopic opinion change. Here we introduce a generic model of opinion formation with homogeneous agents based on the well-known social judgment theory in social psychology by extending a similar model proposed by Jager and Amblard. The agents' opinions will eventually cluster around extreme and/or moderate opinions forming three phases in a two-dimensional parameter space that describes the microscopic opinion response of the agents. The dynamics of this model can be qualitatively understood by mean-field analysis. More importantly, first-order phase transition in opinion distribution is observed by evolving the system under a slow change in the system parameters, showing that punctuated equilibria in public opinion can occur even in a fully connected social network.
△ Less
Submitted 26 July, 2014; v1 submitted 9 August, 2013;
originally announced August 2013.
-
Time-Energy Measure for Quantum Processes
Authors:
Chi-Hang Fred Fung,
H. F. Chau
Abstract:
Quantum mechanics sets limits on how fast quantum processes can run given some system energy through time-energy uncertainty relations, and they imply that time and energy are tradeoff against each other. Thus, we propose to measure the time-energy as a single unit for quantum channels. We consider a time-energy measure for quantum channels and compute lower and upper bounds of it using the channe…
▽ More
Quantum mechanics sets limits on how fast quantum processes can run given some system energy through time-energy uncertainty relations, and they imply that time and energy are tradeoff against each other. Thus, we propose to measure the time-energy as a single unit for quantum channels. We consider a time-energy measure for quantum channels and compute lower and upper bounds of it using the channel Kraus operators. For a special class of channels (which includes the depolarizing channel), we can obtain the exact value of the time-energy measure. One consequence of our result is that erasing quantum information requires $\sqrt{(n+1)/n}$ times more time-energy resource than erasing classical information, where $n$ is the system dimension.
△ Less
Submitted 9 July, 2013; v1 submitted 24 May, 2013;
originally announced May 2013.
-
Quantum Speed Limit With Forbidden Speed Intervals
Authors:
H. F. Chau
Abstract:
Quantum mechanics imposes fundamental constraints known as quantum speed limits (QSLs) on the information processing speed of all quantum systems. Every QSL known to date comes from the restriction imposed on the evolution time between two quantum states through the value of a single system observable such as the mean energy relative to its ground state. So far these restrictions only place upper…
▽ More
Quantum mechanics imposes fundamental constraints known as quantum speed limits (QSLs) on the information processing speed of all quantum systems. Every QSL known to date comes from the restriction imposed on the evolution time between two quantum states through the value of a single system observable such as the mean energy relative to its ground state. So far these restrictions only place upper bounds on the information processing speed of a quantum system. Here I report QSLs each with permissible information processing speeds separated by forbidden speed intervals. They are found by a systematic and efficient procedure that takes the values of several compatible system observables into account simultaneously. This procedure generalizes almost all existing QSL proofs; and the new QSLs show a novel first order phase transition in the minimum evolution time.
△ Less
Submitted 21 May, 2013; v1 submitted 2 January, 2013;
originally announced January 2013.
-
Disguising quantum channels by mixing and channel distance trade-off
Authors:
Chi-Hang Fred Fung,
H. F. Chau
Abstract:
We consider the reverse problem to the distinguishability of two quantum channels, which we call the disguising problem. Given two quantum channels, the goal here is to make the two channels identical by mixing with some other channels with minimal mixing probabilities. This quantifies how much one channel can disguise as the other. In addition, the possibility to trade off between the two mixing…
▽ More
We consider the reverse problem to the distinguishability of two quantum channels, which we call the disguising problem. Given two quantum channels, the goal here is to make the two channels identical by mixing with some other channels with minimal mixing probabilities. This quantifies how much one channel can disguise as the other. In addition, the possibility to trade off between the two mixing probabilities allows one channel to be more preserved (less mixed) at the expense of the other. We derive lower- and upper-bounds of the trade-off curve and apply them to a few example channels. Optimal trade-off is obtained in one example. We relate the disguising problem and the distinguishability problem by showing the the former can lower and upper bound the diamond norm. We also show that the disguising problem gives an upper bound on the key generation rate in quantum cryptography.
△ Less
Submitted 9 February, 2014; v1 submitted 5 November, 2012;
originally announced November 2012.
-
Entanglement transformation between sets of bipartite pure quantum states using local operations
Authors:
H. F. Chau,
Chi-Hang Fred Fung,
Chi-Kwong Li,
Edward Poon,
Nung-Sing Sze
Abstract:
Alice and Bob are given an unknown initial state chosen from a set of pure quantum states. Their task is to transform the initial state to a corresponding final pure state using local operations only. We prove necessary and sufficient conditions on the existence of such a transformation. We also provide efficient algorithms that can quickly rule out the possibility of transforming a set of initial…
▽ More
Alice and Bob are given an unknown initial state chosen from a set of pure quantum states. Their task is to transform the initial state to a corresponding final pure state using local operations only. We prove necessary and sufficient conditions on the existence of such a transformation. We also provide efficient algorithms that can quickly rule out the possibility of transforming a set of initial states to a set of final states.
△ Less
Submitted 12 October, 2012; v1 submitted 5 August, 2012;
originally announced August 2012.
-
Relation Between Quantum Speed Limits And Metrics On U(n)
Authors:
Kai-Yan Lee,
H. F. Chau
Abstract:
Recently, Chau [Quant. Inform. & Comp. 11, 721 (2011)] found a family of metrics and pseudo-metrics on $n$-dimensional unitary operators that can be interpreted as the minimum resources (given by certain tight quantum speed limit bounds) needed to transform one unitary operator to another. This result is closely related to the weighted $\ell^1$-norm on ${\mathbb R}^n$. Here we generalize this find…
▽ More
Recently, Chau [Quant. Inform. & Comp. 11, 721 (2011)] found a family of metrics and pseudo-metrics on $n$-dimensional unitary operators that can be interpreted as the minimum resources (given by certain tight quantum speed limit bounds) needed to transform one unitary operator to another. This result is closely related to the weighted $\ell^1$-norm on ${\mathbb R}^n$. Here we generalize this finding by showing that every weighted $\ell^p$-norm on ${\mathbb R}^n$ with $1\le p \le \limitingp$ induces a metric and a pseudo-metric on $n$-dimensional unitary operators with quantum information-theoretic meanings related to certain tight quantum speed limit bounds. Besides, we investigate how far the correspondence between the existence of metrics and pseudo-metrics of this type and the quantum speed limits can go.
△ Less
Submitted 12 November, 2012; v1 submitted 9 February, 2012;
originally announced February 2012.
-
Structural Characterization And Condition For Measurement Statistics Preservation Of A Unital Quantum Operation
Authors:
Kai-Yan Lee,
Chi-Hang Fred Fung,
H. F. Chau
Abstract:
We investigate the necessary and sufficient condition for a convex cone of positive semidefinite operators to be fixed by a unital quantum operation $φ$ acting on finite-dimensional quantum states. By reducing this problem to the problem of simultaneous diagonalization of the Kraus operators associated with $φ$, we can completely characterize the kind of quantum states that are fixed by $φ$. Our w…
▽ More
We investigate the necessary and sufficient condition for a convex cone of positive semidefinite operators to be fixed by a unital quantum operation $φ$ acting on finite-dimensional quantum states. By reducing this problem to the problem of simultaneous diagonalization of the Kraus operators associated with $φ$, we can completely characterize the kind of quantum states that are fixed by $φ$. Our work has several applications. It gives a simple proof of the structural characterization of a unital quantum operation that acts on finite-dimensional quantum states --- a result not explicitly mentioned in earlier studies. It also provides a necessary and sufficient condition for what kind of measurement statistics is preserved by a unital quantum operation. Finally, our result clarifies and extends the work of Størmer by giving a proof of a reduction theorem on the unassisted and entanglement-assisted classical capacities, coherent information, and minimal output Renyi entropy of a unital channel acting on finite-dimensional quantum state.
△ Less
Submitted 15 April, 2013; v1 submitted 5 December, 2011;
originally announced December 2011.
-
Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol
Authors:
Chi-Hang Fred Fung,
Xiongfeng Ma,
H. F. Chau,
Qing-yu Cai
Abstract:
Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA ha…
▽ More
Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.
△ Less
Submitted 9 March, 2012; v1 submitted 18 November, 2011;
originally announced November 2011.
-
Induced Metric And Matrix Inequalities On Unitary Matrices
Authors:
H. F. Chau,
C. -K. Li,
Y. -T. Poon,
N. -S. Sze
Abstract:
Recently, Chau [Quant. Inform. & Comp. 11, 721 (2011)] showed that one can define certain metrics and pseudo-metrics on U(n), the group of all $n\times n$ unitary matrices, based on the arguments of the eigenvalues of the unitary matrices. More importantly, these metrics and pseudo-metrics have quantum information theoretical meanings. So it is instructive to study this kind of metrics and pseudo-…
▽ More
Recently, Chau [Quant. Inform. & Comp. 11, 721 (2011)] showed that one can define certain metrics and pseudo-metrics on U(n), the group of all $n\times n$ unitary matrices, based on the arguments of the eigenvalues of the unitary matrices. More importantly, these metrics and pseudo-metrics have quantum information theoretical meanings. So it is instructive to study this kind of metrics and pseudo-metrics on U(n). Here we show that any symmetric norm on ${\mathbb R}^n$ induces a metric on U(n). Furthermore, using the same technique, we prove an inequality concerning the eigenvalues of a product of two unitary matrices which generalizes a few inequalities obtained earlier by Chau [arXiv:1006.3614v1].
△ Less
Submitted 20 January, 2012; v1 submitted 6 July, 2011;
originally announced July 2011.
-
Comment on "Connection between entanglement and the speed of quantum evolution"
Authors:
H. F. Chau
Abstract:
Batle et al. [Phys. Rev. A {\bf 72}, 032337 (2005)] and Borrás et al. [Phys. Rev. A {\bf 74}, 022326 (2006)] studied the connection between entanglement and speed of quantum evolution for certain low-dimensional bipartite quantum states. However, their studies did not cover all possible cases. And the relation between entanglement and the maximum possible quantum evolution speed for these uncovere…
▽ More
Batle et al. [Phys. Rev. A {\bf 72}, 032337 (2005)] and Borrás et al. [Phys. Rev. A {\bf 74}, 022326 (2006)] studied the connection between entanglement and speed of quantum evolution for certain low-dimensional bipartite quantum states. However, their studies did not cover all possible cases. And the relation between entanglement and the maximum possible quantum evolution speed for these uncovered cases can very different from the ones that they have studied.
△ Less
Submitted 15 November, 2010;
originally announced November 2010.
-
Universal Squash Model For Optical Communications Using Linear Optics And Threshold Detectors
Authors:
Chi-Hang Fred Fung,
H. F. Chau,
Hoi-Kwong Lo
Abstract:
The transmission of photons through open-air or an optical fiber is an important primitive in quantum information processing. Theoretical description of such a transmission process often considers only a single photon as the information carrier and thus fails to accurately describe experimental optical implementations where any number of photons may enter a detector. It is important to bridge this…
▽ More
The transmission of photons through open-air or an optical fiber is an important primitive in quantum information processing. Theoretical description of such a transmission process often considers only a single photon as the information carrier and thus fails to accurately describe experimental optical implementations where any number of photons may enter a detector. It is important to bridge this big gap between experimental implementations and the theoretical description. One powerful method that emerges from recent efforts to achieve this goal is to consider a squash model that conceptually converts multi-photon states to single-photon states, thereby justifying the equivalence between theory and experiments. However, up to now, only a limited number of protocols admit a squash model; furthermore, a no-go theorem has been proven which appears to rule out the existence of a universal squash model. Here, we observe that an apparently necessary condition demanded by all existing squash models to preserve measurement statistics is too stringent a requirement for many protocols. By chopping this requirement, we show that rather surprisingly, a universal squash model actually exists for a wide range of protocols including quantum key distribution protocols, quantum state tomography, the testing of Bell's inequalities, and entanglement verification, despite the standard no-go theorem.
△ Less
Submitted 12 November, 2010;
originally announced November 2010.
-
Elementary Proofs Of Two Theorems Involving Arguments Of Eigenvalues Of A Product Of Two Unitary Matrices
Authors:
H. F. Chau,
Y. T. Lam
Abstract:
We give elementary proofs of two theorems concerning bounds on the maximum argument of the eigenvalues of a product of two unitary matrices --- one by Childs \emph{et al.} [J. Mod. Phys., \textbf{47}, 155 (2000)] and the other one by Chau [arXiv:1006.3614]. Our proofs have the advantages that the necessary and sufficient conditions for equalities are apparent and that they can be readily generaliz…
▽ More
We give elementary proofs of two theorems concerning bounds on the maximum argument of the eigenvalues of a product of two unitary matrices --- one by Childs \emph{et al.} [J. Mod. Phys., \textbf{47}, 155 (2000)] and the other one by Chau [arXiv:1006.3614]. Our proofs have the advantages that the necessary and sufficient conditions for equalities are apparent and that they can be readily generalized to the case of infinite-dimensional unitary operators.
△ Less
Submitted 21 April, 2011; v1 submitted 20 June, 2010;
originally announced June 2010.
-
Metrics On Unitary Matrices And Their Application To Quantifying The Degree Of Non-Commutativity Between Unitary Matrices
Authors:
H. F. Chau
Abstract:
By studying the minimum resources required to perform a unitary transformation, families of metrics and pseudo-metrics on unitary matrices that are closely related to a recently reported quantum speed limit by the author are found. Interestingly, this family of metrics can be naturally converted into useful indicators of the degree of non-commutativity between two unitary matrices.
By studying the minimum resources required to perform a unitary transformation, families of metrics and pseudo-metrics on unitary matrices that are closely related to a recently reported quantum speed limit by the author are found. Interestingly, this family of metrics can be naturally converted into useful indicators of the degree of non-commutativity between two unitary matrices.
△ Less
Submitted 6 July, 2011; v1 submitted 18 June, 2010;
originally announced June 2010.
-
Tight Upper Bound Of The Maximum Speed Of Evolution Of A Quantum State
Authors:
H. F. Chau
Abstract:
I report a tight upper bound of the maximum speed of evolution from one quantum state $ρ$ to another $ρ'$ with fidelity $F(ρ,ρ')$ less than or equal to an arbitrary but fixed value under the action of a time-independent Hamiltonian. Since the bound is directly proportional to the average absolute deviation from the median of the energy of the state ${\mathscr D}E$, one may interpret…
▽ More
I report a tight upper bound of the maximum speed of evolution from one quantum state $ρ$ to another $ρ'$ with fidelity $F(ρ,ρ')$ less than or equal to an arbitrary but fixed value under the action of a time-independent Hamiltonian. Since the bound is directly proportional to the average absolute deviation from the median of the energy of the state ${\mathscr D}E$, one may interpret ${\mathscr D}E$ as a meaningful measure of the maximum information processing capability of a system.
△ Less
Submitted 14 June, 2010; v1 submitted 3 March, 2010;
originally announced March 2010.
-
Practical issues in quantum-key-distribution post-processing
Authors:
Chi-Hang Fred Fung,
Xiongfeng Ma,
H. F. Chau
Abstract:
Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length o…
▽ More
Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical post-processing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments, and thus serves as a recipe that specifies what post-processing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.
△ Less
Submitted 29 December, 2009; v1 submitted 1 October, 2009;
originally announced October 2009.
-
Practical Entanglement Distillation Scheme Using Recurrence Method And Quantum Low Density Parity Check Codes
Authors:
H. F. Chau,
K. H. Ho
Abstract:
Many entanglement distillation schemes use either universal random hashing or breeding as their final step to obtain almost perfect shared EPR pairs. In spite of a high yield, the hardness of decoding a random linear code makes the use of random hashing and breeding infeasible in practice. In this pilot study, we analyze the performance of the recurrence method, a well-known entanglement distillat…
▽ More
Many entanglement distillation schemes use either universal random hashing or breeding as their final step to obtain almost perfect shared EPR pairs. In spite of a high yield, the hardness of decoding a random linear code makes the use of random hashing and breeding infeasible in practice. In this pilot study, we analyze the performance of the recurrence method, a well-known entanglement distillation scheme, with its final random hashing or breeding procedure being replaced by various efficiently decodable quantum codes. Among all the replacements investigated, the one using a certain adaptive quantum low density parity check (QLDPC) code is found to give the highest yield for Werner states over a wide range of noise level --- the yield for using this QLDPC code is higher than the first runner up by more than 25\% over a wide parameter range. In this respect, the effectiveness of using QLDPC codes in practical entanglement distillation is illustrated.
△ Less
Submitted 19 July, 2010; v1 submitted 6 July, 2009;
originally announced July 2009.
-
On The Critical Packet Injection Rate Of A Preferential Next-Nearest Neighbor Routing Traffic Model On Barabasi-Albert Networks
Authors:
H. F. Chau,
H. Y. Chan,
F. K. Chow
Abstract:
Recently, Yin et al. [Eur. Phys. J. B 49, 205 (2006)] introduced an efficient small-world network traffic model using preferential next-nearest neighbor routing strategy with the so-called path iteration avoidance (PIA) rule to study the jamming transition of internet. Here we study their model without PIA rule by a mean-field analysis which carefully divides the message packets into two types.…
▽ More
Recently, Yin et al. [Eur. Phys. J. B 49, 205 (2006)] introduced an efficient small-world network traffic model using preferential next-nearest neighbor routing strategy with the so-called path iteration avoidance (PIA) rule to study the jamming transition of internet. Here we study their model without PIA rule by a mean-field analysis which carefully divides the message packets into two types. Then, we argue that our mean-field analysis is also applicable in the presence of PIA rule in the limit of a large number of nodes in the network. Our analysis gives an explicit expression of the critical packet injection rate $R_c$ as a function of a bias parameter of the routing strategy $α$ in their model with or without PIA rule. In particular, we predict a sudden change in $R_c$ at a certain value of $α$. These predictions agree quite well with our extensive computer simulations.
△ Less
Submitted 4 November, 2009; v1 submitted 4 June, 2009;
originally announced June 2009.
-
Practical post-processing for quantum-key-distribution experiments
Authors:
Xiongfeng Ma,
Chi-Hang Fred Fung,
Jean-Christian Boileau,
H. F. Chau
Abstract:
Quantum key distribution (QKD) promises unconditionally secure key generation between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurements on quantum states are transformed to a secret key and this has to be done in accordance with a security proof. Unfortunately, many theoretical proofs are not readily implementable in experiments and do no…
▽ More
Quantum key distribution (QKD) promises unconditionally secure key generation between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurements on quantum states are transformed to a secret key and this has to be done in accordance with a security proof. Unfortunately, many theoretical proofs are not readily implementable in experiments and do not consider all practical issues. Therefore, in order to bridge this "practical gap", we integrate a few existing theoretical results together with new developments, in effect producing a simple and complete recipe for classical post-processing that one can follow to derive a secret key from the measurement outcomes in an actual QKD experiment. This integration is non-trivial and our consideration is both practical and comprehensive in the sense that we take into account the finiteness of the key length and consider the effects on security of several essential primitives (including authentication, error handling, and privacy amplification). Furthermore, we quantify the security of the final secret key that is universally composable. We show that the finite-size effect mainly comes from phase error estimation. Our result is applicable to the BB84 protocol with a single or entangled photon source.
△ Less
Submitted 13 April, 2009;
originally announced April 2009.
-
Getting Information on Independently Prepared Quantum States -- When Are Individual Measurements as Powerful as Joint Measurements?
Authors:
Chi-Hang Fred Fung,
H. F. Chau
Abstract:
Given a composite quantum system in which the states of the subsystems are independently (but not necessarily identically) prepared, we construct separate measurements on the subsystems from any given joint measurement such that the former always give at least as large information as the latter. This construction offers new insights into the understanding of measurements on this type of composit…
▽ More
Given a composite quantum system in which the states of the subsystems are independently (but not necessarily identically) prepared, we construct separate measurements on the subsystems from any given joint measurement such that the former always give at least as large information as the latter. This construction offers new insights into the understanding of measurements on this type of composite systems. Moreover, this construction essentially proves the intuition that separate measurements on the subsystems are sufficient to extract the maximal information about the separately prepared subsystems, thus making a joint measurement unnecessary. Furthermore, our result implies that individual attacks are as powerful as collective attacks in obtaining information on the raw key in quantum key distribution.
△ Less
Submitted 15 October, 2008; v1 submitted 20 August, 2008;
originally announced August 2008.
-
An Adaptive Entanglement Distillation Scheme Using Quantum Low Density Parity Check Codes
Authors:
K. H. Ho,
H. F. Chau
Abstract:
Quantum low density parity check (QLDPC) codes are useful primitives for quantum information processing because they can be encoded and decoded efficiently. Besides, the error correcting capability of a few QLDPC codes exceeds the quantum Gilbert-Varshamov bound. Here, we report a numerical performance analysis of an adaptive entanglement distillation scheme using QLDPC codes. In particular, we…
▽ More
Quantum low density parity check (QLDPC) codes are useful primitives for quantum information processing because they can be encoded and decoded efficiently. Besides, the error correcting capability of a few QLDPC codes exceeds the quantum Gilbert-Varshamov bound. Here, we report a numerical performance analysis of an adaptive entanglement distillation scheme using QLDPC codes. In particular, we find that the expected yield of our adaptive distillation scheme to combat depolarization errors exceed that of Leung and Shor whenever the error probability is less than about 0.07 or greater than about 0.28. This finding illustrates the effectiveness of using QLDPC codes in entanglement distillation.
△ Less
Submitted 14 July, 2008;
originally announced July 2008.
-
Purifying GHZ States Using Degenerate Quantum Codes
Authors:
K. H. Ho,
H. F. Chau
Abstract:
Degenerate quantum codes are codes that do not reveal the complete error syndrome. Their ability to conceal the complete error syndrome makes them powerful resources in certain quantum information processing tasks. In particular, the most error-tolerant way to purify depolarized Bell states using one-way communication known to date involves degenerate quantum codes. Here we study three closely r…
▽ More
Degenerate quantum codes are codes that do not reveal the complete error syndrome. Their ability to conceal the complete error syndrome makes them powerful resources in certain quantum information processing tasks. In particular, the most error-tolerant way to purify depolarized Bell states using one-way communication known to date involves degenerate quantum codes. Here we study three closely related purification schemes for depolarized GHZ states shared among $m \geq 3$ players by means of degenerate quantum codes and one-way classical communications. We find that our schemes tolerate more noise than all other one-way schemes known to date, further demonstrating the effectiveness of degenerate quantum codes in quantum information processing.
△ Less
Submitted 15 August, 2008; v1 submitted 11 March, 2008;
originally announced March 2008.
-
Playing The Hypothesis Testing Minority Game In The Maximal Reduced Strategy Space
Authors:
H. F. Chau,
V. H. Chan,
F. K. Chow
Abstract:
Hypothesis Testing Minority Game (HMG) is a variant of the standard Minority Game (MG) that models the inertial behavior of agents in the market. In the earlier study of our group, we find that agents cooperate better in HMG than in the standard MG when strategies are picked from the full strategy space. Here we continue to study the behavior of HMG when strategies are chosen from the maximal re…
▽ More
Hypothesis Testing Minority Game (HMG) is a variant of the standard Minority Game (MG) that models the inertial behavior of agents in the market. In the earlier study of our group, we find that agents cooperate better in HMG than in the standard MG when strategies are picked from the full strategy space. Here we continue to study the behavior of HMG when strategies are chosen from the maximal reduced strategy space. Surprisingly, we find that, unlike the standard MG, the level of cooperation in HMG depends strongly on the strategy space used. In addition, a novel intermittency dynamics is also observed in the minority choice time series in a certain parameter range in which the orderly phases are characterized by a variety of periodic dynamics. Remarkably, all these findings can be explained by the crowd-anticrowd theory.
△ Less
Submitted 26 June, 2008; v1 submitted 20 November, 2007;
originally announced November 2007.
-
Reply To "Comment on 'Quantum String Seal Is Insecure' "
Authors:
H. F. Chau
Abstract:
In Phys. Rev. A. 76, 056301 (2007), He claimed that the proof in my earlier paper [Phys. Rev. A 75, 012327 (2007)] is insufficient to conclude the insecurity of all quantum string seals because my measurement strategy cannot obtain non-trivial information on the sealed string and escape detection at the same time. Here, I clarify that our disagreement comes from our adoption of two different cri…
▽ More
In Phys. Rev. A. 76, 056301 (2007), He claimed that the proof in my earlier paper [Phys. Rev. A 75, 012327 (2007)] is insufficient to conclude the insecurity of all quantum string seals because my measurement strategy cannot obtain non-trivial information on the sealed string and escape detection at the same time. Here, I clarify that our disagreement comes from our adoption of two different criteria on the minimum amount of information a quantum string seal can reveal to members of the public. I also point out that He did not follow my measurement strategy correctly.
△ Less
Submitted 17 November, 2007;
originally announced November 2007.
-
Weighted Assortative And Disassortative Networks Model
Authors:
C. C. Leung,
H. F. Chau
Abstract:
Real-world networks process structured connections since they have non-trivial vertex degree correlation and clustering. Here we propose a toy model of structure formation in real-world weighted network. In our model, a network evolves by topological growth as well as by weight change. In addition, we introduce the weighted assortativity coefficient, which generalizes the assortativity coefficie…
▽ More
Real-world networks process structured connections since they have non-trivial vertex degree correlation and clustering. Here we propose a toy model of structure formation in real-world weighted network. In our model, a network evolves by topological growth as well as by weight change. In addition, we introduce the weighted assortativity coefficient, which generalizes the assortativity coefficient of a topological network, to measure the tendency of having a high-weighted link between two vertices of similar degrees. Network generated by our model exhibits scale-free behavior with a tunable exponent. Besides, a few non-trivial features found in real-world networks are reproduced by varying the parameter ruling the speed of weight evolution. Most importantly, by studying the weighted assortativity coefficient, we found that both topologically assortative and disassortative networks generated by our model are in fact weighted assortative.
△ Less
Submitted 9 December, 2006; v1 submitted 14 July, 2006;
originally announced July 2006.
-
Quantum String Seal Is Insecure
Authors:
H. F. Chau
Abstract:
A quantum string seal encodes the value of a (bit) string as a quantum state in such a way that everyone can extract a non-negligible amount of available information on the string by a suitable measurement. Moreover, such measurement must disturb the quantum state and is likely to be detected by an authorized verifier. In this way, the intactness of the encoded quantum state plays the role of a…
▽ More
A quantum string seal encodes the value of a (bit) string as a quantum state in such a way that everyone can extract a non-negligible amount of available information on the string by a suitable measurement. Moreover, such measurement must disturb the quantum state and is likely to be detected by an authorized verifier. In this way, the intactness of the encoded quantum state plays the role of a wax seal in the digital world. Here I analyze the security of quantum string seal by studying the information disturbance tradeoff of a measurement. This information disturbance tradeoff analysis extends the earlier results of Bechmann-Pasquinucci et al. and Chau by concluding that all quantum string seals are insecure. Specifically, I find a way to obtain non-trivial available information on the string that escapes the verifier's detection with at least 50% chance.
△ Less
Submitted 5 December, 2006; v1 submitted 13 February, 2006;
originally announced February 2006.
-
Incorporating Inertia Into Multi-Agent Systems
Authors:
W. C. Man,
H. F. Chau
Abstract:
We consider a model that demonstrates the crucial role of inertia and stickiness in multi-agent systems, based on the Minority Game (MG). The inertia of an agent is introduced into the game model by allowing agents to apply hypothesis testing when choosing their best strategies, thereby reducing their reactivity towards changes in the environment. We find by extensive numerical simulations that…
▽ More
We consider a model that demonstrates the crucial role of inertia and stickiness in multi-agent systems, based on the Minority Game (MG). The inertia of an agent is introduced into the game model by allowing agents to apply hypothesis testing when choosing their best strategies, thereby reducing their reactivity towards changes in the environment. We find by extensive numerical simulations that our game shows a remarkable improvement of global cooperation throughout the whole phase space. In other words, the maladaptation behavior due to over-reaction of agents is removed. These agents are also shown to be advantageous over the standard ones, which are sometimes too sensitive to attain a fair success rate. We also calculate analytically the minimum amount of inertia needed to achieve the above improvement. Our calculation is consistent with the numerical simulation results. Finally, we review some related works in the field that show similar behaviors and compare them to our work.
△ Less
Submitted 1 December, 2005; v1 submitted 10 October, 2005;
originally announced October 2005.
-
Reply To "Comment on 'Quantum Convolutional Error-Correcting Codes' "
Authors:
H. F. Chau
Abstract:
In their comment, de Almedia and Palazzo \cite{comment} discovered an error in my earlier paper concerning the construction of quantum convolutional codes (quant-ph/9712029). This error can be repaired by modifying the method of code construction.
In their comment, de Almedia and Palazzo \cite{comment} discovered an error in my earlier paper concerning the construction of quantum convolutional codes (quant-ph/9712029). This error can be repaired by modifying the method of code construction.
△ Less
Submitted 2 June, 2005;
originally announced June 2005.