I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université.
Tony Short University of Cambridge (with Sabri Al-Safi – PRA 84, (2011))
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Fixing the lower limit of uncertainty in the presence of quantum memory Archan S. Majumdar S. N. Bose National Centre for Basic Sciences, Kolkata Collaborators:
1 12. Principles of Parameter Estimation The purpose of this lecture is to illustrate the usefulness of the various concepts introduced and studied in.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Capacity of Wireless Channels
Nonlocal Boxes And All That Daniel Rohrlich Atom Chip Group, Ben Gurion University, Beersheba, Israel 21 January 2010.
1 quantum teleportation David Riethmiller 28 May 2007.
Chain Rules for Entropy
Bell inequality & entanglement
Bell’s inequalities and their uses Mark Williamson The Quantum Theory of Information and Computation
Quantum Computing MAS 725 Hartmut Klauck NTU
Chapter 6 Information Theory
Fundamental limits in Information Theory Chapter 10 :
The 1’st annual (?) workshop. 2 Communication under Channel Uncertainty: Oblivious channels Michael Langberg California Institute of Technology.
Constrained Maximization
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
1 Network Source Coding Lee Center Workshop 2006 Wei-Hsin Gu (EE, with Prof. Effros)
Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.
CSEP 590tv: Quantum Computing
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Noise, Information Theory, and Entropy
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
1 10. Joint Moments and Joint Characteristic Functions Following section 6, in this section we shall introduce various parameters to compactly represent.
Quantum Shannon Theory Patrick Hayden (McGill) 17 July 2005, Q-Logic Meets Q-Info.
INFORMATION THEORY BYK.SWARAJA ASSOCIATE PROFESSOR MREC.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
Channel Capacity.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
1 Experimenter‘s Freedom in Bell‘s Theorem and Quantum Cryptography Johannes Kofler, Tomasz Paterek, and Časlav Brukner Non-local Seminar Vienna–Bratislava.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Principles of Parameter Estimation.
Quantum correlations with no causal order OgnyanOreshkov, Fabio Costa, ČaslavBrukner Bhubaneswar arXiv: December2011 Conference on Quantum.
The Classically Enhanced Father Protocol
The question Can we generate provable random numbers? …. ?
Joint Moments and Joint Characteristic Functions.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
1 On the Channel Capacity of Wireless Fading Channels C. D. Charalambous and S. Z. Denic School of Information Technology and Engineering, University of.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Antonio Acín
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
Support Vector Machine: An Introduction. (C) by Yu Hen Hu 2 Linear Hyper-plane Classifier For x in the side of o : w T x + b  0; d = +1; For.
Non-Locality Swapping and emergence of quantum correlations Nicolas Brunner Paul Skrzypczyk, Sandu Popescu University of Bristol.
Sullivan Algebra and Trigonometry: Section 12.9 Objectives of this Section Set Up a Linear Programming Problem Solve a Linear Programming Problem.
Quantum Non-locality: From Bell to Information Causality Alex Thompson Physics 486 March 7, 2016.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Random Access Codes and a Hypercontractive Inequality for
Information primitives and laws of nature Mai 2008 Alain Tapp
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Quantum Information Theory Introduction
Atom Chip Group, Ben Gurion University, Beersheba, Israel
Chapter 7: Systems of Equations and Inequalities; Matrices
Sequential sharing of nonlocal correlations
Experimental test of nonlocal causality
Presentation transcript:

I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi Hsu (CYCU)

1. Information Causality (IC) and quantum correlations Quantum non-locality No-signaling theory Information Causality (IC) 2. IC and the signal decay theorem IC and signal decay theorem The generalized Tsirelson-type inequality

3. Testing IC for general quantum communication protocols Feasibility for maximizing mutual information by convex optimization? Solutions Solution (i): Solution (ii): 4. The conclusion

The CHSH inequality The measurement scenario

The local hidden variable theory: If A0, A1, B0, B1=1, -1, then Cxy= ; CHSH=(A0 + A1) B0 + (A0 − A1) B1; | | ≤ 2

Tsirelson bound The maximal amount of quantum violation - Tsirelson bound Since Why Quantum mechanics cannot be more nonlocal?

The speed of the propagating information cannot be faster than the light speed To be specific, despite of any non-local correlations previously shared between Alice and Bob, Alice cannot signal to the distant Bob by her choice of inputs due to the no-signaling theory.

Does the no-signaling theory limit the quantum non-locality? The PR-box:

What is Information Causality (IC)? In the communication protocol, the information gain cannot exceed the amount of classical communication.

The Random Access Code (RAC) protocol Alice prepares a data base { } in secret. She sends Bob a bit Bob decode Alice’s bit ay by Bob is successful only if i.e., IC says total mutual information between Bob’s guess bit β and Alice’s database is bounded by 1, i.e., IC is violated!

For binary quantum system with two measurement settings per side IC is satisfied by quantum mechanics. IC is violated by PR-box. The Tsirelson bound is consistent with IC. IC could be the physical principle to distinguish quantum correlations from the non-quantum (non- local) correlations.

M ULTI - SETTING RAC PROTOCOL Alice encodes her database by x(i+1)=a0+ai, i=0,…,k-1. Bob encodes his given bit b as a k-1 bits string y.

Bob’s success probability to guess is Define the coding noise parameter to be The result: The noise parameter and the CHSH inequality

Binary symmetric channel The signal decay theorem IC yields: Binary symmetric channel ] W. Evans and L. J. Schulman, Proceedings of the 34 th Annual Symposium on Foundations of Computer Science, 594 (1993). YZ

Multi-setting Tsirelson-type inequalities Using the Cauchy-Schwarz inequality, we can obtain When k=2, The Tsirelson inequality

SDP can solve the problem of optimizing a linear function which subject to the constraint that the combination of symmetric matrices is positive semidefinite. We use the same method proposed by Stephanie Wehner to calculate the quantum bound. S. Wehner, Phys. Rev. A 73, (2006).

T ESTING IC FOR GENERAL QUANTUM COMMUNICATION PROTOCOLS

For multi-level quantum communication protocols, IC is satisfied by quantum correlation? saturated?

We use the convex optimization to maximize the mutual information (I) over Alice’s input probabilities and quantum joint probability from NS-box. Minimizing a convex function with the equality or inequality constraints is called convex optimization.

We could find a concave function: the Bell-type function which is monotonically increasing to the mutual information (I) and maximize it over all quantum joint probability of NS-box and Alice’s input probabilities. Brutal force : without relying on convex optimization. We have to pick up all the sets of quantum and input marginal probability and then evaluate the corresponding mutual information (I).

If, Bob can guess perfectly. The symmetric channel Multi-level RAC protocol The signal decay theorem for di-nary channel

Using the Cauchy-Schwarz inequality, we can obtain If, and is uniform, we then prove the mutual information (I) is monotonically increasing with the noise parameter.

Quantum mechanics satisfies IC Using the quantum constraints of the joint probabilities of NS-box proposed by One can write down the constraints in convex optimization problem and find the quantum bound of the Bell-type function. Moreover one can calculate the associated mutual information. Result: The associated maximal mutual information is less than the bound from information causality.

We could find a concave function which is monotonically increasing to the mutual information (I) and then evaluate the corresponding mutual information (I). For example: the object of quantum non-locality. Brutal force : without relying on convex optimization. We have to pick up all the sets of quantum correlation and input marginal probability and then evaluate the corresponding mutual information (I).

Fixed input: symmetric channels with i.i.d. and uniform input marginal probabilities Fixed joint probability: with non-uniform input marginal probabilities. The most general case.

The necessary and sufficient condition for correlation functions

The non-locality is characterized by the CHSH function. The red part can be achieved also by sharing the local correlation. The maximal mutual information for the local or quantum correlations is bound by 1. IC is saturated. When 1. The mutual information is not monotonically related to the quantum non-locality. 2. The more quantum non-locality may not always yield the more mutual information. Non-locality

Symmetric channels Asymmetric channels

By partitioning the defining domains of the probabilities into 100 points. We find IC is saturated.

We combine IC and the signal decay theorem and then obtain a series of Tsirelson-type inequalities for two-level and bi-partite quantum systems. For the quantum communication protocols discussed in our work, the IC is never violated. Thus, IC is supported and could be treated as a physical principle to single out quantum mechanics. We also find that the IC is saturated not for the case with the associated Tsirelson bound but for the case saturating the local bound of the CHSH inequality. Sharing more non-local correlation does not imply the better performance in our communication protocols.

How to know the given joint probabilities could be reproduced by quantum system? A: Unless they satisfy a hierarchical quantum constraints. The quantum constraints of joint probabilities come from the property of projection operators. Hermiticity: Orthogonality: Completeness: Commutativity:

The constraint becomes stronger than the previous step of the hierarchical constraint. Q1 Q2 Q3

von Neumann suggested that the error of the computation should be treated by thermodynamical method as the treatment for the communication in Shannon's work. This means that, for the noisy computation, one should use some information-theoretic methods related to the noisy communication.

The first step of the hierarchical constraints The second step of the hierarchical constraints Quantum correlations satisfy IC

The top region Non-locality

SymmetricSymmetric and