Skip to main content

Showing 1–21 of 21 results for author: Elkouss, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.20588  [pdf, other

    quant-ph cs.IT

    A finite sufficient set of conditions for catalytic majorization

    Authors: David Elkouss, Ananda G. Maity, Aditya Nema, Sergii Strelchuk

    Abstract: The majorization relation has found numerous applications in mathematics, quantum information and resource theory, and quantum thermodynamics, where it describes the allowable transitions between two physical states. In many cases, when state vector $x$ does not majorize state vector $y$, it is nevertheless possible to find a catalyst - another vector $z$ such that $x \otimes z$ majorizes… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

    Comments: 22 pages, 1 figure

  2. arXiv:2502.02208  [pdf, other

    quant-ph cs.NI

    Bayesian Optimization for Repeater Protocols

    Authors: Lorenzo La Corte, Kenneth Goodenough, Ananda G. Maity, Siddhartha Santra, David Elkouss

    Abstract: Efficiently distributing secret keys over long distances remains a critical challenge in the development of quantum networks. "First-generation" quantum repeater chains distribute entanglement by executing protocols composed of probabilistic entanglement generation, swapping and distillation operations. However, finding the protocol that maximizes the secret-key rate is difficult for two reasons.… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

    Comments: 8 pages, 8 figures

  3. arXiv:2501.11009  [pdf, other

    quant-ph cs.IT

    Efficient Reconciliation of Continuous Variable Quantum Key Distribution with Multiplicatively Repeated Non-Binary LDPC Codes

    Authors: Jesus Martinez-Mateo, David Elkouss

    Abstract: Continuous variable quantum key distribution bears the promise of simple quantum key distribution directly compatible with commercial off the shelf equipment. However, for a long time its performance was hindered by the absence of good classical postprocessing capable of distilling secret-keys in the noisy regime. Advanced coding solutions in the past years have partially addressed this problem en… ▽ More

    Submitted 19 January, 2025; originally announced January 2025.

    Comments: 27 pages, 12 figures

  4. arXiv:2406.06881  [pdf, ps, other

    quant-ph cs.CR

    Pseudo-Entanglement is Necessary for EFI Pairs

    Authors: Manuel Goulão, David Elkouss

    Abstract: Regarding minimal assumptions, most of classical cryptography is known to depend on the existence of One-Way Functions (OWFs). However, recent evidence has shown that this is not the case when considering quantum resources. Besides the well known unconditional security of Quantum Key Distribution, it is now known that computational cryptography may be built on weaker primitives than OWFs, e.g., ps… ▽ More

    Submitted 10 October, 2024; v1 submitted 10 June, 2024; originally announced June 2024.

  5. Noise is resource-contextual in quantum communication

    Authors: Aditya Nema, Ananda G. Maity, Sergii Strelchuk, David Elkouss

    Abstract: Estimating the information transmission capability of a quantum channel remains one of the fundamental problems in quantum information processing. In contrast to classical channels, the information-carrying capability of quantum channels is contextual. One of the most significant manifestations of this is the superadditivity of the channel capacity: the capacity of two quantum channels used togeth… ▽ More

    Submitted 4 September, 2023; v1 submitted 1 May, 2023; originally announced May 2023.

    Comments: 16 pages, 6 figures, Updated with additional and elaborated references. Sincere, thanks to Felix Leditzky and Stefano Pirandola for pointing out the appropriate references. Added note on general applicability of results

    Journal ref: Phys. Rev. Research 6, 033089 (2024)

  6. LIMDD: A Decision Diagram for Simulation of Quantum Computing Including Stabilizer States

    Authors: Lieuwe Vinkhuijzen, Tim Coopmans, David Elkouss, Vedran Dunjko, Alfons Laarman

    Abstract: Efficient methods for the representation and simulation of quantum states and quantum operations are crucial for the optimization of quantum circuits. Decision diagrams (DDs), a well-studied data structure originally used to represent Boolean functions, have proven capable of capturing relevant aspects of quantum systems, but their limits are not well understood. In this work, we investigate and b… ▽ More

    Submitted 6 September, 2023; v1 submitted 2 August, 2021; originally announced August 2021.

    ACM Class: E.1

    Journal ref: Quantum 7, 1108 (2023)

  7. arXiv:2012.06764  [pdf, other

    quant-ph cs.IT cs.NI

    Tools for quantum network design

    Authors: Koji Azuma, Stefan Bäuml, Tim Coopmans, David Elkouss, Boxi Li

    Abstract: Quantum networks will enable the implementation of communication tasks with qualitative advantages with respect to the communication networks we know today. While it is expected that the first demonstrations of small scale quantum networks will take place in the near term, many challenges remain to scale them. To compare different solutions, optimize over parameter space and inform experiments, it… ▽ More

    Submitted 28 January, 2021; v1 submitted 12 December, 2020; originally announced December 2020.

    Comments: 31 pages, 6 figures. Minor corrections

  8. Non-convexity of private capacity and classical environment-assisted capacity of a quantum channel

    Authors: David Elkouss, Sergii Strelchuk

    Abstract: The capacity of classical channels is convex. This is not the case for the quantum capacity of a channel: the capacity of a mixture of different quantum channels exceeds the mixture of the individual capacities and thus is non-convex. Here we show that this effect goes beyond the quantum capacity and holds for the private and classical environment-assisted capacities of quantum channels.

    Submitted 13 September, 2016; v1 submitted 27 April, 2016; originally announced April 2016.

    Comments: 8 pages, 2 figures

    Journal ref: Phys. Rev. A 94, 040301 (2016)

  9. arXiv:1601.06101  [pdf, other

    cs.IT cs.CC cs.FL quant-ph

    Memory effects can make the transmission capability of a communication channel uncomputable

    Authors: David Elkouss, David Pérez-García

    Abstract: Most communication channels are subjected to noise. One of the goals of Information Theory is to add redundancy in the transmission of information so that the information is transmitted reliably and the amount of information transmitted through the channel is as large as possible. The maximum rate at which reliable transmission is possible is called the capacity. If the channel does not keep memor… ▽ More

    Submitted 20 March, 2018; v1 submitted 22 January, 2016; originally announced January 2016.

    Comments: Improved presentation and clarified claims

    Journal ref: Nature Communications vol 9 no 1149 (2018)

  10. Superadditivity of private information for any number of uses of the channel

    Authors: David Elkouss, Sergii Strelchuk

    Abstract: The quantum capacity of a quantum channel is always smaller than the capacity of the channel for private communication. However, both quantities are given by the infinite regularization of respectively the coherent and the private information. Here, we construct a family of channels for which the private and coherent information can remain strictly superadditive for unbounded number of uses. We pr… ▽ More

    Submitted 18 February, 2015; originally announced February 2015.

    Comments: 6 pages, 1 figure

    Journal ref: Phys. Rev. Lett. 115, 040501 (2015)

  11. Fundamental Finite Key Limits for One-Way Information Reconciliation in Quantum Key Distribution

    Authors: Marco Tomamichel, Jesus Martinez-Mateo, Christoph Pacher, David Elkouss

    Abstract: The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of… ▽ More

    Submitted 10 October, 2017; v1 submitted 21 January, 2014; originally announced January 2014.

    Journal ref: Quantum Information Processing (2017) 16:280

  12. arXiv:1304.4048  [pdf, ps, other

    quant-ph cs.CR cs.NI

    Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters

    Authors: David Elkouss, Jesus Martinez-Mateo, Alex Ciurana, Vicente Martin

    Abstract: In this paper we explore how recent technologies can improve the security of optical networks. In particular, we study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quant… ▽ More

    Submitted 15 April, 2013; originally announced April 2013.

    Comments: 11 pages, 13 figures

    Journal ref: Journal of Optical Communications and Networking 5 (2013) 316-328

  13. Analysis of a rate-adaptive reconciliation protocol and the effect of the leakage on the secret key rate

    Authors: David Elkouss, Jesus Martinez-Mateo, Vicente Martin

    Abstract: Quantum key distribution performs the trick of growing a secret key in two distant places connected by a quantum channel. The main reason is that the legitimate users can bound the information gathered by the eavesdropper. In practical systems, whether because of finite resources or external conditions, the quantum channel is subject to fluctuations. A rate adaptive information reconciliation prot… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: 8 pages, 2 figures, accepted for publication in Physical Review A. This submission supersedes arXiv:1007.0904

    Journal ref: Physical Review A 87, 042334 (2013)

  14. arXiv:1205.5729  [pdf, ps, other

    quant-ph cs.IT

    Blind Reconciliation

    Authors: Jesus Martinez-Mateo, David Elkouss, Vicente Martin

    Abstract: Information reconciliation is a crucial procedure in the classical post-processing of quantum key distribution (QKD). Poor reconciliation efficiency, revealing more information than strictly needed, may compromise the maximum attainable distance, while poor performance of the algorithm limits the practical throughput in a QKD device. Historically, reconciliation has been mainly done using close to… ▽ More

    Submitted 29 January, 2013; v1 submitted 25 May, 2012; originally announced May 2012.

    Comments: 22 pages, 8 figures

    Journal ref: Quantum Information and Computation, Vol. 12, No. 9&10 (2012) 0791-0812

  15. Untainted Puncturing for Irregular Low-Density Parity-Check Codes

    Authors: David Elkouss, Jesus Martinez-Mateo, Vicente Martin

    Abstract: Puncturing is a well-known coding technique widely used for constructing rate-compatible codes. In this paper, we consider the problem of puncturing low-density parity-check codes and propose a new algorithm for intentional puncturing. The algorithm is based on the puncturing of untainted symbols, i.e. nodes with no punctured symbols within their neighboring set. It is shown that the algorithm pro… ▽ More

    Submitted 29 January, 2013; v1 submitted 31 March, 2011; originally announced March 2011.

    Comments: 4 pages, 3 figures

    Journal ref: Wireless Communications Letters, IEEE Volume: 1 , Issue: 6, Publication Year: 2012 , Page(s): 585 - 588

  16. Improved construction of irregular progressive edge-growth Tanner graphs

    Authors: Jesus Martinez-Mateo, David Elkouss, Vicente Martin

    Abstract: The progressive edge-growth algorithm is a well-known procedure to construct regular and irregular low-density parity-check codes. In this paper, we propose a modification of the original algorithm that improves the performance of these codes in the waterfall region when constructing codes complying with both, check and symbol node degree distributions. The proposed algorithm is thus interesting i… ▽ More

    Submitted 1 April, 2011; v1 submitted 21 July, 2010; originally announced July 2010.

    Comments: 3 pages, 3 figures

    Journal ref: Communications Letters, IEEE Volume: 14 , Issue: 12, Publication Year: 2010 , Page(s): 1155 - 1157

  17. Secure rate-adaptive reconciliation

    Authors: David Elkouss, Jesus Martinez-Mateo, Vicente Martin

    Abstract: We consider in this paper the problem of information reconciliation in the context of secret key agreement between two legitimate parties, Alice and Bob. Beginning the discussion with the secret key agreement model introduced by Ahlswede and Csiszár, the channel-type model with wiretapper, we study a protocol based on error correcting codes. The protocol can be adapted to changes in the communicat… ▽ More

    Submitted 6 June, 2011; v1 submitted 6 July, 2010; originally announced July 2010.

    Comments: 6 pages, 5 figures

  18. Interactive Reconciliation with Low-Density Parity-Check Codes

    Authors: Jesus Martinez-Mateo, David Elkouss, Vicente Martin

    Abstract: Efficient information reconciliation is crucial in several scenarios, being quantum key distribution a remarkable example. However, efficiency is not the only requirement for determining the quality of the information reconciliation process. In some of these scenarios we find other relevant parameters such as the interactivity or the adaptability to different channel statistics. We propose an inte… ▽ More

    Submitted 23 June, 2010; originally announced June 2010.

  19. Rate Compatible Protocol for Information Reconciliation: An application to QKD

    Authors: David Elkouss, Jesus Martinez-Mateo, Daniel Lancho, Vicente Martin

    Abstract: Information Reconciliation is a mechanism that allows to weed out the discrepancies between two correlated variables. It is an essential component in every key agreement protocol where the key has to be transmitted through a noisy channel. The typical case is in the satellite scenario described by Maurer in the early 90's. Recently the need has arisen in relation with Quantum Key Distribution (QKD… ▽ More

    Submitted 14 June, 2010; originally announced June 2010.

  20. QKD in Standard Optical Telecommunications Networks

    Authors: D. Lancho, J. Martinez, D. Elkouss, M. Soto, V. Martin

    Abstract: To perform Quantum Key Distribution, the mastering of the extremely weak signals carried by the quantum channel is required. Transporting these signals without disturbance is customarily done by isolating the quantum channel from any noise sources using a dedicated physical channel. However, to really profit from this technology, a full integration with conventional network technologies would be h… ▽ More

    Submitted 18 June, 2010; v1 submitted 9 June, 2010; originally announced June 2010.

    Journal ref: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Volume 36, pp 142-149. (2010)

  21. Efficient reconciliation protocol for discrete-variable quantum key distribution

    Authors: David Elkouss, Anthony Leverrier, Romain Alléaume, Joseph Boutros

    Abstract: Reconciliation is an essential part of any secret-key agreement protocol and hence of a Quantum Key Distribution (QKD) protocol, where two legitimate parties are given correlated data and want to agree on a common string in the presence of an adversary, while revealing a minimum amount of information. In this paper, we show that for discrete-variable QKD protocols, this problem can be advantag… ▽ More

    Submitted 14 January, 2009; originally announced January 2009.