-
A Universal Operator Theoretic Framework for Quantum Fault Tolerance
Authors:
Gerald Gilbert,
Michael Hamrick,
Yaakov S. Weinstein,
Vaneet Aggarwal,
A. Robert Calderbank
Abstract:
In this paper we introduce a universal operator theoretic framework for quantum fault tolerance. This incorporates a top-down approach that implements a system-level criterion based on specification of the full system dynamics, applied at every level of error correction concatenation. This leads to more accurate determinations of error thresholds than could previously be obtained. This is demons…
▽ More
In this paper we introduce a universal operator theoretic framework for quantum fault tolerance. This incorporates a top-down approach that implements a system-level criterion based on specification of the full system dynamics, applied at every level of error correction concatenation. This leads to more accurate determinations of error thresholds than could previously be obtained. This is demonstrated both formally and with an explicit numerical example. The basis for our approach is the Quantum Computer Condition (QCC), an inequality governing the evolution of a quantum computer. We show that all known coding schemes are actually special cases of the QCC. We demonstrate this by introducing a new, operator theoretic form of entanglement assisted quantum error correction, which incorporates as special cases all known error correcting protocols, and is itself a special case of the QCC.
△ Less
Submitted 12 February, 2008; v1 submitted 2 September, 2007;
originally announced September 2007.
-
Quantum Sensor Miniaturization
Authors:
G. Gilbert,
M. Hamrick,
Y. S. Weinstein,
S. P. Pappas,
A. Donadio
Abstract:
The classical bound on image resolution defined by the Rayleigh limit can be beaten by exploiting the properties of quantum mechanical entanglement. If entangled photons are used as signal states, the best possible resolution is instead given by the Heisenberg limit, an improvement proportional to the number of entangled photons in the signal. In this paper we present a novel application of enta…
▽ More
The classical bound on image resolution defined by the Rayleigh limit can be beaten by exploiting the properties of quantum mechanical entanglement. If entangled photons are used as signal states, the best possible resolution is instead given by the Heisenberg limit, an improvement proportional to the number of entangled photons in the signal. In this paper we present a novel application of entanglement by showing that the resolution obtained by an imaging system utilizing separable photons can be achieved by an imaging system making use of entangled photons, but with the advantage of a smaller aperture, thus resulting in a smaller and lighter system. This can be especially valuable in satellite imaging where weight and size play a vital role.
△ Less
Submitted 24 August, 2007;
originally announced August 2007.
-
Reliable Final Computational Results from Faulty Quantum Computation
Authors:
Gerald Gilbert,
Michael Hamrick,
Yaakov S. Weinstein
Abstract:
In this paper we extend both standard fault tolerance theory and Kitaev's model for quantum computation, combining them so as to yield quantitative results that reveal the interplay between the two. Our analysis establishes a methodology that allows us to quantitatively determine design parameters for a quantum computer, the values of which ensure that an overall computation of interest yields a…
▽ More
In this paper we extend both standard fault tolerance theory and Kitaev's model for quantum computation, combining them so as to yield quantitative results that reveal the interplay between the two. Our analysis establishes a methodology that allows us to quantitatively determine design parameters for a quantum computer, the values of which ensure that an overall computation of interest yields a correct *final result* with some prescribed probability of success, as opposed to merely ensuring that the desired *final quantum state* is obtained. As a specific example of the practical application of our approach, we explicitly calculate the number of levels of error correction concatenation needed to achieve a correct final result for the overall computation with some prescribed success probability. Since our methodology allows one to determine parameters required in order to achieve the correct final result for the overall quantum computation, as opposed to merely ensuring that the desired final quantum state is produced, our method enables the determination of complete quantum computational resource requirements associated to the actual solution of practical problems.
△ Less
Submitted 29 June, 2007;
originally announced July 2007.
-
On the use of photonic N00N states for practical quantum interferometry
Authors:
G. Gilbert,
M. Hamrick,
Y. S. Weinstein
Abstract:
The performance of photonic $N00N$ states, propagating in an attenuating medium, is analyzed with respect to phase estimation. It is shown that, for $N00N$ states propagating through a lossy medium, the Heisenberg limit is never achieved. It is also shown that, for a given value of $N$, a signal comprised of an attenuated separable state of $N$ photons will actually produce a better phase estima…
▽ More
The performance of photonic $N00N$ states, propagating in an attenuating medium, is analyzed with respect to phase estimation. It is shown that, for $N00N$ states propagating through a lossy medium, the Heisenberg limit is never achieved. It is also shown that, for a given value of $N$, a signal comprised of an attenuated separable state of $N$ photons will actually produce a better phase estimate than will a signal comprised of an equally attenuated $N00N$ state, unless the transmittance of the medium is very high. This is a consequence of the need to utilize measurement operators appropriate to the different signal states. The result is that, for most practical applications in realistic scenarios with attenuation, the resolution of $N00N$ state-based phase estimation not only does not achieve the Heisenberg Limit, but is actually worse than the Standard Quantum Limit. It is demonstrated that this performance deficit becomes more pronounced as the number, $N$, of photons in the signal increases.
△ Less
Submitted 19 December, 2006;
originally announced December 2006.
-
Efficient Construction of Photonic Quantum Computational Clusters
Authors:
Gerald Gilbert,
Michael Hamrick,
Yaakov S. Weinstein
Abstract:
We demonstrate a method of creating photonic two-dimensional cluster states that is considerably more efficient than previously proposed approaches. Our method uses only local unitaries and type-I fusion operations. The increased efficiency of our method compared to previously proposed constructions is obtained by identifying and exploiting local equivalence properties inherent in cluster states…
▽ More
We demonstrate a method of creating photonic two-dimensional cluster states that is considerably more efficient than previously proposed approaches. Our method uses only local unitaries and type-I fusion operations. The increased efficiency of our method compared to previously proposed constructions is obtained by identifying and exploiting local equivalence properties inherent in cluster states.
△ Less
Submitted 14 December, 2005;
originally announced December 2005.
-
Quantum Computer Condition: Stability, Classical Computation and Norms
Authors:
Gerald Gilbert,
Michael Hamrick,
F. Javier Thayer,
Yaakov S. Weinstein
Abstract:
The Quantum Computer Condition (QCC) provides a rigorous and completely general framework for carrying out analyses of questions pertaining to fault-tolerance in quantum computers. In this paper we apply the QCC to the problem of fluctuations and systematic errors in the values of characteristic parameters in realistic systems. We show that fault-tolerant quantum computation is possible despite…
▽ More
The Quantum Computer Condition (QCC) provides a rigorous and completely general framework for carrying out analyses of questions pertaining to fault-tolerance in quantum computers. In this paper we apply the QCC to the problem of fluctuations and systematic errors in the values of characteristic parameters in realistic systems. We show that fault-tolerant quantum computation is possible despite variations in these parameters. We also use the QCC to explicitly show that reliable classical computation can be carried out using as input the results of fault-tolerant, but imperfect, quantum computation. Finally, we consider the advantages and disadvantages of the superoperator and diamond norms in connection with application of the QCC to various quantum information-theoretic problems.
△ Less
Submitted 17 November, 2005;
originally announced November 2005.
-
Comment on "Operator Quantum Error Correction"
Authors:
Gerald Gilbert,
Michael Hamrick,
F. Javier Thayer,
Yaakov S. Weinstein
Abstract:
The attempt to equate operator quantum error correction (quant-ph/0504189v1) with the quantum computer condition (quant-ph/0507141) in version two of quant-ph/0504189 is shown to be invalid.
The attempt to equate operator quantum error correction (quant-ph/0504189v1) with the quantum computer condition (quant-ph/0507141) in version two of quant-ph/0504189 is shown to be invalid.
△ Less
Submitted 17 October, 2005;
originally announced October 2005.
-
A Theory of Physical Quantum Computation: The Quantum Computer Condition
Authors:
Gerald Gilbert,
Michael Hamrick,
F. Javier Thayer
Abstract:
In this paper we present a new unified theoretical framework that describes the full dynamics of quantum computation. Our formulation allows any questions pertaining to the physical behavior of a quantum computer to be framed, and in principle, answered. We refer to the central organizing principle developed in this paper, on which our theoretical structure is based, as the *Quantum Computer Con…
▽ More
In this paper we present a new unified theoretical framework that describes the full dynamics of quantum computation. Our formulation allows any questions pertaining to the physical behavior of a quantum computer to be framed, and in principle, answered. We refer to the central organizing principle developed in this paper, on which our theoretical structure is based, as the *Quantum Computer Condition* (QCC), a rigorous mathematical statement that connects the irreversible dynamics of the quantum computing machine, with the reversible operations that comprise the quantum computation intended to be carried out by the quantum computing machine. Armed with the QCC, we derive a powerful result that we call the *Encoding No-Go Theorem*. This theorem gives a precise mathematical statement of the conditions under which fault-tolerant quantum computation becomes impossible in the presence of dissipation and/or decoherence. In connection with this theorem, we explicitly calculate a universal critical damping value for fault-tolerant quantum computation. In addition we show that the recently-discovered approach to quantum error correction known as "operator quantum error-correction" (OQEC) is a special case of our more general formulation. Our approach furnishes what we will refer to as "operator quantum fault-tolerance" (OQFT). In particular, we show how the QCC allows one to derive error thresholds for fault tolerance in a completely general context. We prove the existence of solutions to a class of time-dependent generalizations of the Lindblad equation. Using the QCC, we also show that the seemingly different circuit, graph- (including cluster-) state, and adiabatic paradigms for quantum computing are in fact all manifestations of a single, universal paradigm for all physical quantum computation.
△ Less
Submitted 20 July, 2005; v1 submitted 15 July, 2005;
originally announced July 2005.
-
Privacy Amplification in Quantum Key Distribution: Pointwise Bound versus Average Bound
Authors:
G. Gilbert,
M. Hamrick,
F. J. Thayer
Abstract:
In order to be practically useful, quantum cryptography must not only provide a guarantee of secrecy, but it must provide this guarantee with a useful, sufficiently large throughput value. The standard result of generalized privacy amplification yields an upper bound only on the average value of the mutual information available to an eavesdropper. Unfortunately this result by itself is inadequat…
▽ More
In order to be practically useful, quantum cryptography must not only provide a guarantee of secrecy, but it must provide this guarantee with a useful, sufficiently large throughput value. The standard result of generalized privacy amplification yields an upper bound only on the average value of the mutual information available to an eavesdropper. Unfortunately this result by itself is inadequate for cryptographic applications. A naive application of the standard result leads one to incorrectly conclude that an acceptable upper bound on the mutual information has been achieved. It is the pointwise value of the bound on the mutual information, associated with the use of some specific hash function, that corresponds to actual implementations. We provide a fully rigorous mathematical derivation that shows how to obtain a cryptographically acceptable upper bound on the actual, pointwise value of the mutual information. Unlike the bound on the average mutual information, the value of the upper bound on the pointwise mutual information and the number of bits by which the secret key is compressed are specified by two different parameters, and the actual realization of the bound in the pointwise case is necessarily associated with a specific failure probability. The constraints amongst these parameters, and the effect of their values on the system throughput, have not been previously analyzed. We show that the necessary shortening of the key dictated by the cryptographically correct, pointwise bound, can still produce viable throughput rates that will be useful in practice.
△ Less
Submitted 2 August, 2001;
originally announced August 2001.
-
Secrecy, Computational Loads and Rates in Practical Quantum Cryptography
Authors:
G. Gilbert,
M. Hamrick
Abstract:
A number of questions associated with practical implementations of quantum cryptography systems having to do with unconditional secrecy, computational loads and effective secrecy rates in the presence of perfect and imperfect sources are discussed. The different types of unconditional secrecy, and their relationship to general communications security, are discussed in the context of quantum cryp…
▽ More
A number of questions associated with practical implementations of quantum cryptography systems having to do with unconditional secrecy, computational loads and effective secrecy rates in the presence of perfect and imperfect sources are discussed. The different types of unconditional secrecy, and their relationship to general communications security, are discussed in the context of quantum cryptography. In order to actually carry out a quantum cryptography protocol it is necessary that sufficient computational resources be available to perform the various processing steps, such as sifting, error correction, privacy amplification and authentication. We display the full computer machine instruction requirements needed to support a practical quantum cryptography implementation. We carry out a numerical comparison of system performance characteristics for implementations that make use of either weak coherent sources of light or perfect single photon sources, for eavesdroppers making individual attacks on the quantum channel characterized by different levels of technological capability. We find that, while in some circumstances it is best to employ perfect single photon sources, in other situations it is preferable to utilize weak coherent sources. In either case the secrecy level of the final shared cipher is identical, with the relevant distinguishing figure-of-merit being the effective throughput rate.
△ Less
Submitted 11 September, 2002; v1 submitted 7 June, 2001;
originally announced June 2001.
-
Constraints on Eavesdropping on the BB84 Protocol
Authors:
G. Gilbert,
M. Hamrick
Abstract:
An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdropping attacks, how the general analysis of this pro…
▽ More
An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdropping attacks, how the general analysis of this problem may proceed.
△ Less
Submitted 11 June, 2001; v1 submitted 6 June, 2001;
originally announced June 2001.
-
The Secrecy Capacity of Practical Quantum Cryptography
Authors:
G. Gilbert,
M. Hamrick
Abstract:
Quantum cryptography has attracted much recent attention due to its potential for providing secret communications that cannot be decrypted by any amount of computational effort. This is the first analysis of the secrecy of a practical implementation of the BB84 protocol that simultaneously takes into account and presents the {\it full} set of complete analytical expressions for effects due to th…
▽ More
Quantum cryptography has attracted much recent attention due to its potential for providing secret communications that cannot be decrypted by any amount of computational effort. This is the first analysis of the secrecy of a practical implementation of the BB84 protocol that simultaneously takes into account and presents the {\it full} set of complete analytical expressions for effects due to the presence of pulses containing multiple photons in the attenuated output of the laser, the finite length of individual blocks of key material, losses due to error correction, privacy amplification, continuous authentication, errors in polarization detection, the efficiency of the detectors, and attenuation processes in the transmission medium. The analysis addresses eavesdropping attacks on individual photons rather than collective attacks in general. Of particular importance is the first derivation of the necessary and sufficient amount of privacy amplification compression to ensure secrecy against the loss of key material which occurs when an eavesdropper makes optimized individual attacks on pulses containing multiple photons. It is shown that only a fraction of the information in the multiple photon pulses is actually lost to the eavesdropper.
△ Less
Submitted 6 June, 2001;
originally announced June 2001.
-
Practical Quantum Cryptography: A Comprehensive Analysis (Part One)
Authors:
G. Gilbert,
M. Hamrick
Abstract:
We perform a comprehensive analysis of practical quantum cryptography (QC) systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels for ground-ground, ground-satellite, air-satellite and satellite-satellite links. (1) We obtain universal expressions for the effective secrecy capacity and rate for QC systems taking into account three importan…
▽ More
We perform a comprehensive analysis of practical quantum cryptography (QC) systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels for ground-ground, ground-satellite, air-satellite and satellite-satellite links. (1) We obtain universal expressions for the effective secrecy capacity and rate for QC systems taking into account three important attacks on individual quantum bits, including explicit closed-form expressions for the requisite amount of privacy amplification. Our analysis also includes the explicit calculation in detail of the total cost in bits of continuous authentication, thereby obtaining new results for actual ciphers of finite length. (2) We perform for the first time a detailed, explicit analysis of all systems losses due to propagation, errors, noise, etc. as appropriate to both optical fiber cable- and satellite communications-based implementations of QC. (3) We calculate for the first time all system load costs associated to classical communication and computational constraints that are ancillary to, but essential for carrying out, the pure QC protocol itself. (4) We introduce an extended family of generalizations of the Bennett-Brassard (BB84) QC protocol that equally provide unconditional secrecy but allow for the possibility of optimizing throughput rates against specific cryptanalytic attacks. (5) We obtain universal predictions for maximal rates that can be achieved with practical system designs under realistic environmental conditions. (6) We propose a specific QC system design that includes the use of a novel method of high-speed photon detection that may be able to achieve very high throughput rates for actual implementations in realistic environments.
△ Less
Submitted 4 December, 2003; v1 submitted 7 September, 2000;
originally announced September 2000.