Skip to main content

Showing 1–50 of 96 results for author: Chau, H F

.
  1. arXiv:2501.00221  [pdf, other

    physics.soc-ph nlin.AO

    Modified Axelrod Model Showing Opinion Convergence And Polarization In Realistic Scale-Free Networks

    Authors: X. Zou, H. F. Chau

    Abstract: Axelrod model is an opinion dynamics model such that each agent on a two-dimensional lattice has a finite number of possible opinions. The model is not realistic as all agents will eventually share the same opinion on every issue. Here we identify certain limitations inherent in the Axelrod model and address them by modifying some of the model's rules. Specifically, by considering agents in a scal… ▽ More

    Submitted 30 December, 2024; originally announced January 2025.

    Comments: 12 pages, 8 figures

  2. arXiv:2407.15761  [pdf, other

    quant-ph

    Fully Passive Quantum Conference Key Agreement

    Authors: Jinjie Li, Wenyuan Wang, H. F. Chau

    Abstract: Quantum Conference Key Agreement (CKA) provides a secure method for multi-party communication. A recently developed interference-based prepare-and-measure quantum CKA possesses the advantages of measurement-device-independence, namely, being immune to side-channels from the detector side. Besides, it achieves good key rate performance, especially for high-loss channels, due to the use of single ph… ▽ More

    Submitted 9 September, 2024; v1 submitted 22 July, 2024; originally announced July 2024.

  3. arXiv:2406.15226  [pdf, ps, other

    quant-ph

    One-Shot Min-Entropy Calculation Of Classical-Quantum States And Its Application To Quantum Cryptography

    Authors: Rong Wang, H. F. Chau

    Abstract: In quantum Shannon theory, various kinds of quantum entropies are used to characterize the capacities of noisy physical systems. Among them, min-entropy and its smooth version attract wide interest especially in the field of quantum cryptography as they can be used to bound the information obtained by an adversary. However, calculating the exact value or non-trivial bounds of min-entropy are extre… ▽ More

    Submitted 10 June, 2025; v1 submitted 21 June, 2024; originally announced June 2024.

  4. arXiv:2406.04846   

    quant-ph

    Efficient Fault-Tolerant Single Qubit Gate Approximation And Universal Quantum Computation Without Using The Solovay-Kitaev Theorem

    Authors: H. F. Chau

    Abstract: Arbitrarily accurate fault-tolerant (FT) universal quantum computation can be carried out using the Clifford gates Z, S, CNOT plus the non-Clifford T gate. Moreover, a recent improvement of the Solovay-Kitaev theorem by Kuperberg implies that to approximate any single-qubit gate to an accuracy of $ε> 0$ requires $\text{O}(\log^c[1/ε])$ quantum gates with $c > 1.44042$. Can one do better? That was… ▽ More

    Submitted 30 June, 2024; v1 submitted 7 June, 2024; originally announced June 2024.

    Comments: The claim in this manuscript is incorrect due to a mistake in Eq. (6). The reason is that expression in Eq. (6) is derived in real arithmetic. It is incompatible with the modulo 2 arithmetic in the state ket

  5. A Unifying Quantum Speed Limit For Time-Independent Hamiltonian Evolution

    Authors: H. F. Chau, Wenxin Zeng

    Abstract: Quantum speed limit (QSL) is the study of fundamental limits on the evolution time of quantum systems. For instance, under the action of a time-independent Hamiltonian, the evolution time between an initial and a final quantum state obeys various mutually complementary lower bounds. They include the Mandelstam-Tamm, Margolus-Levitin, Luo-Zhang, dual ML and Lee-Chau bounds. Here we show that the Ma… ▽ More

    Submitted 15 May, 2024; v1 submitted 12 October, 2023; originally announced October 2023.

    Comments: revised, 22 pages, 3 figures, to appear in J.Phys.A

  6. arXiv:2305.10101  [pdf, ps, other

    quant-ph

    $\boldsymbol{α_{>}(ε) = α_{<}(ε)}$ For The Margolus-Levitin Quantum Speed Limit Bound

    Authors: H. F. Chau

    Abstract: The Margolus-Levitin (ML) bound says that for any time-independent Hamiltonian, the time needed to evolve from one quantum state to another is at least $πα(ε) / (2 \langle E-E_0 \rangle)$, where $\langle E-E_0 \rangle$ is the expected energy of the system relative to the ground state of the Hamiltonian and $α(ε)$ is a function of the fidelity $ε$ between the two state. For a long time, only a uppe… ▽ More

    Submitted 4 October, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

    Comments: Extensively revised for clarity, 8 pages, 2 figures, to appear in PRA

  7. arXiv:2206.12173  [pdf, other

    quant-ph physics.optics

    Reducing The Impact Of Adaptive Optics Lag On Optical And Quantum Communications Rates From Rapidly Moving Sources

    Authors: Kai Sum Chan, H. F. Chau

    Abstract: Wavefront of light passing through turbulent atmosphere gets distorted. This causes signal loss in free-space optical communication as the light beam spreads and wanders at the receiving end. Frequency and/or time division multiplexing adaptive optics (AO) techniques have been used to conjugate this kind of wavefront distortion. However, if the signal beam moves relative to the atmosphere, the AO… ▽ More

    Submitted 8 April, 2023; v1 submitted 24 June, 2022; originally announced June 2022.

    Comments: title changed to better reflect what we have done, to appear in AIP Advances; 14 pages, 12 figures

  8. Quantum and Classical Data Transmission through Completely Depolarising Channels in a Superposition of Cyclic Orders

    Authors: Giulio Chiribella, Matt Wilson, H. F. Chau

    Abstract: Completely depolarising channels are often regarded as the prototype of physical processes that are useless for communication: any message that passes through them along a well-defined trajectory is completely erased. When two such channels are used in a quantum superposition of two alternative orders, they become able to transmit some amount of classical information, but still no quantum informat… ▽ More

    Submitted 6 October, 2021; v1 submitted 1 May, 2020; originally announced May 2020.

    Comments: 5 + 14 pages, 4 figures, published version

    Journal ref: Phys. Rev. Lett. 127, 190502 (2021)

  9. Security Of Finite-Key-Length Measurement-Device-Independent Quantum Key Distribution Using Arbitrary Number Of Decoys

    Authors: H. F. Chau

    Abstract: In quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak Poissonian sources, respectively. Investigations so far are not comprehensive as they restrict to less than or equal to four decoy states. Moreover, many of them involves pure numerical studies. Here I… ▽ More

    Submitted 24 June, 2020; v1 submitted 18 March, 2020; originally announced March 2020.

    Comments: 13 pages, 3 figures and 2 tables, to appear in PRA

    Journal ref: Phys. Rev. A 102, 012611 (2020)

  10. Application of an Improved Version of McDiarmid Inequality in Finite-Key-Length Decoy-State Quantum Key Distribution

    Authors: H. F. Chau, K. C. Joseph Ng

    Abstract: In practical decoy-state quantum key distribution, the raw key length is finite. Thus, deviation of the estimated single photon yield and single photon error rate from their respective true values due to finite sample size can seriously lower the provably secure key rate $R$. Current method to obtain a lower bound of $R$ follows an indirect path by first bounding the yields and error rates both co… ▽ More

    Submitted 13 January, 2020; v1 submitted 28 June, 2019; originally announced June 2019.

    Comments: 14 pages, 1 table, superseding the result reported in arXiv:1806.05063, to appear in New J Phys

  11. arXiv:1903.09340  [pdf, ps, other

    quant-ph

    Chau-Wang-Wong17 Scheme Is Experimentally More Feasible Than The Six-State Scheme

    Authors: H. F. Chau, Zhen-Qiang Yin, Shuang Wang, Wei Chen, Zheng-Fu Han

    Abstract: Recently, Chau et al. [Phys. Rev. A 95, 022311 (2017)] reported a quantum-key-distribution (QKD) scheme using four-dimensional qudits. Surprisingly, as a function of the bit error rate of the raw key, the secret key rate of this scheme is equal to that of the (qubit-based) six-state scheme under one-way classical communication using ideal apparatus in the limit of arbitrarily long raw key length.… ▽ More

    Submitted 21 March, 2019; originally announced March 2019.

    Comments: 8 pages, to appear in QIP

  12. arXiv:1806.05073  [pdf, ps, other

    quant-ph

    Application Of McDiarmid Inequality In Finite-Key-Length Decoy-State Quantum Key Distribution

    Authors: H. F. Chau

    Abstract: In practical decoy-state quantum key distribution, the raw key length is finite. Thus, deviation of the estimated single photon yield and single photon error rate from their respective true values due to finite sample size can seriously lower the provably secure key rate $R$. Current method to obtain a lower bound of $R$ follows an indirect path by first bounding the yields and error rates both co… ▽ More

    Submitted 13 June, 2018; originally announced June 2018.

    Comments: 5 pages, 1 table

  13. Decoy State Quantum Key Distribution With More Than Three Types Of Photon Intensity Pulses

    Authors: H. F. Chau

    Abstract: Decoy state method closes source security loophole in quantum key distribution (QKD) using laser source. In this method, accurate estimates of the detection rates of vacuum and single photon events plus the error rate of single photon events are needed to give a good enough lower bound of the secret key rate. Nonetheless, the current estimation method for these detection and error rates, which use… ▽ More

    Submitted 23 March, 2018; v1 submitted 3 December, 2017; originally announced December 2017.

    Comments: Extensively revised and corrected. Main conclusions stay. 6 pages with 1 long table. Accepted by PRA Rapid Communication

    Journal ref: Phys. Rev. A 97, 040301 (2018)

  14. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    Authors: Shuang Wang, Zhen-Qiang Yin, H. F. Chau, Wei Chen, Chao Wang, Guang-Can Guo, Zheng-Fu Han

    Abstract: In comparison to qubit-based protocols, qudit-based quantum key distribution (QKD) ones gen- erally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based proto- col known… ▽ More

    Submitted 2 July, 2017; originally announced July 2017.

    Journal ref: Quantum Science and Technology 3, 025006 (2018)

  15. arXiv:1608.08329  [pdf, ps, other

    quant-ph

    Qudit-Based Measurement-Device-Independent Quantum Key Distribution Using Linear Optics

    Authors: H. F. Chau, Cardythy Wong, Qinan Wang, Tieqiao Huang

    Abstract: Measurement-device-independent (MDI) method is a way to solve all detector side-channel attacks in quantum key distribution (QKD). However, very little work has been done on experimentally feasible qudit-based MDI-QKD scheme although the famous (qudit-based) round-robin differential-phase-shift (RRDPS) scheme is vulnerable to attacks on uncharacterized detectors. Here we report a mother-of-all QKD… ▽ More

    Submitted 30 August, 2016; originally announced August 2016.

    Comments: 3 pages

  16. Experimentally Feasible Quantum-Key-Distribution Scheme Using Qubit-Like Qudits And Its Comparison With Existing Qubit- and Qudit-Based Protocols

    Authors: H. F. Chau, Qinan Wang, Cardythy Wong

    Abstract: Recently, Chau introduced an experimentally feasible qudit-based quantum-key-distribution (QKD) scheme. In that scheme, one bit of information is phase encoded in the prepared state in a $2^n$-dimensional Hilbert space in the form $(|i\rangle\pm|j\rangle)/\sqrt{2}$ with $n\ge 2$. For each qudit prepared and measured in the same two-dimensional Hilbert subspace, one bit of raw secret key is obtaine… ▽ More

    Submitted 8 February, 2017; v1 submitted 7 March, 2016; originally announced March 2016.

    Comments: extensively revised, conclusions changed, 7 pages, 2 figures and 1 table, published in PRA

    Journal ref: Phys. Rev. A 95, 022311 (2017)

  17. State-Independent Error-Disturbance Tradeoff For Measurement Operators

    Authors: S. S. Zhou, Shengjun Wu, H. F. Chau

    Abstract: In general, classical measurement statistics of a quantum measurement is disturbed by performing an additional incompatible quantum measurement beforehand. Using this observation, we introduce a state-independent definition of disturbance by relating it to the distinguishability problem between two classical statistical distributions --- one resulting from a single quantum measurement and the othe… ▽ More

    Submitted 13 September, 2015; originally announced September 2015.

    Comments: 7 pages, 2 figures

  18. Quantum Key Distribution Using Qudits Each Encoding One Bit Of Raw Key

    Authors: H. F. Chau

    Abstract: All known qudit-based prepare-and-measure quantum key distribution (PM-QKD) schemes are more error resilient than their qubit-based counterparts. Their high error resiliency comes partly from the careful encoding of multiple bits of signals used to generate the raw key in each transmitted qudit so that the same eavesdropping attempt causes a higher bit error rate (BER) in the raw key. Here I show… ▽ More

    Submitted 20 November, 2015; v1 submitted 14 July, 2015; originally announced July 2015.

    Comments: minor revision, 5 pages, to appear in PRA

    Journal ref: Phys. Rev. A 92, 062324 (2015)

  19. arXiv:1405.0198   

    quant-ph cs.CR

    No Superluminal Signaling Implies Unconditionally Secure Bit Commitment

    Authors: H. F. Chau, C. -H. Fred Fung, H. -K. Lo

    Abstract: Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple, reliable, easy to implement using existing technologies, and most importantly unconditionally secure in the sense that its security is based on a… ▽ More

    Submitted 18 November, 2014; v1 submitted 1 May, 2014; originally announced May 2014.

    Comments: This paper has been withdrawn by the authors due to a crucial oversight on an earlier work by A. Kent

  20. arXiv:1404.4134  [pdf, ps, other

    quant-ph

    Solution to time-energy costs of quantum channels

    Authors: Chi-Hang Fred Fung, H. F. Chau, Chi-Kwong Li, Nung-Sing Sze

    Abstract: We derive a formula for the time-energy costs of general quantum channels proposed in [Phys. Rev. A 88, 012307 (2013)]. This formula allows us to numerically find the time-energy cost of any quantum channel using positive semidefinite programming. We also derive a lower bound to the time-energy cost for any channels and the exact the time-energy cost for a class of channels which includes the qudi… ▽ More

    Submitted 16 December, 2014; v1 submitted 16 April, 2014; originally announced April 2014.

    Comments: 9 pages

    Journal ref: Quantum Information and Computation 15, 0685-0693 (2015)

  21. Physical time-energy cost of a quantum process determines its information fidelity

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: A quantum system can be described and characterized by at least two different concepts, namely, its physical and informational properties. Here, we explicitly connect these two concepts, by equating the time-energy cost which is the product of the largest energy of a Hamiltonian of quantum dynamics and the evolution time, and the entanglement fidelity which is the informational difference between… ▽ More

    Submitted 25 August, 2014; v1 submitted 12 April, 2014; originally announced April 2014.

    Comments: 6 pages

    Journal ref: Phys. Rev. A 90, 022333 (2014)

  22. Time-Energy Costs of Quantum Measurements

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: Time and energy of quantum processes are a tradeoff against each other. We propose to ascribe to any given quantum process a time-energy cost to quantify how much computation it performs. Here, we analyze the time-energy costs for general quantum measurements, along a similar line as our previous work for quantum channels, and prove exact and lower bound formulae for the costs. We use these formul… ▽ More

    Submitted 8 May, 2014; v1 submitted 20 February, 2014; originally announced February 2014.

    Comments: 10 pages, 6 figures

    Journal ref: Phys. Rev. A 89, 052306 (2014)

  23. Conditions for degradability of tripartite quantum states

    Authors: Chi-Hang Fred Fung, Chi-Kwong Li, Nung-Sing Sze, H. F. Chau

    Abstract: Alice, Bob, and Eve share a pure quantum state. We introduce the notion of state degradability by asking whether the joint density of Alice and Eve can be transformed to the joint density of Alice and Bob by processing Eve's part through a quantum channel, in order words, degrading Eve. We prove necessary and sufficient conditions for state degradability and provide an efficient method to quickly… ▽ More

    Submitted 9 February, 2014; v1 submitted 29 August, 2013; originally announced August 2013.

    Comments: 20 pages, no figure

    Journal ref: J. Phys. A: Math. Theor. 47, 115306 (2014)

  24. arXiv:1308.2042  [pdf, other

    nlin.AO cond-mat.stat-mech physics.soc-ph

    Social Judgment Theory Based Model On Opinion Formation, Polarization And Evolution

    Authors: H. F. Chau, C. Y. Wong, F. K. Chow, C. -H. F. Fung

    Abstract: The dynamical origin of opinion polarization in the real world is an interesting topic physical scientists may help to understand. To properly model the dynamics, the theory must be fully compatible with findings by social psychologists on microscopic opinion change. Here we introduce a generic model of opinion formation with homogeneous agents based on the well-known social judgment theory in soc… ▽ More

    Submitted 26 July, 2014; v1 submitted 9 August, 2013; originally announced August 2013.

    Comments: 9 pages, 5 figures together with an addition 24 videos available on request, extensively revised, to appear in Physica A

    Journal ref: Physica A 415, 133-140 (2014)

  25. Time-Energy Measure for Quantum Processes

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: Quantum mechanics sets limits on how fast quantum processes can run given some system energy through time-energy uncertainty relations, and they imply that time and energy are tradeoff against each other. Thus, we propose to measure the time-energy as a single unit for quantum channels. We consider a time-energy measure for quantum channels and compute lower and upper bounds of it using the channe… ▽ More

    Submitted 9 July, 2013; v1 submitted 24 May, 2013; originally announced May 2013.

    Comments: 13 pages, 2 figures

    Journal ref: Phys. Rev. A 88, 012307 (2013)

  26. Quantum Speed Limit With Forbidden Speed Intervals

    Authors: H. F. Chau

    Abstract: Quantum mechanics imposes fundamental constraints known as quantum speed limits (QSLs) on the information processing speed of all quantum systems. Every QSL known to date comes from the restriction imposed on the evolution time between two quantum states through the value of a single system observable such as the mean energy relative to its ground state. So far these restrictions only place upper… ▽ More

    Submitted 21 May, 2013; v1 submitted 2 January, 2013; originally announced January 2013.

    Comments: revised with clarification, 7 pages, to appear in PRA

  27. Disguising quantum channels by mixing and channel distance trade-off

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: We consider the reverse problem to the distinguishability of two quantum channels, which we call the disguising problem. Given two quantum channels, the goal here is to make the two channels identical by mixing with some other channels with minimal mixing probabilities. This quantifies how much one channel can disguise as the other. In addition, the possibility to trade off between the two mixing… ▽ More

    Submitted 9 February, 2014; v1 submitted 5 November, 2012; originally announced November 2012.

    Comments: 27 pages, 8 figures. Added new results for using the disguising problem to lower and upper bound the diamond norm and to upper bound the key generation rate in quantum cryptography

    Journal ref: J. Phys. A: Math. Theor. 47, 105302 (2014)

  28. Entanglement transformation between sets of bipartite pure quantum states using local operations

    Authors: H. F. Chau, Chi-Hang Fred Fung, Chi-Kwong Li, Edward Poon, Nung-Sing Sze

    Abstract: Alice and Bob are given an unknown initial state chosen from a set of pure quantum states. Their task is to transform the initial state to a corresponding final pure state using local operations only. We prove necessary and sufficient conditions on the existence of such a transformation. We also provide efficient algorithms that can quickly rule out the possibility of transforming a set of initial… ▽ More

    Submitted 12 October, 2012; v1 submitted 5 August, 2012; originally announced August 2012.

    Comments: 19 pages, 1 figure, minor revision, to appear in J.Math.Phys

  29. Relation Between Quantum Speed Limits And Metrics On U(n)

    Authors: Kai-Yan Lee, H. F. Chau

    Abstract: Recently, Chau [Quant. Inform. & Comp. 11, 721 (2011)] found a family of metrics and pseudo-metrics on $n$-dimensional unitary operators that can be interpreted as the minimum resources (given by certain tight quantum speed limit bounds) needed to transform one unitary operator to another. This result is closely related to the weighted $\ell^1$-norm on ${\mathbb R}^n$. Here we generalize this find… ▽ More

    Submitted 12 November, 2012; v1 submitted 9 February, 2012; originally announced February 2012.

    Comments: minor amendments, 6 pages, to appear in J.Phys.A

    Journal ref: Journal of Physics A: Mathematical and Theoretical, Vol 46, 015305 (2013)

  30. Structural Characterization And Condition For Measurement Statistics Preservation Of A Unital Quantum Operation

    Authors: Kai-Yan Lee, Chi-Hang Fred Fung, H. F. Chau

    Abstract: We investigate the necessary and sufficient condition for a convex cone of positive semidefinite operators to be fixed by a unital quantum operation $φ$ acting on finite-dimensional quantum states. By reducing this problem to the problem of simultaneous diagonalization of the Kraus operators associated with $φ$, we can completely characterize the kind of quantum states that are fixed by $φ$. Our w… ▽ More

    Submitted 15 April, 2013; v1 submitted 5 December, 2011; originally announced December 2011.

    Comments: 9 pages in revtex 4.1, minor revision, to appear in J.Phys.A

    Journal ref: J. Phys. A 46, 205305 (2013)

  31. Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol

    Authors: Chi-Hang Fred Fung, Xiongfeng Ma, H. F. Chau, Qing-yu Cai

    Abstract: Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA ha… ▽ More

    Submitted 9 March, 2012; v1 submitted 18 November, 2011; originally announced November 2011.

    Comments: 11 pages, 3 figures

    Journal ref: Phys. Rev. A 85, 032308 (2012)

  32. arXiv:1107.1047  [pdf, ps, other

    math-ph math.SP quant-ph

    Induced Metric And Matrix Inequalities On Unitary Matrices

    Authors: H. F. Chau, C. -K. Li, Y. -T. Poon, N. -S. Sze

    Abstract: Recently, Chau [Quant. Inform. & Comp. 11, 721 (2011)] showed that one can define certain metrics and pseudo-metrics on U(n), the group of all $n\times n$ unitary matrices, based on the arguments of the eigenvalues of the unitary matrices. More importantly, these metrics and pseudo-metrics have quantum information theoretical meanings. So it is instructive to study this kind of metrics and pseudo-… ▽ More

    Submitted 20 January, 2012; v1 submitted 6 July, 2011; originally announced July 2011.

    Comments: 6 pages, extensively rewritten with an earlier error fixed. It generalizes and simplifies the mathematical results concerning certain matrix inequalities originally reported in arXiv:1006.3614v1. To appear in J.Phys.A

    Journal ref: Journal of Physics A: Mathematical and Theoretical, Vol 45, 095201 (2012)

  33. arXiv:1011.3560  [pdf, ps, other

    quant-ph

    Comment on "Connection between entanglement and the speed of quantum evolution"

    Authors: H. F. Chau

    Abstract: Batle et al. [Phys. Rev. A {\bf 72}, 032337 (2005)] and Borrás et al. [Phys. Rev. A {\bf 74}, 022326 (2006)] studied the connection between entanglement and speed of quantum evolution for certain low-dimensional bipartite quantum states. However, their studies did not cover all possible cases. And the relation between entanglement and the maximum possible quantum evolution speed for these uncovere… ▽ More

    Submitted 15 November, 2010; originally announced November 2010.

    Comments: 2 pages in Revtex4.1, accepted by Phys.Rev.A

  34. Universal Squash Model For Optical Communications Using Linear Optics And Threshold Detectors

    Authors: Chi-Hang Fred Fung, H. F. Chau, Hoi-Kwong Lo

    Abstract: The transmission of photons through open-air or an optical fiber is an important primitive in quantum information processing. Theoretical description of such a transmission process often considers only a single photon as the information carrier and thus fails to accurately describe experimental optical implementations where any number of photons may enter a detector. It is important to bridge this… ▽ More

    Submitted 12 November, 2010; originally announced November 2010.

    Comments: 14 pages

    Journal ref: Phys. Rev. A 84, 020303(R) (2011)

  35. arXiv:1006.3978  [pdf, ps, other

    quant-ph math-ph math.SP

    Elementary Proofs Of Two Theorems Involving Arguments Of Eigenvalues Of A Product Of Two Unitary Matrices

    Authors: H. F. Chau, Y. T. Lam

    Abstract: We give elementary proofs of two theorems concerning bounds on the maximum argument of the eigenvalues of a product of two unitary matrices --- one by Childs \emph{et al.} [J. Mod. Phys., \textbf{47}, 155 (2000)] and the other one by Chau [arXiv:1006.3614]. Our proofs have the advantages that the necessary and sufficient conditions for equalities are apparent and that they can be readily generaliz… ▽ More

    Submitted 21 April, 2011; v1 submitted 20 June, 2010; originally announced June 2010.

    Comments: 8 pages in Revtex 4.1 preprint format, to appear in Journal of Inequalities and Applications

  36. arXiv:1006.3614  [pdf, ps, other

    quant-ph math-ph

    Metrics On Unitary Matrices And Their Application To Quantifying The Degree Of Non-Commutativity Between Unitary Matrices

    Authors: H. F. Chau

    Abstract: By studying the minimum resources required to perform a unitary transformation, families of metrics and pseudo-metrics on unitary matrices that are closely related to a recently reported quantum speed limit by the author are found. Interestingly, this family of metrics can be naturally converted into useful indicators of the degree of non-commutativity between two unitary matrices.

    Submitted 6 July, 2011; v1 submitted 18 June, 2010; originally announced June 2010.

    Comments: 13 pages in RevTex 4.1, 2 figures, to appear in QIC. This replacement concentrates only on the more physics and quantum information aspects of the results reported in the original manuscript with a more detailed proof. The mathematical results involving the discovery of several matrix inequalities reported in the original version will be strengthened and rewritten in a separate posting

  37. Tight Upper Bound Of The Maximum Speed Of Evolution Of A Quantum State

    Authors: H. F. Chau

    Abstract: I report a tight upper bound of the maximum speed of evolution from one quantum state $ρ$ to another $ρ'$ with fidelity $F(ρ,ρ')$ less than or equal to an arbitrary but fixed value under the action of a time-independent Hamiltonian. Since the bound is directly proportional to the average absolute deviation from the median of the energy of the state ${\mathscr D}E$, one may interpret… ▽ More

    Submitted 14 June, 2010; v1 submitted 3 March, 2010; originally announced March 2010.

    Comments: 4 pages, 1 figure, minor changes with an additional reference added, to appear in PRA

  38. Practical issues in quantum-key-distribution post-processing

    Authors: Chi-Hang Fred Fung, Xiongfeng Ma, H. F. Chau

    Abstract: Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length o… ▽ More

    Submitted 29 December, 2009; v1 submitted 1 October, 2009; originally announced October 2009.

    Comments: 17 pages, 5 figures

    Journal ref: Phys. Rev. A 81, 012318 (2010)

  39. arXiv:0907.1130  [pdf, ps, other

    quant-ph

    Practical Entanglement Distillation Scheme Using Recurrence Method And Quantum Low Density Parity Check Codes

    Authors: H. F. Chau, K. H. Ho

    Abstract: Many entanglement distillation schemes use either universal random hashing or breeding as their final step to obtain almost perfect shared EPR pairs. In spite of a high yield, the hardness of decoding a random linear code makes the use of random hashing and breeding infeasible in practice. In this pilot study, we analyze the performance of the recurrence method, a well-known entanglement distillat… ▽ More

    Submitted 19 July, 2010; v1 submitted 6 July, 2009; originally announced July 2009.

    Comments: extensively revised, 9 pages, 2 figures, to appear in Quant. Inf. Proc

  40. On The Critical Packet Injection Rate Of A Preferential Next-Nearest Neighbor Routing Traffic Model On Barabasi-Albert Networks

    Authors: H. F. Chau, H. Y. Chan, F. K. Chow

    Abstract: Recently, Yin et al. [Eur. Phys. J. B 49, 205 (2006)] introduced an efficient small-world network traffic model using preferential next-nearest neighbor routing strategy with the so-called path iteration avoidance (PIA) rule to study the jamming transition of internet. Here we study their model without PIA rule by a mean-field analysis which carefully divides the message packets into two types.… ▽ More

    Submitted 4 November, 2009; v1 submitted 4 June, 2009; originally announced June 2009.

    Comments: 14 pages, 12 figures, title changed, extensively rewritten, to appear in Eur.Phys.J.B

  41. Practical post-processing for quantum-key-distribution experiments

    Authors: Xiongfeng Ma, Chi-Hang Fred Fung, Jean-Christian Boileau, H. F. Chau

    Abstract: Quantum key distribution (QKD) promises unconditionally secure key generation between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurements on quantum states are transformed to a secret key and this has to be done in accordance with a security proof. Unfortunately, many theoretical proofs are not readily implementable in experiments and do no… ▽ More

    Submitted 13 April, 2009; originally announced April 2009.

    Comments: Comments are welcome

    Journal ref: Computers & Security Volume 30, Issue 4, June 2011, Pages 172-177

  42. Getting Information on Independently Prepared Quantum States -- When Are Individual Measurements as Powerful as Joint Measurements?

    Authors: Chi-Hang Fred Fung, H. F. Chau

    Abstract: Given a composite quantum system in which the states of the subsystems are independently (but not necessarily identically) prepared, we construct separate measurements on the subsystems from any given joint measurement such that the former always give at least as large information as the latter. This construction offers new insights into the understanding of measurements on this type of composit… ▽ More

    Submitted 15 October, 2008; v1 submitted 20 August, 2008; originally announced August 2008.

    Comments: 5 pages, 1 figure

    Journal ref: Phys. Rev. A 78, 062308 (2008)

  43. arXiv:0807.2122  [pdf, ps, other

    quant-ph

    An Adaptive Entanglement Distillation Scheme Using Quantum Low Density Parity Check Codes

    Authors: K. H. Ho, H. F. Chau

    Abstract: Quantum low density parity check (QLDPC) codes are useful primitives for quantum information processing because they can be encoded and decoded efficiently. Besides, the error correcting capability of a few QLDPC codes exceeds the quantum Gilbert-Varshamov bound. Here, we report a numerical performance analysis of an adaptive entanglement distillation scheme using QLDPC codes. In particular, we… ▽ More

    Submitted 14 July, 2008; originally announced July 2008.

    Comments: 12 pages, 6 figures

  44. arXiv:0803.1532  [pdf, ps, other

    quant-ph

    Purifying GHZ States Using Degenerate Quantum Codes

    Authors: K. H. Ho, H. F. Chau

    Abstract: Degenerate quantum codes are codes that do not reveal the complete error syndrome. Their ability to conceal the complete error syndrome makes them powerful resources in certain quantum information processing tasks. In particular, the most error-tolerant way to purify depolarized Bell states using one-way communication known to date involves degenerate quantum codes. Here we study three closely r… ▽ More

    Submitted 15 August, 2008; v1 submitted 11 March, 2008; originally announced March 2008.

    Comments: Significantly revised with a few new results added, 33 pages, 7 figures

  45. Playing The Hypothesis Testing Minority Game In The Maximal Reduced Strategy Space

    Authors: H. F. Chau, V. H. Chan, F. K. Chow

    Abstract: Hypothesis Testing Minority Game (HMG) is a variant of the standard Minority Game (MG) that models the inertial behavior of agents in the market. In the earlier study of our group, we find that agents cooperate better in HMG than in the standard MG when strategies are picked from the full strategy space. Here we continue to study the behavior of HMG when strategies are chosen from the maximal re… ▽ More

    Submitted 26 June, 2008; v1 submitted 20 November, 2007; originally announced November 2007.

    Comments: 12 pages, 7 figures, to appear in Physica A

  46. Reply To "Comment on 'Quantum String Seal Is Insecure' "

    Authors: H. F. Chau

    Abstract: In Phys. Rev. A. 76, 056301 (2007), He claimed that the proof in my earlier paper [Phys. Rev. A 75, 012327 (2007)] is insufficient to conclude the insecurity of all quantum string seals because my measurement strategy cannot obtain non-trivial information on the sealed string and escape detection at the same time. Here, I clarify that our disagreement comes from our adoption of two different cri… ▽ More

    Submitted 17 November, 2007; originally announced November 2007.

    Comments: 2 pages

    Journal ref: PRA 76, 056302 (2007)

  47. Weighted Assortative And Disassortative Networks Model

    Authors: C. C. Leung, H. F. Chau

    Abstract: Real-world networks process structured connections since they have non-trivial vertex degree correlation and clustering. Here we propose a toy model of structure formation in real-world weighted network. In our model, a network evolves by topological growth as well as by weight change. In addition, we introduce the weighted assortativity coefficient, which generalizes the assortativity coefficie… ▽ More

    Submitted 9 December, 2006; v1 submitted 14 July, 2006; originally announced July 2006.

    Comments: 8 pages, minor clarifications, to be published in Physica A

  48. Quantum String Seal Is Insecure

    Authors: H. F. Chau

    Abstract: A quantum string seal encodes the value of a (bit) string as a quantum state in such a way that everyone can extract a non-negligible amount of available information on the string by a suitable measurement. Moreover, such measurement must disturb the quantum state and is likely to be detected by an authorized verifier. In this way, the intactness of the encoded quantum state plays the role of a… ▽ More

    Submitted 5 December, 2006; v1 submitted 13 February, 2006; originally announced February 2006.

    Comments: 8 pages with 2 figures, significantly expanded with a few new results, to appear in PRA

  49. arXiv:physics/0510075  [pdf, ps, other

    physics.soc-ph physics.comp-ph

    Incorporating Inertia Into Multi-Agent Systems

    Authors: W. C. Man, H. F. Chau

    Abstract: We consider a model that demonstrates the crucial role of inertia and stickiness in multi-agent systems, based on the Minority Game (MG). The inertia of an agent is introduced into the game model by allowing agents to apply hypothesis testing when choosing their best strategies, thereby reducing their reactivity towards changes in the environment. We find by extensive numerical simulations that… ▽ More

    Submitted 1 December, 2005; v1 submitted 10 October, 2005; originally announced October 2005.

    Comments: extensively revised, 8 pages, 10 figures in revtex4

  50. Reply To "Comment on 'Quantum Convolutional Error-Correcting Codes' "

    Authors: H. F. Chau

    Abstract: In their comment, de Almedia and Palazzo \cite{comment} discovered an error in my earlier paper concerning the construction of quantum convolutional codes (quant-ph/9712029). This error can be repaired by modifying the method of code construction.

    Submitted 2 June, 2005; originally announced June 2005.

    Comments: 1 page, to appear in PRA