-
Women for Quantum -- Manifesto of Values
Authors:
Almut Beige,
Ana Predojević,
Anja Metelmann,
Anna Sanpera,
Chiara Macchiavello,
Christiane P. Koch,
Christine Silberhorn,
Costanza Toninelli,
Dagmar Bruß,
Elisa Ercolessi,
Elisabetta Paladino,
Francesca Ferlaino,
Giulia Ferrini,
Gloria Platero,
Ivette Fuentes,
Kae Nemoto,
Leticia Tarruell,
Maria Bondani,
Marilu Chiofalo,
Marisa Pons,
Milena D'Angelo,
Mio Murao,
Nicole Fabbri,
Paola Verrucchi,
Pascale Senellart-Mardon
, et al. (8 additional authors not shown)
Abstract:
Data show that the presence of women in quantum science is affected by a number of detriments and their percentage decreases even further for higher positions. Beyond data, from our shared personal experiences as female tenured quantum physics professors, we believe that the current model of scientific leadership, funding, and authority fails to represent many of us. It is time for a real change t…
▽ More
Data show that the presence of women in quantum science is affected by a number of detriments and their percentage decreases even further for higher positions. Beyond data, from our shared personal experiences as female tenured quantum physics professors, we believe that the current model of scientific leadership, funding, and authority fails to represent many of us. It is time for a real change that calls for a different kind of force and for the participation of everyone. Women for quantum calls for a joint effort and aims with this initiative to contribute to such a transformation.
△ Less
Submitted 4 July, 2024; v1 submitted 24 May, 2024;
originally announced July 2024.
-
Multipartite multiplexing strategies for quantum routers
Authors:
Julia A. Kunzelmann,
Hermann Kampermann,
Dagmar Bruß
Abstract:
This work explores the important role of quantum routers in communication networks and investigates the increase in efficiency using memories and multiplexing strategies. Motivated by the bipartite setup introduced by Abruzzo et al. (2013) for finite-range multiplexing in quantum repeaters, we extend the study to an N-partite network with a router as a central station. We present a general protoco…
▽ More
This work explores the important role of quantum routers in communication networks and investigates the increase in efficiency using memories and multiplexing strategies. Motivated by the bipartite setup introduced by Abruzzo et al. (2013) for finite-range multiplexing in quantum repeaters, we extend the study to an N-partite network with a router as a central station. We present a general protocol for N parties after defining the underlying matching problem and we calculate the router rate for different N. We analyze the improvement due to multiplexing, and analyze the secret key rate with explicit results for the tripartite network. Investigating strategic qubit selection for the GHZ measurements, we show that using cutoffs to remove qubits after a certain number of rounds and consistently combining qubits with the lowest number of storage rounds leads to an optimal secret key rate.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Bound entangled Bell diagonal states of unequal local dimensions, and their witnesses
Authors:
Johannes Moerland,
Nikolai Wyderka,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Bell diagonal states constitute a well-studied family of bipartite quantum states that arise naturally in various contexts in quantum information. In this paper we generalize the notion of Bell diagonal states to the case of unequal local dimensions and investigate their entanglement properties. We extend the family of entanglement criteria of Sarbicki et al. to non-Hermitian operator bases to con…
▽ More
Bell diagonal states constitute a well-studied family of bipartite quantum states that arise naturally in various contexts in quantum information. In this paper we generalize the notion of Bell diagonal states to the case of unequal local dimensions and investigate their entanglement properties. We extend the family of entanglement criteria of Sarbicki et al. to non-Hermitian operator bases to construct entanglement witnesses for the class of generalized Bell diagonal states. We then show how to optimize the witnesses with respect to noise robustness. Finally, we use these witnesses to construct bound entangled states that are not detected by the usual computable cross norm or realignment and de Vicente criteria.
△ Less
Submitted 8 January, 2024; v1 submitted 21 August, 2023;
originally announced August 2023.
-
Steering witnesses for unknown Gaussian quantum states
Authors:
Tatiana Mihaescu,
Hermann Kampermann,
Aurelian Isar,
Dagmar Bruß
Abstract:
We define and fully characterize the witnesses based on second moments detecting steering in Gaussian states by means of Gaussian measurements. All such tests, which arise from linear combination of variances or second moments of canonical operators, are easily implemented in experiments. We propose also a set of linear constraints fully characterizing steering witnesses when the steered party has…
▽ More
We define and fully characterize the witnesses based on second moments detecting steering in Gaussian states by means of Gaussian measurements. All such tests, which arise from linear combination of variances or second moments of canonical operators, are easily implemented in experiments. We propose also a set of linear constraints fully characterizing steering witnesses when the steered party has one bosonic mode, while in the general case the constraints restrict the set of tests detecting steering. Given an unknown quantum state we implement a semidefinite program providing the appropriate steering test with respect to the number of random measurements performed. Thus, it is a "repeat-until-success" method allowing for steering detection with less measurements than in full tomography. We study the efficiency of steering detection for two-mode squeezed vacuum states, for two-mode general unknown states, and for three-mode continuous variable GHZ states. In addition, we discuss the robustness of this method to statistical errors.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Distributed quantum incompatibility
Authors:
Lucas Tendick,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Incompatible, i.e. non-jointly measurable quantum measurements are a necessary resource for many information processing tasks. It is known that increasing the number of distinct measurements usually enhances the incompatibility of a measurement scheme. However, it is generally unclear how large this enhancement is and on what it depends. Here, we show that the incompatibility which is gained via a…
▽ More
Incompatible, i.e. non-jointly measurable quantum measurements are a necessary resource for many information processing tasks. It is known that increasing the number of distinct measurements usually enhances the incompatibility of a measurement scheme. However, it is generally unclear how large this enhancement is and on what it depends. Here, we show that the incompatibility which is gained via additional measurements is upper and lower bounded by certain functions of the incompatibility of subsets of the available measurements. We prove the tightness of some of our bounds by providing explicit examples based on mutually unbiased bases. Finally, we discuss the consequences of our results for the nonlocality that can be gained by enlarging the number of measurements in a Bell experiment.
△ Less
Submitted 27 September, 2023; v1 submitted 20 January, 2023;
originally announced January 2023.
-
Quantum Speed Limit for Change of Basis
Authors:
Moein Naseri,
Chiara Macchiavello,
Dagmar Bruß,
Paweł Horodecki,
Alexander Streltsov
Abstract:
Quantum speed limits provide ultimate bounds on the time required to transform one quantum state into another. Here, we extend the notion of quantum speed limits to collections of quantum states, investigating the time for converting a basis of states into an unbiased one. We provide tight bounds for systems of dimension smaller than 5, and general bounds for multi-qubit systems and Hilbert space…
▽ More
Quantum speed limits provide ultimate bounds on the time required to transform one quantum state into another. Here, we extend the notion of quantum speed limits to collections of quantum states, investigating the time for converting a basis of states into an unbiased one. We provide tight bounds for systems of dimension smaller than 5, and general bounds for multi-qubit systems and Hilbert space dimension $d$. For two-qubit systems, we show that the fastest transformation implements two Hadamards and a swap of the qubits simultaneously. We further prove that for qutrit systems the evolution time depends on the particular type of the unbiased basis. We also investigate speed limits for coherence generation, providing the minimal time to establish a certain amount of coherence with a unitary evolution.
△ Less
Submitted 23 December, 2022;
originally announced December 2022.
-
Upper bound on the Guessing probability using Machine Learning
Authors:
Sarnava Datta,
Hermann Kampermann,
Dagmar Bruß
Abstract:
The estimation of the guessing probability has paramount importance in quantum cryptographic processes. It can also be used as a witness for nonlocal correlations. In most of the studied scenarios, estimating the guessing probability amounts to solving a semi-definite programme, for which potent algorithms exist. However, the size of those programs grows exponentially with the system size, becomin…
▽ More
The estimation of the guessing probability has paramount importance in quantum cryptographic processes. It can also be used as a witness for nonlocal correlations. In most of the studied scenarios, estimating the guessing probability amounts to solving a semi-definite programme, for which potent algorithms exist. However, the size of those programs grows exponentially with the system size, becoming infeasible even for small numbers of inputs and outputs. We have implemented deep learning approaches for some relevant Bell scenarios to confront this problem. Our results show the capabilities of machine learning for estimating the guessing probability and for understanding nonlocality.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
Continuity of robustness measures in quantum resource theories
Authors:
Jonathan Schluck,
Gláucia Murta,
Hermann Kampermann,
Dagmar Bruß,
Nikolai Wyderka
Abstract:
Robustness measures are increasingly prominent resource quantifiers that have been introduced for quantum resource theories such as entanglement and coherence. Despite the generality of these measures, their usefulness is hindered by the fact that some of their mathematical properties remain unclear, especially when the set of resource-free states is non-convex. In this paper, we investigate conti…
▽ More
Robustness measures are increasingly prominent resource quantifiers that have been introduced for quantum resource theories such as entanglement and coherence. Despite the generality of these measures, their usefulness is hindered by the fact that some of their mathematical properties remain unclear, especially when the set of resource-free states is non-convex. In this paper, we investigate continuity properties of different robustness functions. We show that their continuity depends on the shape of the set of free states. In particular, we demonstrate that in many cases, star-convexity is sufficient for Lipschitz-continuity of the robustness, and we provide specific examples of sets leading to non-continuous measures. Finally, we illustrate the applicability of our results by defining a robustness of teleportability and of quantum discord.
△ Less
Submitted 1 June, 2023; v1 submitted 13 December, 2022;
originally announced December 2022.
-
Construction of efficient Schmidt number witnesses for high-dimensional quantum states
Authors:
Nikolai Wyderka,
Giovanni Chesi,
Hermann Kampermann,
Chiara Macchiavello,
Dagmar Bruß
Abstract:
Recent progress in quantum optics has led to setups that are able to prepare high-dimensional quantum states for quantum information processing tasks. As such, it is of importance to benchmark the states generated by these setups in terms of their quantum mechanical properties, such as their Schmidt numbers, i.e., the number of entangled degrees of freedom. In this paper, we develop an iterative a…
▽ More
Recent progress in quantum optics has led to setups that are able to prepare high-dimensional quantum states for quantum information processing tasks. As such, it is of importance to benchmark the states generated by these setups in terms of their quantum mechanical properties, such as their Schmidt numbers, i.e., the number of entangled degrees of freedom. In this paper, we develop an iterative algorithm that finds Schmidt number witnesses tailored to the measurements available in specific experimental setups. We then apply the algorithm to find a witness that requires the measurement of a number of density matrix elements that scales linearly with the local dimension of the system. As a concrete example, we apply our construction method to an implementation with photonic temporal modes.
△ Less
Submitted 28 February, 2023; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Boosting device-independent cryptography with tripartite nonlocality
Authors:
Federico Grasselli,
Gláucia Murta,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Device-independent (DI) protocols, such as DI conference key agreement (DICKA) and DI randomness expansion (DIRE), certify private randomness by observing nonlocal correlations when two or more parties test a Bell inequality. While most DI protocols are restricted to bipartite Bell tests, harnessing multipartite nonlocal correlations may lead to better performance. Here, we consider tripartite DIC…
▽ More
Device-independent (DI) protocols, such as DI conference key agreement (DICKA) and DI randomness expansion (DIRE), certify private randomness by observing nonlocal correlations when two or more parties test a Bell inequality. While most DI protocols are restricted to bipartite Bell tests, harnessing multipartite nonlocal correlations may lead to better performance. Here, we consider tripartite DICKA and DIRE protocols based on testing multipartite Bell inequalities, specifically: the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality, and the Holz and the Parity-CHSH inequalities introduced in the context of DICKA protocols. We evaluate the asymptotic performance of the DICKA (DIRE) protocols in terms of their conference key rate (net randomness generation rate), by deriving lower bounds on the conditional von Neumann entropy of one party's outcome and two parties' outcomes. For the Holz inequality, we prove a tight analytical lower bound on the one-outcome entropy and conjecture a tight lower bound on the two-outcome entropy. We additionally re-derive the analytical one-outcome entropy bound for the MABK inequality with a much simpler method and obtain a numerical lower bound on the two-outcome entropy for the Parity-CHSH inequality. Our simulations show that DICKA and DIRE protocols employing tripartite Bell inequalities can significantly outperform their bipartite counterparts. Moreover, we establish that genuine multipartite entanglement is not a precondition for multipartite DIRE while its necessity for DICKA remains an open question.
△ Less
Submitted 12 April, 2023; v1 submitted 26 September, 2022;
originally announced September 2022.
-
Learning logical Pauli noise in quantum error correction
Authors:
Thomas Wagner,
Hermann Kampermann,
Dagmar Bruß,
Martin Kliesch
Abstract:
The characterization of quantum devices is crucial for their practical implementation but can be costly in experimental effort and classical postprocessing. Therefore, it is desirable to measure only the information that is relevant for specific applications and develop protocols that require little additional effort. In this work, we focus on the characterization of quantum computers in the conte…
▽ More
The characterization of quantum devices is crucial for their practical implementation but can be costly in experimental effort and classical postprocessing. Therefore, it is desirable to measure only the information that is relevant for specific applications and develop protocols that require little additional effort. In this work, we focus on the characterization of quantum computers in the context of stabilizer quantum error correction. For arbitrary stabilizer codes, subsystem codes, and data syndrome codes, we prove that the logical error channel induced by Pauli noise can be estimated from syndrome data under minimal conditions. More precisely, for any such code, we show that the estimation is possible as long as the code can correct the noise.
△ Less
Submitted 25 May, 2023; v1 submitted 19 September, 2022;
originally announced September 2022.
-
Quantum Grid States and Hybrid Graphs
Authors:
Biswash Ghimire,
Thomas Wagner,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Using the signed laplacian matrix, and weighted and hybrid graphs, we present additional ways to interpret graphs as grid states. Hybrid graphs offer the most general interpretation. Existing graphical methods that characterize entanglement properties of grid states are adapted to these interpretations. These additional classes of grid states are shown to exhibit rich entanglement properties, incl…
▽ More
Using the signed laplacian matrix, and weighted and hybrid graphs, we present additional ways to interpret graphs as grid states. Hybrid graphs offer the most general interpretation. Existing graphical methods that characterize entanglement properties of grid states are adapted to these interpretations. These additional classes of grid states are shown to exhibit rich entanglement properties, including bound entanglement. Further, we introduce graphical techniques to construct bound entangled states in a modular fashion. We also extend the grid states model to hypergraphs. Our work, on one hand, opens up possibilities for constructing additional families of mixed quantum states in the grid state model. On the other hand, it can serve as an instrument for investigating entanglement problems from a graph theory perspective.
△ Less
Submitted 20 July, 2022;
originally announced July 2022.
-
Shor-Laflamme distributions of graph states and noise robustness of entanglement
Authors:
Daniel Miller,
Daniel Loss,
Ivano Tavernelli,
Hermann Kampermann,
Dagmar Bruß,
Nikolai Wyderka
Abstract:
The Shor-Laflamme distribution (SLD) of a quantum state is a collection of local unitary invariants that quantify $k$-body correlations. We show that the SLD of graph states can be derived by solving a graph-theoretical problem. In this way, the mean and variance of the SLD are obtained as simple functions of efficiently computable graph properties. Furthermore, this formulation enables us to deri…
▽ More
The Shor-Laflamme distribution (SLD) of a quantum state is a collection of local unitary invariants that quantify $k$-body correlations. We show that the SLD of graph states can be derived by solving a graph-theoretical problem. In this way, the mean and variance of the SLD are obtained as simple functions of efficiently computable graph properties. Furthermore, this formulation enables us to derive closed expressions of SLDs for some graph state families. For cluster states, we observe that the SLD is very similar to a binomial distribution, and we argue that this property is typical for graph states in general. Finally, we derive an SLD-based entanglement criterion from the purity criterion and apply it to derive meaningful noise thresholds for entanglement. Our new entanglement criterion is easy to use and also applies to the case of higher-dimensional qudits. In the bigger picture, our results foster the understanding both of quantum error-correcting codes, where a closely related notion of Shor-Laflamme distributions plays an important role, and of the geometry of quantum states, where Shor-Laflamme distributions are known as sector length distributions.
△ Less
Submitted 24 July, 2023; v1 submitted 15 July, 2022;
originally announced July 2022.
-
Distance-based resource quantification for sets of quantum measurements
Authors:
Lucas Tendick,
Martin Kliesch,
Hermann Kampermann,
Dagmar Bruß
Abstract:
The advantage that quantum systems provide for certain quantum information processing tasks over their classical counterparts can be quantified within the general framework of resource theories. Certain distance functions between quantum states have successfully been used to quantify resources like entanglement and coherence. Perhaps surprisingly, such a distance-based approach has not been adopte…
▽ More
The advantage that quantum systems provide for certain quantum information processing tasks over their classical counterparts can be quantified within the general framework of resource theories. Certain distance functions between quantum states have successfully been used to quantify resources like entanglement and coherence. Perhaps surprisingly, such a distance-based approach has not been adopted to study resources of quantum measurements, where other geometric quantifiers are used instead. Here, we define distance functions between sets of quantum measurements and show that they naturally induce resource monotones for convex resource theories of measurements. By focusing on a distance based on the diamond norm, we establish a hierarchy of measurement resources and derive analytical bounds on the incompatibility of any set of measurements. We show that these bounds are tight for certain projective measurements based on mutually unbiased bases and identify scenarios where different measurement resources attain the same value when quantified by our resource monotone. Our results provide a general framework to compare distance-based resources for sets of measurements and allow us to obtain limitations on Bell-type experiments.
△ Less
Submitted 2 May, 2023; v1 submitted 17 May, 2022;
originally announced May 2022.
-
Secure Anonymous Conferencing in Quantum Networks
Authors:
Federico Grasselli,
Gláucia Murta,
Jarn de Jong,
Frederik Hahn,
Dagmar Bruß,
Hermann Kampermann,
Anna Pappa
Abstract:
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement --making their identities publicly known. In certain circumstances, however, communicating users demand anonymity. Here, we introduce a security framework for anonymous conference key agreement with different levels of anonymity, which is inspired by the epsilon-security of quantum key distribution.…
▽ More
Users of quantum networks can securely communicate via so-called (quantum) conference key agreement --making their identities publicly known. In certain circumstances, however, communicating users demand anonymity. Here, we introduce a security framework for anonymous conference key agreement with different levels of anonymity, which is inspired by the epsilon-security of quantum key distribution. We present efficient and noise-tolerant protocols exploiting multipartite Greenberger-Horne-Zeilinger (GHZ) states and prove their security in the finite-key regime. We analyze the performance of our protocols in noisy and lossy quantum networks and compare with protocols that only use bipartite entanglement to achieve the same functionalities. Our simulations show that GHZ-based protocols can outperform protocols based on bipartite entanglement and that the advantage increases for protocols with stronger anonymity requirements. Our results strongly advocate the use of multipartite entanglement for cryptographic tasks involving several users.
△ Less
Submitted 26 July, 2022; v1 submitted 9 November, 2021;
originally announced November 2021.
-
Device-independent secret key rates via a post-selected Bell inequality
Authors:
Sarnava Datta,
Hermann Kampermann,
Dagmar Bruß
Abstract:
In device-independent quantum key distribution (DIQKD) the security is not based on any assumptions about the intrinsic properties of the devices and the quantum signals, but on the violation of a Bell inequality. We introduce a DIQKD scenario in which an optimal Bell inequality is constructed from the performed measurement data, rather than fixing beforehand a specific Bell inequality. Our method…
▽ More
In device-independent quantum key distribution (DIQKD) the security is not based on any assumptions about the intrinsic properties of the devices and the quantum signals, but on the violation of a Bell inequality. We introduce a DIQKD scenario in which an optimal Bell inequality is constructed from the performed measurement data, rather than fixing beforehand a specific Bell inequality. Our method can be employed in a general way, for any number of measurement settings and any number of outcomes. We provide an implementable DIQKD protocol and perform finite-size security key analysis for collective attacks. We compare our approach with related procedures in the literature and analyze the robustness of our protocol. We also study the performance of our method in several Bell scenarios as well as for random measurement settings.
△ Less
Submitted 8 November, 2021;
originally announced November 2021.
-
Pauli channels can be estimated from syndrome measurements in quantum error correction
Authors:
Thomas Wagner,
Hermann Kampermann,
Dagmar Bruß,
Martin Kliesch
Abstract:
The performance of quantum error correction can be significantly improved if detailed information about the noise is available, allowing to optimize both codes and decoders. It has been proposed to estimate error rates from the syndrome measurements done anyway during quantum error correction. While these measurements preserve the encoded quantum state, it is currently not clear how much informati…
▽ More
The performance of quantum error correction can be significantly improved if detailed information about the noise is available, allowing to optimize both codes and decoders. It has been proposed to estimate error rates from the syndrome measurements done anyway during quantum error correction. While these measurements preserve the encoded quantum state, it is currently not clear how much information about the noise can be extracted in this way. So far, apart from the limit of vanishing error rates, rigorous results have only been established for some specific codes. In this work, we rigorously resolve the question for arbitrary stabilizer codes. The main result is that a stabilizer code can be used to estimate Pauli channels with correlations across a number of qubits given by the pure distance. This result does not rely on the limit of vanishing error rates, and applies even if high weight errors occur frequently. Moreover, it also allows for measurement errors within the framework of quantum data-syndrome codes. Our proof combines Boolean Fourier analysis, combinatorics and elementary algebraic geometry. It is our hope that this work opens up interesting applications, such as the online adaptation of a decoder to time-varying noise.
△ Less
Submitted 14 September, 2022; v1 submitted 29 July, 2021;
originally announced July 2021.
-
Hierarchy of continuous-variable quantum resource theories
Authors:
Giulio Gianfelici,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Connections between the resource theories of coherence and purity (or non-uniformity) are well known for discrete-variable, finite-dimensional, quantum systems. We establish analogous results for continuous-variable systems, in particular Gaussian systems. To this end, we define the concept of maximal coherence at fixed energy, which is achievable with energy-preserving unitaries. We show that the…
▽ More
Connections between the resource theories of coherence and purity (or non-uniformity) are well known for discrete-variable, finite-dimensional, quantum systems. We establish analogous results for continuous-variable systems, in particular Gaussian systems. To this end, we define the concept of maximal coherence at fixed energy, which is achievable with energy-preserving unitaries. We show that the maximal Gaussian coherence (where states and operations are required to be Gaussian) can be quantified analytically by the relative entropy. We then propose a resource theory of non-uniformity, by considering the purity of a quantum state at fixed energy as resource, and by defining non-uniformity monotones. In the Gaussian case, we prove the equality of Gaussian non-uniformity and maximal Gaussian coherence. Finally, we show a hierarchy for non-uniformity, coherence, discord and entanglement in continuous-variable systems.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Quantifying necessary quantum resources for nonlocality
Authors:
Lucas Tendick,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Nonlocality is one of the most important resources for quantum information protocols. The observation of nonlocal correlations in a Bell experiment is the result of appropriately chosen measurements and quantum states. We quantify the minimal purity to achieve a certain Bell value for any Bell operator. Since purity is the most fundamental resource of a quantum state, this enables us also to quant…
▽ More
Nonlocality is one of the most important resources for quantum information protocols. The observation of nonlocal correlations in a Bell experiment is the result of appropriately chosen measurements and quantum states. We quantify the minimal purity to achieve a certain Bell value for any Bell operator. Since purity is the most fundamental resource of a quantum state, this enables us also to quantify the necessary coherence, discord, and entanglement for a given violation of two-qubit correlation inequalities. Our results shine new light on the CHSH inequality by showing that for a fixed Bell violation an increase in the measurement resources does not always lead to a decrease of the minimal state resources.
△ Less
Submitted 17 February, 2021;
originally announced February 2021.
-
Optimal noise estimation from syndrome statistics of quantum codes
Authors:
Thomas Wagner,
Hermann Kampermann,
Dagmar Bruß,
Martin Kliesch
Abstract:
Quantum error correction allows to actively correct errors occurring in a quantum computation when the noise is weak enough. To make this error correction competitive information about the specific noise is required. Traditionally, this information is obtained by benchmarking the device before operation. We address the question of what can be learned from only the measurements done during decoding…
▽ More
Quantum error correction allows to actively correct errors occurring in a quantum computation when the noise is weak enough. To make this error correction competitive information about the specific noise is required. Traditionally, this information is obtained by benchmarking the device before operation. We address the question of what can be learned from only the measurements done during decoding. Such estimation of noise models was proposed for surface codes, exploiting their special structure, and in the limit of low error rates also for other codes. However, so far it has been unclear under what general conditions noise models can be estimated from the syndrome measurements. In this work, we derive a general condition for identifiability of the error rates. For general stabilizer codes, we prove identifiability under the assumption that the rates are small enough. Without this assumption we prove a result for perfect codes. Finally, we propose a practical estimation method with linear runtime for concatenated codes. We demonstrate that it outperforms other recently proposed methods and that the estimation is optimal in the sense that it reaches the Cramér-Rao Bound. Our method paves the way for practical calibration of error corrected quantum devices during operation.
△ Less
Submitted 7 October, 2020; v1 submitted 5 October, 2020;
originally announced October 2020.
-
Genuine multipartite entanglement is not a precondition for secure conference key agreement
Authors:
Giacomo Carrara,
Hermann Kampermann,
Dagmar Bruß,
Gláucia Murta
Abstract:
Entanglement plays a crucial role in the security of quantum key distribution. A secret key can only be obtained by two parties if there exists a corresponding entanglement-based description of the protocol in which entanglement is witnessed, as shown by Curty et al (2004). Here we investigate the role of entanglement for the generalization of quantum key distribution to the multipartite scenario,…
▽ More
Entanglement plays a crucial role in the security of quantum key distribution. A secret key can only be obtained by two parties if there exists a corresponding entanglement-based description of the protocol in which entanglement is witnessed, as shown by Curty et al (2004). Here we investigate the role of entanglement for the generalization of quantum key distribution to the multipartite scenario, namely conference key agreement. In particular, we ask whether the strongest form of multipartite entanglement, namely genuine multipartite entanglement, is necessary to establish a conference key. We show that, surprisingly, a non-zero conference key can be obtained even if the parties share biseparable states in each round of the protocol. Moreover we relate conference key agreement with entanglement witnesses and show that a non-zero conference key can be interpreted as a non-linear entanglement witness that detects a class of states which cannot be detected by usual linear entanglement witnesses.
△ Less
Submitted 16 November, 2020; v1 submitted 22 July, 2020;
originally announced July 2020.
-
Detecting entanglement of unknown continuous variable states with random measurements
Authors:
Tatiana Mihaescu,
Hermann Kampermann,
Giulio Gianfelici,
Aurelian Isar,
Dagmar Bruss
Abstract:
We explore the possibility of entanglement detection in continuous variable systems by entanglement witnesses based on covariance matrices, constructible from random homodyne measurements. We propose new linear constraints characterizing the entanglement witnesses based on second moments, and use them in a semidefinite program providing the optimal entanglement test for given random measurements.…
▽ More
We explore the possibility of entanglement detection in continuous variable systems by entanglement witnesses based on covariance matrices, constructible from random homodyne measurements. We propose new linear constraints characterizing the entanglement witnesses based on second moments, and use them in a semidefinite program providing the optimal entanglement test for given random measurements. We test the method on the class of squeezed vacuum states and study the efficiency of entanglement detection in general unknown covariance matrices.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
Quantum repeaters in space
Authors:
Carlo Liorni,
Hermann Kampermann,
Dagmar Bruss
Abstract:
Long-distance entanglement is a very precious resource, but its distribution is very difficult due to the exponential losses of light in optical fibres. A possible solution consists in the use of quantum repeaters, based on entanglement swapping or quantum error correction. Alternatively, satellite-based free-space optical links can be exploited, achieving better loss-distance scaling. We propose…
▽ More
Long-distance entanglement is a very precious resource, but its distribution is very difficult due to the exponential losses of light in optical fibres. A possible solution consists in the use of quantum repeaters, based on entanglement swapping or quantum error correction. Alternatively, satellite-based free-space optical links can be exploited, achieving better loss-distance scaling. We propose to combine these two ingredients, quantum repeaters and satellite-based links, into a scheme that allows to achieve entanglement distribution over global distances with a small number of intermediate untrusted nodes. The entanglement sources, placed on satellites, send quantum states encoded in photons towards orbiting quantum repeater stations, where entanglement swapping is performed. The performance of this repeater chain is assessed in terms of the secret key rate achievable by the BB-84 cryptographic protocol. We perform a comparison with other repeater chain architectures and show that our scheme is superior in almost every situation, achieving higher key rates, reliability and flexibility. Finally, we analyse the feasibility of the implementation in the mid-term future and discuss exemplary orbital configurations. The integration of satellite-based links with ground repeater networks can be envisaged to represent the backbone of the future Quantum Internet.
△ Less
Submitted 20 May, 2020;
originally announced May 2020.
-
Entropy bounds for multiparty device-independent cryptography
Authors:
Federico Grasselli,
Gláucia Murta,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Multiparty quantum cryptography based on distributed entanglement will find its natural application in the upcoming quantum networks. The security of many multipartite device-independent (DI) protocols, such as DI conference key agreement, relies on bounding the von Neumann entropy of the parties' outcomes conditioned on the eavesdropper's information, given the violation of a multipartite Bell in…
▽ More
Multiparty quantum cryptography based on distributed entanglement will find its natural application in the upcoming quantum networks. The security of many multipartite device-independent (DI) protocols, such as DI conference key agreement, relies on bounding the von Neumann entropy of the parties' outcomes conditioned on the eavesdropper's information, given the violation of a multipartite Bell inequality. We consider three parties testing the Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality and certify the privacy of their outcomes by bounding the conditional entropy of a single party's outcome and the joint conditional entropy of two parties' outcomes. From the former bound, we show that genuine multipartite entanglement is necessary to certify the privacy of a party's outcome, while the latter significantly improve previous results. We obtain the entropy bounds thanks to two general results of independent interest. The first one drastically simplifies the quantum setup of an $N$-partite Bell scenario. The second one provides an upper bound on the violation of the MABK inequality by an arbitrary $N$-qubit state, as a function of the state's parameters.
△ Less
Submitted 18 December, 2020; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Quantum Conference Key Agreement: A Review
Authors:
Gláucia Murta,
Federico Grasselli,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Conference key agreement (CKA), or multipartite key distribution, is a cryptographic task where more than two parties wish to establish a common secret key. A composition of bipartite quantum key distribution protocols can accomplish this task. However, the existence of multipartite quantum correlations allows for new and potentially more efficient protocols, to be applied in future quantum networ…
▽ More
Conference key agreement (CKA), or multipartite key distribution, is a cryptographic task where more than two parties wish to establish a common secret key. A composition of bipartite quantum key distribution protocols can accomplish this task. However, the existence of multipartite quantum correlations allows for new and potentially more efficient protocols, to be applied in future quantum networks. Here, we review the existing quantum CKA protocols based on multipartite entanglement, both in the device-dependent and the device-independent scenario.
△ Less
Submitted 5 October, 2020; v1 submitted 23 March, 2020;
originally announced March 2020.
-
Theoretical framework for physical unclonable functions, including quantum readout
Authors:
Giulio Gianfelici,
Hermann Kampermann,
Dagmar Bruß
Abstract:
We propose a theoretical framework to quantitatively describe Physical Unclonable Functions (PUFs), including extensions to quantum protocols, so-called Quantum Readout PUFs (QR-PUFs). (QR-) PUFs are physical systems with challenge-response behavior intended to be hard to clone or simulate. Their use has been proposed in several cryptographic protocols, with particular emphasis on authentication.…
▽ More
We propose a theoretical framework to quantitatively describe Physical Unclonable Functions (PUFs), including extensions to quantum protocols, so-called Quantum Readout PUFs (QR-PUFs). (QR-) PUFs are physical systems with challenge-response behavior intended to be hard to clone or simulate. Their use has been proposed in several cryptographic protocols, with particular emphasis on authentication. Here, we provide theoretical assumptions and definitions behind the intuitive ideas of (QR-) PUFs. This allows to quantitatively characterize the security of such devices in cryptographic protocols. First, by generalizing previous ideas, we design a general authentication scheme, which is applicable to different physical implementations of both classical PUFs and (QR-) PUFs. Then, we define the robustness and the unclonability, which allows us to derive security thresholds for (QR-) PUF authentication and paves the way to develop further new authentication protocols.
△ Less
Submitted 7 May, 2020; v1 submitted 12 November, 2019;
originally announced November 2019.
-
A Genuine Multipartite Bell Inequality for Device-independent Conference Key Agreement
Authors:
Timo Holz,
Hermann Kampermann,
Dagmar Bruß
Abstract:
In this work, we present a new class of genuine multipartite Bell inequalities, that is particularly designed for multipartite device-independent (DI) quantum key distribution (QKD), also called DI conference key agreement. We prove the classical bounds of this inequality, discuss how to maximally violate it and show its usefulness by calculating achievable conference key rates via the violation o…
▽ More
In this work, we present a new class of genuine multipartite Bell inequalities, that is particularly designed for multipartite device-independent (DI) quantum key distribution (QKD), also called DI conference key agreement. We prove the classical bounds of this inequality, discuss how to maximally violate it and show its usefulness by calculating achievable conference key rates via the violation of this Bell inequality. To this end, semidefinite programming techniques based on [Nat. Commun. 2, 238 (2011)] are employed and extended to the multipartite scenario. Our Bell inequality represents a nontrivial multipartite generalization of the Clauser-Horne-Shimony-Holt inequality and is motivated by the extension of the bipartite Bell state to the n-partite Greenberger-Horne-Zeilinger state. For DIQKD, we suggest an honest implementation for any number of parties and study the effect of noise on achievable asymptotic conference key rates.
△ Less
Submitted 24 October, 2019;
originally announced October 2019.
-
Symmetries for a High Level Neural Decoder on the Toric Code
Authors:
Thomas Wagner,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Surface codes are a promising method of quantum error correction and the basis of many proposed quantum computation implementations. However, their efficient decoding is still not fully explored. Recently, approaches based on machine learning techniques have been proposed by Torlai and Melko as well as Varsamopoulos et al. In these approaches, a so called high level decoder is used to post-correct…
▽ More
Surface codes are a promising method of quantum error correction and the basis of many proposed quantum computation implementations. However, their efficient decoding is still not fully explored. Recently, approaches based on machine learning techniques have been proposed by Torlai and Melko as well as Varsamopoulos et al. In these approaches, a so called high level decoder is used to post-correct an underlying decoder by correcting logical errors. A significant problem is that these methods require large amounts of training data even for relatively small code distances. The above-mentioned methods were tested on the rotated surface code which encodes one logical qubit. Here, we show that they are viable even for the toric surface code which encodes two logical qubits. Furthermore, we explain how symmetries of the toric code can be exploited to reduce the amount of training data that is required to obtain good decoding results. Finally, we compare different underlying decoders and show that the accuracy of high level decoding noticeably depends on the quality of the underlying decoder in the realistic case of imperfect training.
△ Less
Submitted 27 October, 2020; v1 submitted 3 October, 2019;
originally announced October 2019.
-
Conference key agreement with single-photon interference
Authors:
Federico Grasselli,
Hermann Kampermann,
Dagmar Bruß
Abstract:
The intense research activity on Twin-Field (TF) quantum key distribution (QKD) is motivated by the fact that two users can establish a secret key by relying on single-photon interference in an untrusted node. Thanks to this feature, variants of the protocol have been proven to beat the point-to-point private capacity of a lossy quantum channel. Here we generalize the main idea of the TF-QKD proto…
▽ More
The intense research activity on Twin-Field (TF) quantum key distribution (QKD) is motivated by the fact that two users can establish a secret key by relying on single-photon interference in an untrusted node. Thanks to this feature, variants of the protocol have been proven to beat the point-to-point private capacity of a lossy quantum channel. Here we generalize the main idea of the TF-QKD protocol introduced by Curty et al. to the multipartite scenario, by devising a conference key agreement (CKA) where the users simultaneously distill a secret conference key through single-photon interference. The new CKA is better suited to high-loss scenarios than previous multipartite QKD schemes and it employs for the first time a W-class state as its entanglement resource. We prove the protocol's security in the finite-key regime and under general attacks. We also compare its performance with the iterative use of bipartite QKD protocols and show that our truly multipartite scheme can be advantageous, depending on the loss and on the state preparation.
△ Less
Submitted 14 August, 2019; v1 submitted 24 July, 2019;
originally announced July 2019.
-
Quantifying coherence with respect to general quantum measurements
Authors:
Felix Bischof,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Coherence is a cornerstone of quantum theory and a prerequisite for the advantage of quantum technologies. In recent work, the notion of coherence with respect to a general quantum measurement (POVM) was introduced and embedded into a resource-theoretic framework that generalizes the standard resource theory of coherence. In particular, POVM-incoherent (free) states and operations were established…
▽ More
Coherence is a cornerstone of quantum theory and a prerequisite for the advantage of quantum technologies. In recent work, the notion of coherence with respect to a general quantum measurement (POVM) was introduced and embedded into a resource-theoretic framework that generalizes the standard resource theory of coherence. In particular, POVM-incoherent (free) states and operations were established. In this work, we explore features of this framework which arise due to the rich structure of POVMs compared to projective measurements. Moreover, we introduce a rigorous, probabilisitic framework for POVM-based coherence measures and free operations. This leads to the introduction of new, strongly monotonic resource measures that neatly generalize well-known standard coherence measures. Finally, we show that the relative entropy of POVM-coherence is equal to the cryptographic randomness gain, providing an important operational meaning to the concept of coherence with respect to a general measurement.
△ Less
Submitted 19 July, 2019;
originally announced July 2019.
-
Satellite-based links for Quantum Key Distribution: beam effects and weather dependence
Authors:
Carlo Liorni,
Hermann Kampermann,
Dagmar Bruß
Abstract:
The establishment of a world-wide quantum communication network relies on the synergistic integration of satellite-based links and fiber-based networks. The first are helpful for long-distance communication, as the photon losses introduced by the optical fibers are too detrimental for lengths greater than about 200 km. This work aims at giving, on the one hand, a comprehensive and fundamental mode…
▽ More
The establishment of a world-wide quantum communication network relies on the synergistic integration of satellite-based links and fiber-based networks. The first are helpful for long-distance communication, as the photon losses introduced by the optical fibers are too detrimental for lengths greater than about 200 km. This work aims at giving, on the one hand, a comprehensive and fundamental model for the losses suffered by the quantum signals during the propagation along an atmospheric free-space link. On the other hand, a performance analysis of different Quantum Key Distribution (QKD) implementations is performed, including finite-key effects, focusing on different interesting practical scenarios. The specific approach that we chose allows to precisely model the contribution due to different weather conditions, paving the way towards more accurate feasibility studies of satellite-based QKD missions.
△ Less
Submitted 21 June, 2019; v1 submitted 19 June, 2019;
originally announced June 2019.
-
Parameter regimes for surpassing the PLOB bound with error-corrected qudit repeaters
Authors:
Daniel Miller,
Timo Holz,
Hermann Kampermann,
Dagmar Bruß
Abstract:
A potential quantum internet would open up the possibility of realizing numerous new applications, including provably secure communication. Since losses of photons limit long-distance, direct quantum communication and widespread quantum networks, quantum repeaters are needed. The so-called PLOB-repeaterless bound [Pirandola et al., Nat. Commun. 8, 15043 (2017)] is a fundamental limit on the quantu…
▽ More
A potential quantum internet would open up the possibility of realizing numerous new applications, including provably secure communication. Since losses of photons limit long-distance, direct quantum communication and widespread quantum networks, quantum repeaters are needed. The so-called PLOB-repeaterless bound [Pirandola et al., Nat. Commun. 8, 15043 (2017)] is a fundamental limit on the quantum capacity of direct quantum communication. Here, we analytically derive the quantum-repeater gain for error-corrected, one-way quantum repeaters based on higher-dimensional qudits for two different physical encodings: Fock and multimode qudits. We identify parameter regimes in which such quantum repeaters can surpass the PLOB-repeaterless bound and systematically analyze how typical parameters manifest themselves in the quantum-repeater gain. This benchmarking provides a guideline for the implementation of error-corrected qudit repeaters.
△ Less
Submitted 11 December, 2019; v1 submitted 12 June, 2019;
originally announced June 2019.
-
Comment on "Fully device-independent conference key agreement" [Phys. Rev. A 97, 022307 (2018)]
Authors:
Timo Holz,
Daniel Miller,
Hermann Kampermann,
Dagmar Bruß
Abstract:
In this manuscript we discuss the device-independent conference key agreement (DICKA) protocol [Phys. Rev. A 97, 022307 (2018)]. We show that the suggested honest implementation fails, because perfect correlated measurement results and the required Bell-inequality violation cannot be achieved simultaneously, in contradiction to what is claimed. We further show via semidefinite programming that the…
▽ More
In this manuscript we discuss the device-independent conference key agreement (DICKA) protocol [Phys. Rev. A 97, 022307 (2018)]. We show that the suggested honest implementation fails, because perfect correlated measurement results and the required Bell-inequality violation cannot be achieved simultaneously, in contradiction to what is claimed. We further show via semidefinite programming that there cannot exist any suitable honest implementation in the tripartite setting, rendering the DICKA protocol incomplete.
△ Less
Submitted 4 June, 2019;
originally announced June 2019.
-
Activation of nonlocality in bound entanglement
Authors:
Lucas Tendick,
Hermann Kampermann,
Dagmar Bruß
Abstract:
We discuss the relation between entanglement and nonlocality in the hidden nonlocality scenario. Hidden nonlocality signifies nonlocality that can be activated by applying local filters to a particular state that admits a local hidden-variable model in the Bell scenario. We present a fully-biseparable three-qubit bound entangled state with a local model for the most general (non-sequential) measur…
▽ More
We discuss the relation between entanglement and nonlocality in the hidden nonlocality scenario. Hidden nonlocality signifies nonlocality that can be activated by applying local filters to a particular state that admits a local hidden-variable model in the Bell scenario. We present a fully-biseparable three-qubit bound entangled state with a local model for the most general (non-sequential) measurements. This proves for the first time that bound entangled states can admit a local model for general measurements. We furthermore show that the local model breaks down when suitable local filters are applied. Our results demonstrate the first example of activation of nonlocality in bound entanglement. Hence, we show that genuine hidden nonlocality does not imply entanglement distillability.
△ Less
Submitted 16 April, 2019;
originally announced April 2019.
-
Resource theory of coherence based on positive-operator-valued measures
Authors:
Felix Bischof,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Quantum coherence is a fundamental feature of quantum mechanics and an underlying requirement for most quantum information tasks. In the resource theory of coherence, incoherent states are diagonal with respect to a fixed orthonormal basis, i.e., they can be seen as arising from a von Neumann measurement. Here, we introduce and study a generalization to a resource theory of coherence defined with…
▽ More
Quantum coherence is a fundamental feature of quantum mechanics and an underlying requirement for most quantum information tasks. In the resource theory of coherence, incoherent states are diagonal with respect to a fixed orthonormal basis, i.e., they can be seen as arising from a von Neumann measurement. Here, we introduce and study a generalization to a resource theory of coherence defined with respect to the most general quantum measurement, i.e., to an arbitrary positive-operator-valued measure (POVM). We establish POVM-based coherence measures and POVM-incoherent operations which coincide for the case of von Neumann measurements with their counterparts in standard coherence theory. We provide a semidefinite program that allows to characterize interconversion properties of resource states, and exemplify our framework by means of the qubit trine POVM, for which we also show analytical results.
△ Less
Submitted 30 November, 2018;
originally announced December 2018.
-
Propagation of generalized Pauli errors in qudit Clifford circuits
Authors:
Daniel Miller,
Timo Holz,
Hermann Kampermann,
Dagmar Bruß
Abstract:
It is important for performance studies in quantum technologies to analyze quantum circuits in the presence of noise. We introduce an error probability tensor, a tool to track generalized Pauli error statistics of qudits within quantum circuits composed of qudit Clifford gates. Our framework is compatible with qudit stabilizer quantum error-correcting codes. We show how the error probability tenso…
▽ More
It is important for performance studies in quantum technologies to analyze quantum circuits in the presence of noise. We introduce an error probability tensor, a tool to track generalized Pauli error statistics of qudits within quantum circuits composed of qudit Clifford gates. Our framework is compatible with qudit stabilizer quantum error-correcting codes. We show how the error probability tensor can be applied in the most general case, and we demonstrate an error analysis of bipartite qudit repeaters with quantum error correction. We provide an exact analytical solution of the error statistics of the state distributed by such a repeater. For a fixed number of degrees of freedom, we observe that higher-dimensional qudits can outperform qubits in terms of distributed entanglement.
△ Less
Submitted 16 July, 2018;
originally announced July 2018.
-
Finite-key effects in multi-partite quantum key distribution protocols
Authors:
Federico Grasselli,
Hermann Kampermann,
Dagmar Bruß
Abstract:
We analyze the security of two multipartite quantum key distribution (QKD) protocols, specifically we introduce an $N$-partite version of the BB84 protocol and we discuss the $N$-partite six-state protocol proposed in arXiv:1612.05585v2. The security analysis proceeds from the generalization of known results in bipartite QKD to the multipartite scenario, and takes into account finite resources. In…
▽ More
We analyze the security of two multipartite quantum key distribution (QKD) protocols, specifically we introduce an $N$-partite version of the BB84 protocol and we discuss the $N$-partite six-state protocol proposed in arXiv:1612.05585v2. The security analysis proceeds from the generalization of known results in bipartite QKD to the multipartite scenario, and takes into account finite resources. In this context we derive a computable expression for the achievable key rate of both protocols by employing the best-known strategies: the uncertainty relation and the postselection technique. We compare the performances of the two protocols both for finite resources and infinitely many signals.
△ Less
Submitted 18 November, 2018; v1 submitted 12 July, 2018;
originally announced July 2018.
-
Device-independent secret-key-rate analysis for quantum repeaters
Authors:
Timo Holz,
Hermann Kampermann,
Dagmar Bruß
Abstract:
The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We stu…
▽ More
The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. and the hybrid quantum repeater protocol by van Loock et al.. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.
△ Less
Submitted 31 January, 2018; v1 submitted 16 November, 2017;
originally announced November 2017.
-
Analysis of quantum error correction with symmetric hypergraph states
Authors:
Thomas Wagner,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Graph states have been used to construct quantum error correction codes for independent errors. Hypergraph states generalize graph states, and symmetric hypergraph states have been shown to allow for the correction of correlated errors. In this paper, it is shown that symmetric hypergraph states are not useful for the correction of independent errors, at least for up to 30 qubits. Furthermore, err…
▽ More
Graph states have been used to construct quantum error correction codes for independent errors. Hypergraph states generalize graph states, and symmetric hypergraph states have been shown to allow for the correction of correlated errors. In this paper, it is shown that symmetric hypergraph states are not useful for the correction of independent errors, at least for up to 30 qubits. Furthermore, error correction for error models with protected qubits is explored. A class of known graph codes for this scenario is generalized to hypergraph codes.
△ Less
Submitted 23 February, 2018; v1 submitted 1 November, 2017;
originally announced November 2017.
-
Measurement-device-independent randomness generation with arbitrary quantum states
Authors:
Felix Bischof,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Measurements of quantum systems can be used to generate classical data that is truly unpredictable for every observer. However, this true randomness needs to be discriminated from randomness due to ignorance or lack of control of the devices. We analyze the randomness gain of a measurement-device-independent setup, consisting of a well-characterized source of quantum states and a completely unchar…
▽ More
Measurements of quantum systems can be used to generate classical data that is truly unpredictable for every observer. However, this true randomness needs to be discriminated from randomness due to ignorance or lack of control of the devices. We analyze the randomness gain of a measurement-device-independent setup, consisting of a well-characterized source of quantum states and a completely uncharacterized and untrusted detector. Our framework generalizes previous schemes as arbitrary input states and arbitrary measurements can be analyzed. Our method is used to suggest simple and realistic implementations that yield high randomness generation rates of more than one random bit per qubit for detectors of sufficient quality.
△ Less
Submitted 9 March, 2017;
originally announced March 2017.
-
Multipartite entanglement detection for hypergraph states
Authors:
Maddalena Ghio,
Daniele Malpetti,
Matteo Rossi,
Dagmar Bruß,
Chiara Macchiavello
Abstract:
We study the entanglement properties of quantum hypergraph states of $n$ qubits, focusing on multipartite entanglement. We compute multipartite entanglement for hypergraph states with a single hyperedge of maximum cardinality, for hypergraph states endowed with all possible hyperedges of cardinality equal to $n-1$ and for those hypergraph states with all possible hyperedges of cardinality greater…
▽ More
We study the entanglement properties of quantum hypergraph states of $n$ qubits, focusing on multipartite entanglement. We compute multipartite entanglement for hypergraph states with a single hyperedge of maximum cardinality, for hypergraph states endowed with all possible hyperedges of cardinality equal to $n-1$ and for those hypergraph states with all possible hyperedges of cardinality greater than or equal to $n-1$. We then find a lower bound to the multipartite entanglement of a generic quantum hypergraph state. We finally apply the multipartite entanglement results to the construction of entanglement witness operators, able to detect genuine multipartite entanglement in the neighbourhood of a given hypergraph state. We first build entanglement witnesses of the projective type, then propose a class of witnesses based on the stabilizer formalism, hence called stabilizer witnesses, able to reduce the experimental effort from an exponential to a linear growth in the number of local measurement settings with the number of qubits.
△ Less
Submitted 5 July, 2017; v1 submitted 1 March, 2017;
originally announced March 2017.
-
Maximal Coherence and the Resource Theory of Purity
Authors:
Alexander Streltsov,
Hermann Kampermann,
Sabine Wölk,
Manuel Gessner,
Dagmar Bruß
Abstract:
The resource theory of quantum coherence studies the off-diagonal elements of a density matrix in a distinguished basis, whereas the resource theory of purity studies all deviations from the maximally mixed state. We establish a direct connection between the two resource theories, by identifying purity as the maximal coherence which is achievable by unitary operations. The states that saturate thi…
▽ More
The resource theory of quantum coherence studies the off-diagonal elements of a density matrix in a distinguished basis, whereas the resource theory of purity studies all deviations from the maximally mixed state. We establish a direct connection between the two resource theories, by identifying purity as the maximal coherence which is achievable by unitary operations. The states that saturate this maximum identify a universal family of maximally coherent mixed states. These states are optimal resources under maximally incoherent operations, and thus independent of the way coherence is quantified. For all distance-based coherence quantifiers the maximal coherence can be evaluated exactly, and is shown to coincide with the corresponding distance-based purity quantifier. We further show that purity bounds the maximal amount of entanglement and discord that can be generated by unitary operations, thus demonstrating that purity is the most elementary resource for quantum information processing.
△ Less
Submitted 4 June, 2018; v1 submitted 22 December, 2016;
originally announced December 2016.
-
Multi-partite entanglement speeds up quantum key distribution in networks
Authors:
Michael Epping,
Hermann Kampermann,
Chiara Macchiavello,
Dagmar Bruß
Abstract:
The laws of quantum mechanics allow for the distribution of a secret random key between two parties. Here we analyse the security of a protocol for establishing a common secret key between N parties (i.e. a conference key), using resource states with genuine N-partite entanglement. We compare this protocol to conference key distribution via bipartite entanglement, regarding the required resources,…
▽ More
The laws of quantum mechanics allow for the distribution of a secret random key between two parties. Here we analyse the security of a protocol for establishing a common secret key between N parties (i.e. a conference key), using resource states with genuine N-partite entanglement. We compare this protocol to conference key distribution via bipartite entanglement, regarding the required resources, achievable secret key rates and threshold qubit error rates. Furthermore we discuss quantum networks with bottlenecks for which our multipartite entanglement-based protocol can benefit from network coding, while the bipartite protocol cannot. It is shown how this advantage leads to a higher secret key rate.
△ Less
Submitted 27 March, 2017; v1 submitted 16 December, 2016;
originally announced December 2016.
-
Entanglement distribution and quantum discord
Authors:
Alexander Streltsov,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Establishing entanglement between distant parties is one of the most important problems of quantum technology, since long-distance entanglement is an essential part of such fundamental tasks as quantum cryptography or quantum teleportation. In this lecture we review basic properties of entanglement and quantum discord, and discuss recent results on entanglement distribution and the role of quantum…
▽ More
Establishing entanglement between distant parties is one of the most important problems of quantum technology, since long-distance entanglement is an essential part of such fundamental tasks as quantum cryptography or quantum teleportation. In this lecture we review basic properties of entanglement and quantum discord, and discuss recent results on entanglement distribution and the role of quantum discord therein. We also review entanglement distribution with separable states, and discuss important problems which still remain open. One such open problem is a possible advantage of indirect entanglement distribution, when compared to direct distribution protocols.
△ Less
Submitted 17 October, 2016;
originally announced October 2016.
-
Device-Independent Bounds on Detection Efficiency
Authors:
Jochen Szangolies,
Hermann Kampermann,
Dagmar Bruß
Abstract:
In many quantum information applications, a minimum detection efficiency must be exceeded to ensure success. Protocols depending on the violation of a Bell inequality, for instance, may be subject to the so-called detection loophole: imperfect detectors may yield spurious violations, which consequently cannot be used to ensure, say, quantum cryptographic security. Hence, we investigate the possibi…
▽ More
In many quantum information applications, a minimum detection efficiency must be exceeded to ensure success. Protocols depending on the violation of a Bell inequality, for instance, may be subject to the so-called detection loophole: imperfect detectors may yield spurious violations, which consequently cannot be used to ensure, say, quantum cryptographic security. Hence, we investigate the possibility of giving lower bounds on detector efficiency even if an adversary has full control over both the source and the detectors. To this end, we present a technique to systematically derive Bell inequalities free from the detection loophole using only the observed measurements statistics. The violation of these inequalities certifies that the detectors used exceed a certain minimal efficiency.
△ Less
Submitted 28 June, 2017; v1 submitted 20 September, 2016;
originally announced September 2016.
-
Quantum Router with Network Coding
Authors:
Michael Epping,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Many protocols of quantum information processing, like quantum key distribution or measurement-based quantum computation, "consume" entangled quantum states during their execution. When participants are located at distant sites, these resource states need to be distributed. Due to transmission losses quantum repeater become necessary for large distances (e.g. $\gtrsim$ 300 km). Here we generalize…
▽ More
Many protocols of quantum information processing, like quantum key distribution or measurement-based quantum computation, "consume" entangled quantum states during their execution. When participants are located at distant sites, these resource states need to be distributed. Due to transmission losses quantum repeater become necessary for large distances (e.g. $\gtrsim$ 300 km). Here we generalize the concept of the graph state repeater to $D$-dimensional graph states and to repeaters that can perform basic measurement-based quantum computations, which we call quantum routers. This processing of data at intermediate network nodes is called quantum network coding. We describe how a scheme to distribute general two-colorable graph states via quantum routers with network coding can be constructed from classical linear network codes. The robustness of the distribution of graph states against outages of network nodes is analysed by establishing a link to stabilizer error correction codes. Furthermore we show, that for any stabilizer error correction code there exists a corresponding quantum network code with similar error correcting capabilities.
△ Less
Submitted 26 May, 2016;
originally announced May 2016.
-
On the error analysis of quantum repeaters with encoding
Authors:
Michael Epping,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Losses of optical signals scale exponentially with the distance. Quantum repeaters are devices that tackle these losses in quantum communication by splitting the total distance into shorter parts. Today two types of quantum repeaters are subject of research in the field of quantum information: Those that use two-way communication and those that only use one-way communication. Here we explain the d…
▽ More
Losses of optical signals scale exponentially with the distance. Quantum repeaters are devices that tackle these losses in quantum communication by splitting the total distance into shorter parts. Today two types of quantum repeaters are subject of research in the field of quantum information: Those that use two-way communication and those that only use one-way communication. Here we explain the details of the performance analysis for repeaters of the second type. Furthermore we compare the two different schemes. Finally we show how the performance analysis generalizes to large-scale quantum networks.
△ Less
Submitted 10 August, 2015;
originally announced August 2015.
-
Determining X-chains in graph states
Authors:
Jun-Yi Wu,
Hermann Kampermann,
Dagmar Bruß
Abstract:
The representation of graph states in the X-basis as well as the calculation of graph state overlaps can efficiently be performed by using the concept of X-Chains [Phys. Rev. A 92(1) 012322]. We present a necessary and sufficient criterion for X-chains and show that they can efficiently be determined by Bareiss algorithm. An analytical approach for searching X-chain groups of a graph state is prop…
▽ More
The representation of graph states in the X-basis as well as the calculation of graph state overlaps can efficiently be performed by using the concept of X-Chains [Phys. Rev. A 92(1) 012322]. We present a necessary and sufficient criterion for X-chains and show that they can efficiently be determined by Bareiss algorithm. An analytical approach for searching X-chain groups of a graph state is proposed. Furthermore we generalize the concept of X-chains to so-called Euler chains, whose induced subgraphs are Eulerian. This approach helps to determine if a given vertex set is an X-chain and we show how Euler chains can be used in the construction of multipartite Bell inequalities for graph states.
△ Less
Submitted 12 January, 2016; v1 submitted 22 July, 2015;
originally announced July 2015.
-
Detecting Entanglement of Unknown Quantum States with Random Measurements
Authors:
Jochen Szangolies,
Hermann Kampermann,
Dagmar Bruß
Abstract:
In quantum information theory, the reliable and effective detection of entanglement is of paramount importance. However, given an unknown state, assessing its entanglement is a challenging task. To attack this problem, we investigate the use of random local measurements, from which entanglement witnesses are then constructed via semidefinite programming methods. We propose a scheme of successively…
▽ More
In quantum information theory, the reliable and effective detection of entanglement is of paramount importance. However, given an unknown state, assessing its entanglement is a challenging task. To attack this problem, we investigate the use of random local measurements, from which entanglement witnesses are then constructed via semidefinite programming methods. We propose a scheme of successively increasing the number of measurements until the presence of entanglement can be unambiguously concluded, and investigate its performance in various examples.
△ Less
Submitted 25 November, 2015; v1 submitted 30 April, 2015;
originally announced April 2015.
-
Large-scale quantum networks based on graphs
Authors:
Michael Epping,
Hermann Kampermann,
Dagmar Bruß
Abstract:
Society relies and depends increasingly on information exchange and communication. In the quantum world, security and privacy is a built-in feature for information processing. The essential ingredient for exploiting these quantum advantages is the resource of entanglement, which can be shared between two or more parties. The distribution of entanglement over large distances constitutes a key chall…
▽ More
Society relies and depends increasingly on information exchange and communication. In the quantum world, security and privacy is a built-in feature for information processing. The essential ingredient for exploiting these quantum advantages is the resource of entanglement, which can be shared between two or more parties. The distribution of entanglement over large distances constitutes a key challenge for current research and development. Due to losses of the transmitted quantum particles, which typically scale exponentially with the distance, intermediate quantum repeater stations are needed. Here we show how to generalise the quantum repeater concept to the multipartite case, by fully describing large-scale quantum networks, i.e. network nodes and their long-distance links, in the language of graphs and graph states. This unifying approach comprises both the distribution of multipartite entanglement across the network, and the protection against errors via encoding. The correspondence to graph states also provides a tool for optimising the architecture of quantum networks.
△ Less
Submitted 16 February, 2016; v1 submitted 24 April, 2015;
originally announced April 2015.