-
Modified Six State Cryptographic Protocol with Entangled Ancilla Component States
Authors:
Rashi Jain,
Satyabrata Adhikari
Abstract:
In a realistic situation, it is very difficult to communicate securely between two distant parties without introducing any disturbances. These disturbances might occur either due to external noise or may be due to the interference of an eavesdropper sitting in between the sender and the receiver. In this work, we probe here the existence of the possibility of the situation of generation of a secre…
▽ More
In a realistic situation, it is very difficult to communicate securely between two distant parties without introducing any disturbances. These disturbances might occur either due to external noise or may be due to the interference of an eavesdropper sitting in between the sender and the receiver. In this work, we probe here the existence of the possibility of the situation of generation of a secret key even if the eavesdropper is able to construct an entangled ancilla state in such a way that she can extract information from the intercepted qubit. To achieve this task, we consider and modify the six-state QKD protocol in which Eve can construct the unitary transformation that may make all ancilla components entangled at the output. Then, we calculate the mutual information between Alice and Bob and Alice and Eve, and identify the region where the secret key is generated even in the presence of Eve. We find that, in general, the mutual information of Alice and Eve depends not only on the disturbance D, but here we have shown that it also depends on the concurrence of the ancilla component states. We have further shown that it is possible to derive the disturbance-free mutual information of Alice and Eve, if Eve manipulates her entangled ancilla state in a particular manner. Thus, in this way, we are able to show that a secret key can be generated between Alice and Bob even if the disturbance is large enough. Moreover, we show that Bruss's six state QKD protocol failed to generate the secret key in the region where the modified six-state QKD protocol can generate the secret key.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Robust and composable device-independent quantum protocols for oblivious transfer and bit commitment
Authors:
Rishabh Batra,
Sayantan Chakraborty,
Rahul Jain,
Upendra Kapshikar
Abstract:
We present robust and composable device-independent quantum protocols for oblivious transfer (OT) and bit commitment (BC) using Magic Square devices. We assume there is no long-term quantum memory, that is, after a finite time interval, referred to as \textbf{DELAY}, the states stored in the devices decohere. By robustness, which is a highlight of our protocols, we mean that the protocols are corr…
▽ More
We present robust and composable device-independent quantum protocols for oblivious transfer (OT) and bit commitment (BC) using Magic Square devices. We assume there is no long-term quantum memory, that is, after a finite time interval, referred to as \textbf{DELAY}, the states stored in the devices decohere. By robustness, which is a highlight of our protocols, we mean that the protocols are correct and secure even when devices are slightly off from their ideal specifications (the \emph{faulty but non-malicious} regime). This is an important property, since in the real world, devices would certainly have small manufacturing errors and cannot be expected to be ideal. To the best of our understanding and knowledge, none of the known DI protocols for OT and BC in the literature are robust; they can not guarantee correctness in the faulty but non-malicious regime. Our protocols are sequentially composable and hence, can be used as building blocks to construct larger protocols, while still preserving security guarantees.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
Commitments are equivalent to one-way state generators
Authors:
Rishabh Batra,
Rahul Jain
Abstract:
One-way state generators (OWSG) are natural quantum analogs to classical one-way functions. We show that $O\left(\frac{n}{\log(n)}\right)$-copy OWSGs ($n$ represents the input length) are equivalent to $poly(n)$-copy OWSG and to quantum commitments. Since known results show that $o\left(\frac{n}{\log(n)}\right)$-copy OWSG cannot imply commitments, this shows that $O\left(\frac{n}{\log(n)}\right)$-…
▽ More
One-way state generators (OWSG) are natural quantum analogs to classical one-way functions. We show that $O\left(\frac{n}{\log(n)}\right)$-copy OWSGs ($n$ represents the input length) are equivalent to $poly(n)$-copy OWSG and to quantum commitments. Since known results show that $o\left(\frac{n}{\log(n)}\right)$-copy OWSG cannot imply commitments, this shows that $O\left(\frac{n}{\log(n)}\right)$-copy OWSGs are the weakest OWSGs from which we can get commitments (and hence much of quantum cryptography).
Our construction follows along the lines of Håstad, Impagliazzo, Levin and Luby [HILL], who obtained classical pseudorandom generators (PRG) from classical one-way functions (OWF), however with crucial modifications. Our construction, when applied to the classical case, provides an alternative to the construction provided by [HILL]. Since we do not argue conditioned on the output of the one-way function, our construction and analysis are arguably simpler and may be of independent interest.
△ Less
Submitted 17 April, 2024; v1 submitted 4 April, 2024;
originally announced April 2024.
-
One-Shot Non-Catalytic Distributed Purity Distillation
Authors:
Sayantan Chakraborty,
Rahul Jain,
Pranab Sen
Abstract:
Pure states are an important resource in many quantum information processing protocols. However, even making a fixed pure state, say $|0\rangle$, in the laboratory requires a considerable amount of effort. Often one ends up with a mixed state $ρ$ whose classical description is nevertheless known. Hence it is important to develop protocols that extract a fixed pure state from a known mixed state. I…
▽ More
Pure states are an important resource in many quantum information processing protocols. However, even making a fixed pure state, say $|0\rangle$, in the laboratory requires a considerable amount of effort. Often one ends up with a mixed state $ρ$ whose classical description is nevertheless known. Hence it is important to develop protocols that extract a fixed pure state from a known mixed state. In this work, we study the problem of extracting a fixed pure state $|0\rangle^{A'} |0\rangle^{B'}$ from a known pure state $ρ^{AB}$ distributed between two parties $A$ and $B$. Here, $A'$, $B'$ are subspaces of $A$, $B$ and the total amount of purity extracted is $\log |A'| + \log |B'|$. The parties can borrow local pure ancilla, apply local unitary operations and send a message from $A$ to $B$ through a dephasing channel. If local pure ancilla is borrowed, it must be subtracted in order to properly account for the purity extracted. We obtain the most efficient achievable bounds on one shot distributed purity extraction, in terms of the rate of local ancilla borrowed by the protocol, while distilling pure qubits at the best known rate. Our protocols borrow little to no local pure ancilla. Our bounds improve upon the existing bounds for this problem in both one shot as well as asymptotic iid settings. In particular they subsume all the asymptotic iid results of Devetak and Krovi-Devetak. In addition, we derive upper bounds for the rate of distillation in the one shot setting, which nearly match our achievable bounds.
△ Less
Submitted 25 March, 2024;
originally announced March 2024.
-
Quantum Channel Simulation in Fidelity is no more difficult than State Splitting
Authors:
Michael X. Cao,
Rahul Jain,
Marco Tomamichel
Abstract:
Characterizing the minimal communication needed for the quantum channel simulation is a fundamental task in the quantum information theory. In this paper, we show that, in fidelity, the quantum channel simulation can be directly achieved via quantum state splitting without using a technique known as the de~Finetti reduction, and thus provide a pair of tighter one-shot bounds. Using the bounds, we…
▽ More
Characterizing the minimal communication needed for the quantum channel simulation is a fundamental task in the quantum information theory. In this paper, we show that, in fidelity, the quantum channel simulation can be directly achieved via quantum state splitting without using a technique known as the de~Finetti reduction, and thus provide a pair of tighter one-shot bounds. Using the bounds, we also recover the quantum reverse Shannon theorem in a much simpler way.
△ Less
Submitted 24 June, 2024; v1 submitted 21 March, 2024;
originally announced March 2024.
-
Asynchronous Entanglement Routing for the Quantum Internet
Authors:
Zebo Yang,
Ali Ghubaish,
Raj Jain,
Hassan Shapourian,
Alireza Shabani
Abstract:
With the emergence of the Quantum Internet, the need for advanced quantum networking techniques has significantly risen. Various models of quantum repeaters have been presented, each delineating a unique strategy to ensure quantum communication over long distances. We focus on repeaters that employ entanglement generation and swapping. This revolves around establishing remote end-to-end entangleme…
▽ More
With the emergence of the Quantum Internet, the need for advanced quantum networking techniques has significantly risen. Various models of quantum repeaters have been presented, each delineating a unique strategy to ensure quantum communication over long distances. We focus on repeaters that employ entanglement generation and swapping. This revolves around establishing remote end-to-end entanglement through repeaters, a concept we denote as the "quantum-native" repeaters (also called "first-generation" repeaters in some literature). The challenges in routing with quantum-native repeaters arise from probabilistic entanglement generation and restricted coherence time. Current approaches use synchronized time slots to search for entanglement-swapping paths, resulting in inefficiencies. Here, we propose a new set of asynchronous routing protocols for quantum networks by incorporating the idea of maintaining a dynamic topology in a distributed manner, which has been extensively studied in classical routing for lossy networks, such as using a destination-oriented directed acyclic graph (DODAG) or a spanning tree. The protocols update the entanglement-link topology asynchronously, identify optimal entanglement-swapping paths, and preserve unused direct-link entanglements. Our results indicate that asynchronous protocols achieve a larger upper bound with an appropriate setting and significantly higher entanglement rate than existing synchronous approaches, and the rate increases with coherence time, suggesting that it will have a much more profound impact on quantum networks as technology advances.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Universality in Ground State Masses of Nuclei
Authors:
A. Bhagwat,
Sudhir Ranjan Jain
Abstract:
The beautiful and profound result that the first eigenvalue of Schroedinger operator can be interpreted as a large deviation of certain kind of Brownian motion leads to possible existence of universality in the distribution of ground state energies of quantal systems. Existence of such universality is explored in the distribution of the ground state energies of nuclei with Z $\ge$ 8 and N $\ge$ 8.…
▽ More
The beautiful and profound result that the first eigenvalue of Schroedinger operator can be interpreted as a large deviation of certain kind of Brownian motion leads to possible existence of universality in the distribution of ground state energies of quantal systems. Existence of such universality is explored in the distribution of the ground state energies of nuclei with Z $\ge$ 8 and N $\ge$ 8. Specifically, it has been demonstrated that the nuclear masses follow extreme-value statistics, implying that the nuclear ground state energies indeed can be treated as extreme values in the sense of the large deviation theory of Donsker and Varadhan.
△ Less
Submitted 28 November, 2023;
originally announced November 2023.
-
Area law for the maximally mixed ground state in degenerate 1D gapped systems
Authors:
Itai Arad,
Raz Firanko,
Rahul Jain
Abstract:
We show an area law with logarithmic correction for the maximally mixed state $Ω$ in the (degenerate) ground space of a 1D gapped local Hamiltonian $H$, which is independent of the underlying ground space degeneracy. Formally, for $\varepsilon>0$ and a bi-partition $L\cup L^c$ of the 1D lattice, we show that
$$\mathrm{I}^{\varepsilon}_{\max}(L:L^c)_Ω \leq O(\log(|L|)+\log(1/\varepsilon)),$$
wh…
▽ More
We show an area law with logarithmic correction for the maximally mixed state $Ω$ in the (degenerate) ground space of a 1D gapped local Hamiltonian $H$, which is independent of the underlying ground space degeneracy. Formally, for $\varepsilon>0$ and a bi-partition $L\cup L^c$ of the 1D lattice, we show that
$$\mathrm{I}^{\varepsilon}_{\max}(L:L^c)_Ω \leq O(\log(|L|)+\log(1/\varepsilon)),$$
where $|L|$ represents the number of qudits in $L$ and $\mathrm{I}^ε_{\max}(L:L^c)_Ω$ represents the $\varepsilon$- 'smoothed maximum mutual information' with respect to the $L:L^c$ partition in $Ω$. As a corollary, we get an area law for the mutual information of the form $\mathrm{I}(L:R)_Ω\leq O(\log |L|)$. In addition, we show that $Ω$ can be approximated up to an $\varepsilon$ in trace norm with a state of Schmidt rank of at most $\mathrm{poly}(|L|/\varepsilon)$.
△ Less
Submitted 29 October, 2023;
originally announced October 2023.
-
On the power of geometrically-local classical and quantum circuits
Authors:
Kishor Bharti,
Rahul Jain
Abstract:
We show a relation, based on parallel repetition of the Magic Square game, that can be solved, with probability exponentially close to $1$ (worst-case input), by $1D$ (uniform) depth $2$, geometrically-local, noisy (noise below a threshold), fan-in $4$, quantum circuits. We show that the same relation cannot be solved, with an exponentially small success probability (averaged over inputs drawn uni…
▽ More
We show a relation, based on parallel repetition of the Magic Square game, that can be solved, with probability exponentially close to $1$ (worst-case input), by $1D$ (uniform) depth $2$, geometrically-local, noisy (noise below a threshold), fan-in $4$, quantum circuits. We show that the same relation cannot be solved, with an exponentially small success probability (averaged over inputs drawn uniformly), by $1D$ (non-uniform) geometrically-local, sub-linear depth, classical circuits consisting of fan-in $2$ NAND gates. Quantum and classical circuits are allowed to use input-independent (geometrically-non-local) resource states, that is entanglement and randomness respectively. To the best of our knowledge, previous best (analogous) depth separation for a task between quantum and classical circuits was constant v/s sub-logarithmic, although for general (geometrically non-local) circuits. Our hardness result for classical circuits is based on a direct product theorem about classical communication protocols from Jain and Kundu [JK22]. As an application, we propose a protocol that can potentially demonstrate verifiable quantum advantage in the NISQ era. We also provide generalizations of our result for higher dimensional circuits as well as a wider class of Bell games.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
Quasi-integrability and nonlinear resonances in cold atoms under modulation
Authors:
Rahul Gupta,
Manan Jain,
Sudhir R. Jain
Abstract:
Quantum dynamics of a collection of atoms subjected to phase modulation has been carefully revisited. We present an exact analysis of the evolution of a two-level system (represented by a spinor) under the action of a time-dependent matrix Hamiltonian. The dynamics is shown to evolve on two coupled potential energy surfaces, one of them binding while the other one scattering type. The dynamics is…
▽ More
Quantum dynamics of a collection of atoms subjected to phase modulation has been carefully revisited. We present an exact analysis of the evolution of a two-level system (represented by a spinor) under the action of a time-dependent matrix Hamiltonian. The dynamics is shown to evolve on two coupled potential energy surfaces, one of them binding while the other one scattering type. The dynamics is shown to be quasi-integrable with nonlinear resonances. The bounded dynamics with intermittent scattering at random moments presents the scenario reminiscent to Anderson and dynamical localization. We believe that a careful analytical investigation of a multi-component system which is classically non-integrable is relevant to many other fields, including quantum computation with multi-qubit system.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages
Authors:
Naresh Goud Boddu,
Vipul Goyal,
Rahul Jain,
João Ribeiro
Abstract:
Non-malleable codes are fundamental objects at the intersection of cryptography and coding theory. These codes provide security guarantees even in settings where error correction and detection are impossible, and have found applications to several other cryptographic tasks. One of the strongest and most well-studied adversarial tampering models is $2$-split-state tampering. Here, a codeword is spl…
▽ More
Non-malleable codes are fundamental objects at the intersection of cryptography and coding theory. These codes provide security guarantees even in settings where error correction and detection are impossible, and have found applications to several other cryptographic tasks. One of the strongest and most well-studied adversarial tampering models is $2$-split-state tampering. Here, a codeword is split into two parts and the adversary can then independently tamper with each part using arbitrary functions. This model can be naturally extended to the secret sharing setting with several parties by having the adversary independently tamper with each share. Previous works on non-malleable coding and secret sharing in the split-state tampering model only considered the encoding of \emph{classical} messages. Furthermore, until recent work by Aggarwal, Boddu, and Jain (IEEE Trans.\ Inf.\ Theory 2024), adversaries with quantum capabilities and \emph{shared entanglement} had not been considered, and it is a priori not clear whether previous schemes remain secure in this model.
In this work, we introduce the notions of split-state non-malleable codes and secret sharing schemes for quantum messages secure against quantum adversaries with shared entanglement. Then, we present explicit constructions of such schemes that achieve low-error non-malleability. More precisely, we construct efficiently encodable and decodable split-state non-malleable codes and secret sharing schemes for quantum messages preserving entanglement with external systems and achieving security against quantum adversaries having shared entanglement with codeword length $n$, any message length at most $n^{Ω(1)}$, and error $ε=2^{-{n^{Ω(1)}}}$. In the easier setting of \emph{average-case} non-malleability, we achieve efficient non-malleable coding with rate close to $1/11$.
△ Less
Submitted 27 February, 2024; v1 submitted 12 August, 2023;
originally announced August 2023.
-
Quantum thermodynamic cycles in the forward and time-reversed regimes
Authors:
Debadrito Roy,
Sudhir Ranjan Jain
Abstract:
A quantum engine with n qubits performing thermodynamic cycles with two thermal reservoirs is presented. While such constructions have been aplenty, here we show the existence of what we term as "limit cycle" at a purely quantum level of description owing to the properties of superoperators governing the evolution of states. It is shown that the limit cycle is the same under forward and reverse pr…
▽ More
A quantum engine with n qubits performing thermodynamic cycles with two thermal reservoirs is presented. While such constructions have been aplenty, here we show the existence of what we term as "limit cycle" at a purely quantum level of description owing to the properties of superoperators governing the evolution of states. It is shown that the limit cycle is the same under forward and reverse protocol of cycle operations. This limit cycle becomes the basis of the quantum engine. One dimensional Ising model has been used to illustrate these ideas.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
Quantum error correction beyond the toric code: dynamical systems meet encoding
Authors:
Garima Rajpoot,
Komal Kumari,
Sudhir Ranjan Jain
Abstract:
We construct surface codes corresponding to genus greater than one in the context of quantum error correction. The architecture is inspired by the topology of invariant integral surfaces of certain non-integrable classical billiards. Corresponding to the fundamental domains of rhombus and square torus billiard, surface codes of genus two and five are presented here. There is significant improvemen…
▽ More
We construct surface codes corresponding to genus greater than one in the context of quantum error correction. The architecture is inspired by the topology of invariant integral surfaces of certain non-integrable classical billiards. Corresponding to the fundamental domains of rhombus and square torus billiard, surface codes of genus two and five are presented here. There is significant improvement in encoding rates and code distance, in addition to immunity against noise.
△ Less
Submitted 10 July, 2023;
originally announced July 2023.
-
Quantum Zeno effect: a qutrit controlled by a qubit
Authors:
Komal Kumari,
Garima Rajpoot,
Sudhir Ranjan Jain
Abstract:
For a three-level system monitored by an ancilla, we show that quantum Zeno effect can be employed to control quantum jump for error correction. Further, we show that we can realize cNOT gate, and effect dense coding and teleportation. We believe that this work paves the way to generalize the control of a qudit.
For a three-level system monitored by an ancilla, we show that quantum Zeno effect can be employed to control quantum jump for error correction. Further, we show that we can realize cNOT gate, and effect dense coding and teleportation. We believe that this work paves the way to generalize the control of a qudit.
△ Less
Submitted 10 July, 2023;
originally announced July 2023.
-
A Genus-two Surface Code
Authors:
Komal Kumari,
Garima Rajpoot,
Sudhir Ranjan Jain
Abstract:
We construct a double-toric surface code by exploiting the planar tessellation using a rhombus-shaped tile. With n data qubits, we are able to encode at least n/3 logical qubits or quantum memories. By a suitable arrangement of the tiles, the code achieves larger distances, leading to significant error-correcting capability. We demonstrate the robustness of the logical qubits thus obtained in the…
▽ More
We construct a double-toric surface code by exploiting the planar tessellation using a rhombus-shaped tile. With n data qubits, we are able to encode at least n/3 logical qubits or quantum memories. By a suitable arrangement of the tiles, the code achieves larger distances, leading to significant error-correcting capability. We demonstrate the robustness of the logical qubits thus obtained in the presence of external noise. We believe that the optimality of the code presented here will pave the way for design of efficient scalable architectures.
△ Less
Submitted 3 May, 2023; v1 submitted 22 November, 2022;
originally announced November 2022.
-
The tunable 0-\texorpdfstring{$π$}{Lg} qubit: Dynamics and Relaxation
Authors:
Garima Rajpoot,
Komal Kumari,
Sandeep Joshi,
Sudhir Ranjan Jain
Abstract:
We present a systematic treatment of a 0-\texorpdfstring{$π$}{Lg} qubit in the presence of a time-dependent external flux. A gauge-invariant Lagrangian and the corresponding Hamiltonian is obtained. The effect of the flux noise on the qubit relaxation is obtained using perturbation theory. Under a time-dependent drive of sinusoidal form, the survival probability, and transition probabilities have…
▽ More
We present a systematic treatment of a 0-\texorpdfstring{$π$}{Lg} qubit in the presence of a time-dependent external flux. A gauge-invariant Lagrangian and the corresponding Hamiltonian is obtained. The effect of the flux noise on the qubit relaxation is obtained using perturbation theory. Under a time-dependent drive of sinusoidal form, the survival probability, and transition probabilities have been studied for different strengths and frequencies. The driven qubit is shown to possess coherent oscillations among two distinct states for a weak to moderate strength close to resonant frequencies of the unperturbed qubit. The parameters can be chosen to prepare the system in its ground state. This feature paves the way to prolong the lifetime by combining ideas from weak measurement and quantum Zeno effect. We believe that this is an important variation of a topologically protected qubit which is tunable.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
Qubit control using quantum Zeno effect: Action principle approach
Authors:
Komal Kumari,
Garima Rajpoot,
Sandeep Joshi,
Sudhir Ranjan Jain
Abstract:
We employ the stochastic path-integral formalism and action principle for continuous quantum measurements - the Chantasri-Dressel-Jordan (CDJ) action formalism [1, 2] - to understand the stages in which quantum Zeno effect helps control the states of a simple quantum system. The detailed dynamics of a driven two-level system subjected to repeated measurements unravels a myriad of phases, so to say…
▽ More
We employ the stochastic path-integral formalism and action principle for continuous quantum measurements - the Chantasri-Dressel-Jordan (CDJ) action formalism [1, 2] - to understand the stages in which quantum Zeno effect helps control the states of a simple quantum system. The detailed dynamics of a driven two-level system subjected to repeated measurements unravels a myriad of phases, so to say. When the detection frequency is smaller than the Rabi frequency, the oscillations slow down, eventually coming to a halt at an interesting resonance when measurements are spaced exactly by the time of transition between the two states. On the other hand, in the limit of large number of repeated measurements, the dynamics organizes itself in a rather interesting way about two hyperbolic points in phase space whose stable and unstable directions are reversed. Thus, the phase space flow occurs from one hyperbolic point to another, in different ways organized around the separatrices. We believe that the systematic treatment presented here paves the way for a better and clearer understanding of quantum Zeno effect in the context of quantum error correction.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
Matrix Multiplicative Weights Updates in Quantum Zero-Sum Games: Conservation Laws & Recurrence
Authors:
Rahul Jain,
Georgios Piliouras,
Ryann Sim
Abstract:
Recent advances in quantum computing and in particular, the introduction of quantum GANs, have led to increased interest in quantum zero-sum game theory, extending the scope of learning algorithms for classical games into the quantum realm. In this paper, we focus on learning in quantum zero-sum games under Matrix Multiplicative Weights Update (a generalization of the multiplicative weights update…
▽ More
Recent advances in quantum computing and in particular, the introduction of quantum GANs, have led to increased interest in quantum zero-sum game theory, extending the scope of learning algorithms for classical games into the quantum realm. In this paper, we focus on learning in quantum zero-sum games under Matrix Multiplicative Weights Update (a generalization of the multiplicative weights update method) and its continuous analogue, Quantum Replicator Dynamics. When each player selects their state according to quantum replicator dynamics, we show that the system exhibits conservation laws in a quantum-information theoretic sense. Moreover, we show that the system exhibits Poincare recurrence, meaning that almost all orbits return arbitrarily close to their initial conditions infinitely often. Our analysis generalizes previous results in the case of classical games.
△ Less
Submitted 26 April, 2023; v1 submitted 3 November, 2022;
originally announced November 2022.
-
Quantum secure non-malleable codes in the split-state model
Authors:
Divesh Aggarwal,
Naresh Goud Boddu,
Rahul Jain
Abstract:
Non-malleable-codes introduced by Dziembowski, Pietrzak and Wichs [DPW18] encode a classical message $S$ in a manner such that tampering the codeword results in the decoder either outputting the original message $S$ or a message that is unrelated/independent of $S$. Providing such non-malleable security for various tampering function families has received significant attention in recent years. We…
▽ More
Non-malleable-codes introduced by Dziembowski, Pietrzak and Wichs [DPW18] encode a classical message $S$ in a manner such that tampering the codeword results in the decoder either outputting the original message $S$ or a message that is unrelated/independent of $S$. Providing such non-malleable security for various tampering function families has received significant attention in recent years. We consider the well-studied (2-part) split-state model, in which the message $S$ is encoded into two parts $X$ and $Y$, and the adversary is allowed to arbitrarily tamper with each $X$ and $Y$ individually. We consider the security of non-malleable-codes in the split-state model when the adversary is allowed to make use of arbitrary entanglement to tamper the parts $X$ and $Y$. We construct explicit quantum secure non-malleable-codes in the split-state model. Our construction of quantum secure non-malleable-codes is based on the recent construction of quantum secure $2$-source non-malleable-extractors by Boddu, Jain and Kapshikar [BJK21].
△ Less
Submitted 8 June, 2023; v1 submitted 27 February, 2022;
originally announced February 2022.
-
Quantum secure non-malleable-extractors
Authors:
Naresh Goud Boddu,
Rahul Jain,
Upendra Kapshikar
Abstract:
We construct several explicit quantum secure non-malleable-extractors. All the quantum secure non-malleable-extractors we construct are based on the constructions by Chattopadhyay, Goyal and Li [2015] and Cohen [2015].
1) We construct the first explicit quantum secure non-malleable-extractor for (source) min-entropy $k \geq \textsf{poly}\left(\log \left( \frac{n}ε \right)\right)$ ($n$ is the len…
▽ More
We construct several explicit quantum secure non-malleable-extractors. All the quantum secure non-malleable-extractors we construct are based on the constructions by Chattopadhyay, Goyal and Li [2015] and Cohen [2015].
1) We construct the first explicit quantum secure non-malleable-extractor for (source) min-entropy $k \geq \textsf{poly}\left(\log \left( \frac{n}ε \right)\right)$ ($n$ is the length of the source and $ε$ is the error parameter). Previously Aggarwal, Chung, Lin, and Vidick [2019] have shown that the inner-product based non-malleable-extractor proposed by Li [2012] is quantum secure, however it required linear (in $n$) min-entropy and seed length.
Using the connection between non-malleable-extractors and privacy amplification (established first in the quantum setting by Cohen and Vidick [2017]), we get a $2$-round privacy amplification protocol that is secure against active quantum adversaries with communication $\textsf{poly}\left(\log \left( \frac{n}ε \right)\right)$, exponentially improving upon the linear communication required by the protocol due to [2019].
2) We construct an explicit quantum secure $2$-source non-malleable-extractor for min-entropy $k \geq n- n^{Ω(1)}$, with an output of size $n^{Ω(1)}$ and error $2^{- n^{Ω(1)}}$.
3) We also study their natural extensions when the tampering of the inputs is performed $t$-times. We construct explicit quantum secure $t$-non-malleable-extractors for both seeded ($t=d^{Ω(1)}$) as well as $2$-source case ($t=n^{Ω(1)}$).
△ Less
Submitted 28 May, 2023; v1 submitted 7 September, 2021;
originally announced September 2021.
-
On relating one-way classical and quantum communication complexities
Authors:
Naresh Goud Boddu,
Rahul Jain,
Han-Hsuan Lin
Abstract:
Communication complexity is the amount of communication needed to compute a function when the function inputs are distributed over multiple parties. In its simplest form, one-way communication complexity, Alice and Bob compute a function $f(x,y)$, where $x$ is given to Alice and $y$ is given to Bob, and only one message from Alice to Bob is allowed. A fundamental question in quantum information is…
▽ More
Communication complexity is the amount of communication needed to compute a function when the function inputs are distributed over multiple parties. In its simplest form, one-way communication complexity, Alice and Bob compute a function $f(x,y)$, where $x$ is given to Alice and $y$ is given to Bob, and only one message from Alice to Bob is allowed. A fundamental question in quantum information is the relationship between one-way quantum and classical communication complexities, i.e., how much shorter the message can be if Alice is sending a quantum state instead of bit strings? We make some progress towards this question with the following results.
Let $f: \mathcal{X} \times \mathcal{Y} \rightarrow \mathcal{Z} \cup \{\bot\}$ be a partial function and $μ$ be a distribution with support contained in $f^{-1}(\mathcal{Z})$. Denote $d=|\mathcal{Z}|$. Let $\mathsf{R}^{1,μ}_ε(f)$ be the classical one-way communication complexity of $f$; $\mathsf{Q}^{1,μ}_ε(f)$ be the quantum one-way communication complexity of $f$ and $\mathsf{Q}^{1,μ, *}_ε(f)$ be the entanglement-assisted quantum one-way communication complexity of $f$, each with distributional error (average error over $μ$) at most $ε$. We show:
1) If $μ$ is a product distribution, $η> 0$ and $0 \leq ε\leq 1-1/d$, then,
$$\mathsf{R}^{1,μ}_{2ε-dε^2/(d-1)+ η}(f) \leq 2\mathsf{Q}^{1,μ, *}_ε(f) + O(\log\log (1/η))\enspace.$$
2)If $μ$ is a non-product distribution and $\mathcal{Z}=\{ 0,1\}$, then $\forall ε, η> 0$ such that $ε/η+ η< 0.5$,
$$\mathsf{R}^{1,μ}_{3η}(f) = O(\mathsf{Q}^{1,μ}_{ε}(f) \cdot \mathsf{CS}(f)/η^3)\enspace,$$
where
\[\mathsf{CS}(f) = \max_{y} \min_{z\in\{0,1\}} \vert \{x~|~f(x,y)=z\} \vert \enspace.\]
△ Less
Submitted 12 May, 2023; v1 submitted 24 July, 2021;
originally announced July 2021.
-
A direct product theorem for quantum communication complexity with applications to device-independent cryptography
Authors:
Rahul Jain,
Srijita Kundu
Abstract:
We give a direct product theorem for the entanglement-assisted interactive quantum communication complexity of an $l$-player predicate $\mathsf{V}$. In particular we show that for a distribution $p$ that is product across the input sets of the $l$ players, the success probability of any entanglement-assisted quantum communication protocol for computing $n$ copies of $\mathsf{V}$, whose communicati…
▽ More
We give a direct product theorem for the entanglement-assisted interactive quantum communication complexity of an $l$-player predicate $\mathsf{V}$. In particular we show that for a distribution $p$ that is product across the input sets of the $l$ players, the success probability of any entanglement-assisted quantum communication protocol for computing $n$ copies of $\mathsf{V}$, whose communication is $o(\log(\mathrm{eff}^*(\mathsf{V},p))\cdot n)$, goes down exponentially in $n$. Here $\mathrm{eff}^*(\mathsf{V}, p)$ is a distributional version of the quantum efficiency or partition bound introduced by Laplante, Lerays and Roland (2014), which is a lower bound on the distributional quantum communication complexity of computing a single copy of $\mathsf{V}$ with respect to $p$.
Applying our direct product theorem for small communication and techniques related to $\mathrm{eff}^*$, we show that it is possible to do device-independent (DI) quantum cryptography without the assumption that devices do not leak any information. First, we analyze the parallel DI quantum key distribution protocol given by Jain, Miller and Shi (2020), and show that when the protocol is carried out with devices that are compatible with $n$ copies of the Magic Square game, it is possible to extract $Ω(n)$ bits of key from it, even in the presence of $O(n)$ bits of leakage. Second, we show that it is possible to do sequential versions of the Jain, Miller and Shi protocol, which give a better key rate for QKD with leakage, and let us do sequential DI randomness expansion with leakage (it is not known how to do parallel DI randomness expansion even without leakage). Third, we show that proofs of quantumness with two entangled provers are resistant to leakage, i.e., classical players who communicate $O(n)$ bits with each other cannot convince the verifier that they share entanglement.
△ Less
Submitted 20 January, 2023; v1 submitted 8 June, 2021;
originally announced June 2021.
-
Quantum Measurement Adversary
Authors:
Divesh Aggarwal,
Naresh Goud Boddu,
Rahul Jain,
Maciej Obremski
Abstract:
Multi-source-extractors are functions that extract uniform randomness from multiple (weak) sources of randomness. Quantum multi-source-extractors were considered by Kasher and Kempe (for the quantum-independent-adversary and the quantum-bounded-storage-adversary), Chung, Li and Wu (for the general-entangled-adversary) and Arnon-Friedman, Portmann and Scholz (for the quantum-Markov-adversary). One…
▽ More
Multi-source-extractors are functions that extract uniform randomness from multiple (weak) sources of randomness. Quantum multi-source-extractors were considered by Kasher and Kempe (for the quantum-independent-adversary and the quantum-bounded-storage-adversary), Chung, Li and Wu (for the general-entangled-adversary) and Arnon-Friedman, Portmann and Scholz (for the quantum-Markov-adversary). One of the main objectives of this work is to unify all the existing quantum multi-source adversary models. We propose two new models of adversaries: 1) the quantum-measurement-adversary (qm-adv), which generates side-information using entanglement and on post-measurement and 2) the quantum-communication-adversary (qc-adv), which generates side-information using entanglement and communication between multiple sources. We show that, 1. qm-adv is the strongest adversary among all the known adversaries, in the sense that the side-information of all other adversaries can be generated by qm-adv. 2. The (generalized) inner-product function (in fact a general class of two-wise independent functions) continues to work as a good extractor against qm-adv with matching parameters as that of Chor and Goldreich. 3. A non-malleable-extractor proposed by Li (against classical-adversaries) continues to be secure against quantum side-information. This result implies a non-malleable-extractor result of Aggarwal, Chung, Lin and Vidick with uniform seed. We strengthen their result via a completely different proof to make the non-malleable-extractor of Li secure against quantum side-information even when the seed is not uniform. 4. A modification (working with weak sources instead of uniform sources) of the Dodis and Wichs protocol for privacy-amplification is secure against active quantum adversaries. This strengthens on a recent result due to Aggarwal, Chung, Lin and Vidick which uses uniform sources.
△ Less
Submitted 6 June, 2023; v1 submitted 4 June, 2021;
originally announced June 2021.
-
One-shot quantum state redistribution and quantum Markov chains
Authors:
Anurag Anshu,
Shima Bab Hadiashar,
Rahul Jain,
Ashwin Nayak,
Dave Touchette
Abstract:
We revisit the task of quantum state redistribution in the one-shot setting, and design a protocol for this task with communication cost in terms of a measure of distance from quantum Markov chains. More precisely, the distance is defined in terms of quantum max-relative entropy and quantum hypothesis testing entropy.
Our result is the first to operationally connect quantum state redistribution…
▽ More
We revisit the task of quantum state redistribution in the one-shot setting, and design a protocol for this task with communication cost in terms of a measure of distance from quantum Markov chains. More precisely, the distance is defined in terms of quantum max-relative entropy and quantum hypothesis testing entropy.
Our result is the first to operationally connect quantum state redistribution and quantum Markov chains, and can be interpreted as an operational interpretation for a possible one-shot analogue of quantum conditional mutual information. The communication cost of our protocol is lower than all previously known ones and asymptotically achieves the well-known rate of quantum conditional mutual information. Thus, our work takes a step towards the important open question of near-optimal characterization of the one-shot quantum state redistribution.
△ Less
Submitted 12 October, 2023; v1 submitted 18 April, 2021;
originally announced April 2021.
-
Protection of qubits by nonlinear resonances
Authors:
Rakesh Kumar Saini,
Raman Sehgal,
Sudhir R. Jain
Abstract:
We show that quantized superconducting circuits are non-integrable at the classical level of description, adorned by nonlinear resonances amidst stochastic sea. The spectral fluctuations of these quasi-integrable systems exhibit intermediate behaviour between regularity and chaos. The distribution function of ratios of adjacent spacings, and, nearest-neighbour spacing distribution functions attest…
▽ More
We show that quantized superconducting circuits are non-integrable at the classical level of description, adorned by nonlinear resonances amidst stochastic sea. The spectral fluctuations of these quasi-integrable systems exhibit intermediate behaviour between regularity and chaos. The distribution function of ratios of adjacent spacings, and, nearest-neighbour spacing distribution functions attest to the occurrence of "mild chaos". Based on these features, we propose criteria for protection of qubits from decoherence which amounts to choosing the parameters of the system in a way that the system resides as close as possible to the elliptic point of the primary nonlinear resonance of the corresponding classical system.
△ Less
Submitted 20 November, 2020;
originally announced November 2020.
-
A Direct Product Theorem for One-Way Quantum Communication
Authors:
Rahul Jain,
Srijita Kundu
Abstract:
We prove a direct product theorem for the one-way entanglement-assisted quantum communication complexity of a general relation $f\subseteq\mathcal{X}\times\mathcal{Y}\times\mathcal{Z}$. For any $\varepsilon, ζ> 0$ and any $k\geq1$, we show that \[ \mathrm{Q}^1_{1-(1-\varepsilon)^{Ω(ζ^6k/\log|\mathcal{Z}|)}}(f^k) = Ω\left(k\left(ζ^5\cdot\mathrm{Q}^1_{\varepsilon + 12ζ}(f) - \log\log(1/ζ)\right)\rig…
▽ More
We prove a direct product theorem for the one-way entanglement-assisted quantum communication complexity of a general relation $f\subseteq\mathcal{X}\times\mathcal{Y}\times\mathcal{Z}$. For any $\varepsilon, ζ> 0$ and any $k\geq1$, we show that \[ \mathrm{Q}^1_{1-(1-\varepsilon)^{Ω(ζ^6k/\log|\mathcal{Z}|)}}(f^k) = Ω\left(k\left(ζ^5\cdot\mathrm{Q}^1_{\varepsilon + 12ζ}(f) - \log\log(1/ζ)\right)\right),\] where $\mathrm{Q}^1_{\varepsilon}(f)$ represents the one-way entanglement-assisted quantum communication complexity of $f$ with worst-case error $\varepsilon$ and $f^k$ denotes $k$ parallel instances of $f$.
As far as we are aware, this is the first direct product theorem for quantum communication. Our techniques are inspired by the parallel repetition theorems for the entangled value of two-player non-local games, under product distributions due to Jain, Pereszlényi and Yao, and under anchored distributions due to Bavarian, Vidick and Yuen, as well as message-compression for quantum protocols due to Jain, Radhakrishnan and Sen.
Our techniques also work for entangled non-local games which have input distributions anchored on any one side. In particular, we show that for any game $G = (q, \mathcal{X}\times\mathcal{Y}, \mathcal{A}\times\mathcal{B}, \mathsf{V})$ where $q$ is a distribution on $\mathcal{X}\times\mathcal{Y}$ anchored on any one side with anchoring probability $ζ$, then \[ ω^*(G^k) = \left(1 - (1-ω^*(G))^5\right)^{Ω\left(\frac{ζ^2 k}{\log(|\mathcal{A}|\cdot|\mathcal{B}|)}\right)}\] where $ω^*(G)$ represents the entangled value of the game $G$. This is a generalization of the result of Bavarian, Vidick and Yuen, who proved a parallel repetition theorem for games anchored on both sides, and potentially a simplification of their proof.
△ Less
Submitted 20 August, 2020;
originally announced August 2020.
-
A minimax approach to one-shot entropy inequalities
Authors:
Anurag Anshu,
Mario Berta,
Rahul Jain,
Marco Tomamichel
Abstract:
One-shot information theory entertains a plethora of entropic quantities, such as the smooth max-divergence, hypothesis testing divergence and information spectrum divergence, that characterize various operational tasks and are used to prove the asymptotic behavior of various tasks in quantum information theory. Tight inequalities between these quantities are thus of immediate interest. In this no…
▽ More
One-shot information theory entertains a plethora of entropic quantities, such as the smooth max-divergence, hypothesis testing divergence and information spectrum divergence, that characterize various operational tasks and are used to prove the asymptotic behavior of various tasks in quantum information theory. Tight inequalities between these quantities are thus of immediate interest. In this note we use a minimax approach (appearing previously for example in the proofs of the quantum substate theorem), to simplify the quantum problem to a commutative one, which allows us to derive such inequalities. Our derivations are conceptually different from previous arguments and in some cases lead to tighter relations. We hope that the approach discussed here can lead to progress in open problems in quantum Shannon theory, and exemplify this by applying it to a simple case of the joint smoothing problem.
△ Less
Submitted 1 June, 2019;
originally announced June 2019.
-
One-shot Capacity bounds on the Simultaneous Transmission of Classical and Quantum Information
Authors:
Farzin Salek,
Anurag Anshu,
Min-Hsiu Hsieh,
Rahul Jain,
Javier R. Fonollosa
Abstract:
We study the communication capabilities of a quantum channel under the most general channel model known as the one-shot model. Unlike classical channels that can only be used to transmit classical information (bits), a quantum channel can be used for transmission of classical information, quantum information (qubits) and simultaneous transmission of classical and quantum information. In this work,…
▽ More
We study the communication capabilities of a quantum channel under the most general channel model known as the one-shot model. Unlike classical channels that can only be used to transmit classical information (bits), a quantum channel can be used for transmission of classical information, quantum information (qubits) and simultaneous transmission of classical and quantum information. In this work, we investigate the one-shot capabilities of a quantum channel for simultaneously transmitting of bits and qubits. This problem was studied in the asymptotic regime for a memoryless channel and a regularized characterization of the capacity region was reported. It is known that the transmission of private classical information is closely related to the problem of quantum information transmission. We resort to this idea and find achievable and converse bounds on the simultaneous transmission of the public and private classical information. then by shifting the classical private rate to the quantum information rate, the obtained rate regions will be translated into rate regions of thThis in turn, leads to a rate region for simulttaneous transmission of classical and quantum information. In the case of asymptotic i.i.d. setting, our one-shot result is evaluated to the known results in the literature. Our main tools used in the achievability proofs are position-based decoding and convex-split lemma.
△ Less
Submitted 1 October, 2020; v1 submitted 19 September, 2018;
originally announced September 2018.
-
Efficient methods for one-shot quantum communication
Authors:
Anurag Anshu,
Rahul Jain
Abstract:
We address the question of efficient implementation of quantum protocols, with small communication and entanglement, and short depth circuit for encoding or decoding. We introduce two new methods to achieve this, the first method involving two new versions of convex-split lemma that use small amount of additional resource (in comparison to prior version) and the second method being inspired by the…
▽ More
We address the question of efficient implementation of quantum protocols, with small communication and entanglement, and short depth circuit for encoding or decoding. We introduce two new methods to achieve this, the first method involving two new versions of convex-split lemma that use small amount of additional resource (in comparison to prior version) and the second method being inspired by the technique of classical correlated sampling in computer science. These lead to a series of new consequences, as follows.
First, we consider the task of quantum decoupling, where the aim is to apply an operation on a n-qubit register so as to make it independent of an inaccessible quantum system. Many previous works achieve decoupling with the aid of a random unitary. It is known that random unitaries can be replaced by random circuits of size O(n\log n) and depth poly(\log n), or unitary 2-designs based on Clifford circuits of similar size and depth. We show that given any choice of basis such as the computational basis, decoupling can be achieved by a unitary that takes basis vectors to basis vectors. Thus, the circuit acts in a `classical' manner and additionally uses O(n) catalytic qubits in maximally mixed quantum state. Our unitary performs addition and multiplication modulo a prime and hence achieves a circuit size of O(n\log n) and logarithmic depth. This shows that the circuit complexity of integer multiplication (modulo a prime) is lower bounded by the optimal circuit complexity of decoupling.
Next, we construct a new one-shot entanglement-assisted protocol for quantum channel coding that achieves near-optimal communication through a given channel. The number of qubits of pre-shared entanglement is exponentially smaller than that in the previous protocol near-optimal in communication. We also achieve similar results for one-shot quantum state redistribution.
△ Less
Submitted 5 June, 2019; v1 submitted 19 September, 2018;
originally announced September 2018.
-
Partially smoothed information measures
Authors:
Anurag Anshu,
Mario Berta,
Rahul Jain,
Marco Tomamichel
Abstract:
Smooth entropies are a tool for quantifying resource trade-offs in (quantum) information theory and cryptography. In typical bi- and multi-partite problems, however, some of the sub-systems are often left unchanged and this is not reflected by the standard smoothing of information measures over a ball of close states. We propose to smooth instead only over a ball of close states which also have so…
▽ More
Smooth entropies are a tool for quantifying resource trade-offs in (quantum) information theory and cryptography. In typical bi- and multi-partite problems, however, some of the sub-systems are often left unchanged and this is not reflected by the standard smoothing of information measures over a ball of close states. We propose to smooth instead only over a ball of close states which also have some of the reduced states on the relevant sub-systems fixed. This partial smoothing of information measures naturally allows to give more refined characterizations of various information-theoretic problems in the one-shot setting. In particular, we immediately get asymptotic second-order characterizations for tasks such as privacy amplification against classical side information or classical state splitting. For quantum problems like state merging the general resource trade-off is tightly characterized by partially smoothed information measures as well.
△ Less
Submitted 23 August, 2018; v1 submitted 15 July, 2018;
originally announced July 2018.
-
On the near-optimality of one-shot classical communication over quantum channels
Authors:
Anurag Anshu,
Rahul Jain,
Naqueeb Ahmad Warsi
Abstract:
We study the problem of transmission of classical messages through a quantum channel in several network scenarios in the one-shot setting. We consider both the entanglement assisted and unassisted cases for the point to point quantum channel, quantum multiple-access channel, quantum channel with state and the quantum broadcast channel. We show that it is possible to near-optimally characterize the…
▽ More
We study the problem of transmission of classical messages through a quantum channel in several network scenarios in the one-shot setting. We consider both the entanglement assisted and unassisted cases for the point to point quantum channel, quantum multiple-access channel, quantum channel with state and the quantum broadcast channel. We show that it is possible to near-optimally characterize the amount of communication that can be transmitted in these scenarios, using the position-based decoding strategy introduced in a prior work [Anshu, Jain and Warsi, 2017]. In the process, we provide a short and elementary proof of the converse for entanglement-assisted quantum channel coding in terms of the quantum hypothesis testing divergence (obtained earlier in [Matthews and Wehner, 2014]). Our proof has the additional utility that it naturally extends to various network scenarios mentioned above. Furthermore, none of our achievability results require a simultaneous decoding strategy, existence of which is an important open question in quantum Shannon theory.
△ Less
Submitted 25 April, 2018;
originally announced April 2018.
-
Quantum state redistribution with local coherence
Authors:
Anurag Anshu,
Rahul Jain,
Alexander Streltsov
Abstract:
Quantum entanglement and coherence are two fundamental resources for quantum information processing. Recent results clearly demonstrate their relevance in quantum technological tasks, including quantum communication and quantum algorithms. In this Letter we study the role of quantum coherence for quantum state redistribution, a fundamental task where two parties aim to relocate a quantum particle…
▽ More
Quantum entanglement and coherence are two fundamental resources for quantum information processing. Recent results clearly demonstrate their relevance in quantum technological tasks, including quantum communication and quantum algorithms. In this Letter we study the role of quantum coherence for quantum state redistribution, a fundamental task where two parties aim to relocate a quantum particle by using a limited amount of quantum communication and shared entanglement. We provide general bounds for the resource rates required for this process, and show that these bounds are tight under additional reasonable constraints, including the situation where the receiving party cannot use local coherence. While entanglement cannot be directly converted into local coherence in our setting, we show that entanglement is still useful for local coherence creation if an additional quantum channel is provided, and the optimal protocol for local coherence creation for any given amount of quantum communication and shared entanglement is presented. We also discuss possible extensions of our methods to other scenarios where the receiving party is limited by local constraints, including theories of thermodynamics and asymmetry.
△ Less
Submitted 13 April, 2018;
originally announced April 2018.
-
Noisy quantum state redistribution with promise and the Alpha-bit
Authors:
Anurag Anshu,
Min-Hsiu Hsieh,
Rahul Jain
Abstract:
We consider a variation of the well-studied quantum state redistribution task, in which the starting state is known only to the receiver Bob and not to the sender Alice. We refer to this as quantum state redistribution with a one-sided promise. In addition, we consider communication from Alice to Bob over a noisy channel $\mathcal{N}$, instead of the noiseless channel, as is usually considered in…
▽ More
We consider a variation of the well-studied quantum state redistribution task, in which the starting state is known only to the receiver Bob and not to the sender Alice. We refer to this as quantum state redistribution with a one-sided promise. In addition, we consider communication from Alice to Bob over a noisy channel $\mathcal{N}$, instead of the noiseless channel, as is usually considered in state redistribution. We take a natural approach towards the solution of this problem where we "embed" the promise as part of the state and then invoke known protocols for quantum state redistribution composed with known protocols for transfer of quantum information over noisy channels. Using our approach, we are able to reproduce the Alpha-bit capacities with or without entanglement assistance in Ref. [ArXiv:1706.09434], using known protocols for quantum state redistribution and quantum communication over noisy channels. Furthermore, we generalize the entanglement assisted classical Alpha-bit capacity, showing that any quantum state redistribution protocol can be used as a black box to simulate classical communication.
△ Less
Submitted 19 May, 2021; v1 submitted 9 March, 2018;
originally announced March 2018.
-
Exact eigenfunction amplitude distributions of integrable quantum billiards
Authors:
Rhine Samajdar,
Sudhir R. Jain
Abstract:
The exact probability distributions of the amplitudes of eigenfunctions, $Ψ(x, y)$, of several integrable planar billiards are analytically calculated and shown to possess singularities at $Ψ= 0$; the nature of this singularity is shape-dependent. In particular, we prove that the distribution function for a rectangular quantum billiard is proportional to the complete elliptic integral,…
▽ More
The exact probability distributions of the amplitudes of eigenfunctions, $Ψ(x, y)$, of several integrable planar billiards are analytically calculated and shown to possess singularities at $Ψ= 0$; the nature of this singularity is shape-dependent. In particular, we prove that the distribution function for a rectangular quantum billiard is proportional to the complete elliptic integral, ${\bf K}(1 - Ψ^2)$, and demonstrate its universality, modulo a weak dependence on quantum numbers. On the other hand, we study the low-lying states of nonseparable, integrable triangular billiards and find the distributions thereof to be described by the Meijer G-function or certain hypergeometric functions. Our analysis captures a marked departure from the Gaussian distributions for chaotic billiards in its survey of the fluctuations of the eigenfunctions about $Ψ= 0$.
△ Less
Submitted 1 January, 2018;
originally announced January 2018.
-
The Avian Compass can be Sensitive even without Sustained Quantum Coherence
Authors:
Rakshit Jain,
Vishvendra Singh Poonia,
Kasturi Saha,
Dipankar Saha,
Swaroop Ganguly
Abstract:
Theoretical studies indicating the presence of long-lived coherence in the radical pair system have engendered questions about the utilitarian role of sustained coherence in the avian compass. In this manuscript, we investigate this for a realistic multi-nuclear radical pair system, along with the related question of its sensitivity to the geomagnetic field. Firstly, we find that sustenance of lon…
▽ More
Theoretical studies indicating the presence of long-lived coherence in the radical pair system have engendered questions about the utilitarian role of sustained coherence in the avian compass. In this manuscript, we investigate this for a realistic multi-nuclear radical pair system, along with the related question of its sensitivity to the geomagnetic field. Firstly, we find that sustenance of long-lived coherence is unlikely in a realistic hyperfine environment. Secondly, probing the role of the hyperfine interactions on the compass sensitivity, we establish the hyperfine anisotropy as an essential parameter for the sensitivity. Thereby, we are able to identify a parameter regime where the compass would exhibit sensitivity even without sustained coherence.
△ Less
Submitted 22 May, 2018; v1 submitted 13 December, 2017;
originally announced December 2017.
-
Nodal portraits of quantum billiards: Domains, lines, and statistics
Authors:
Sudhir R. Jain,
Rhine Samajdar
Abstract:
We present a comprehensive review of the nodal domains and lines of quantum billiards, emphasizing a quantitative comparison of theoretical findings to experiments. The nodal statistics are shown to distinguish not only between regular and chaotic classical dynamics but also between different geometric shapes of the billiard system itself. We discuss, in particular, how a random superposition of p…
▽ More
We present a comprehensive review of the nodal domains and lines of quantum billiards, emphasizing a quantitative comparison of theoretical findings to experiments. The nodal statistics are shown to distinguish not only between regular and chaotic classical dynamics but also between different geometric shapes of the billiard system itself. We discuss, in particular, how a random superposition of plane waves can model chaotic eigenfunctions and highlight the connections of the complex morphology of the nodal lines thereof to percolation theory and Schramm-Loewner evolution. Various approaches to counting the nodal domains---using trace formulae, graph theory, and difference equations---are also illustrated with examples. The nodal patterns addressed pertain to waves on vibrating plates and membranes, acoustic and electromagnetic modes, wavefunctions of a "particle in a box'" as well as to percolating clusters, and domains in ferromagnets, thus underlining the diversity---and far-reaching implications---of the problem.
△ Less
Submitted 11 September, 2017;
originally announced September 2017.
-
Quantifying resource in catalytic resource theory
Authors:
Anurag Anshu,
Min-Hsiu Hsieh,
Rahul Jain
Abstract:
We consider a general resource theory that allows the use of free resource as a catalyst. We show that the amount of `resource' contained in a given state, in the asymptotic scenario, is equal to the regularized relative entropy of resource of that state, which then yields a straightforward operational meaning to this quantity. Such an answer has been long sought for in any resource theory since t…
▽ More
We consider a general resource theory that allows the use of free resource as a catalyst. We show that the amount of `resource' contained in a given state, in the asymptotic scenario, is equal to the regularized relative entropy of resource of that state, which then yields a straightforward operational meaning to this quantity. Such an answer has been long sought for in any resource theory since the usefulness of a state in information-processing tasks is directly related to the amount of resource the state possesses in the beginning. While we need to place a few assumptions in our resource theoretical framework, it is still general enough and includes quantum resource theory of entanglement, coherence, asymmetry, non-uniformity, purity, contextuality, stabilizer computation and the classical resource theory of randomness extraction as special cases. Since our resource theoretic framework includes entanglement theory, our result also implies that the amount of noise one has to inject locally in order to erase all entanglement contained in an entangled state is equal to the regularized relative entropy of entanglement, resolving an open question posted in [Groisman et al., Phys. Rev. A. 72: 032317, 2005]. On the way to prove the main result, we also quantify the amount of resource contained in a state in the one-shot setting (where one only has a single copy of the state), in terms of the smooth max-relative entropy. Our one-shot result employs a recently developed technique of convex-split lemma.
△ Less
Submitted 6 August, 2017; v1 submitted 1 August, 2017;
originally announced August 2017.
-
A hypothesis testing approach for communication over entanglement assisted compound quantum channel
Authors:
Anurag Anshu,
Rahul Jain,
Naqueeb Ahmad Warsi
Abstract:
We study the problem of communication over a compound quantum channel in the presence of entanglement. Classically such channels are modeled as a collection of conditional probability distributions wherein neither the sender nor the receiver is aware of the channel being used for transmission, except for the fact that it belongs to this collection. We provide near optimal achievability and convers…
▽ More
We study the problem of communication over a compound quantum channel in the presence of entanglement. Classically such channels are modeled as a collection of conditional probability distributions wherein neither the sender nor the receiver is aware of the channel being used for transmission, except for the fact that it belongs to this collection. We provide near optimal achievability and converse bounds for this problem in the one-shot quantum setting in terms of quantum hypothesis testing divergence. We also consider the case of informed sender, showing a one-shot achievability result that converges appropriately in the asymptotic and i.i.d. setting. Our achievability proof is similar in spirit to its classical counterpart. To arrive at our result, we use the technique of position-based decoding along with a new approach for constructing a union of two projectors, which can be of independent interest. We give another application of the union of projectors to the problem of testing composite quantum hypotheses.
△ Less
Submitted 2 April, 2018; v1 submitted 26 June, 2017;
originally announced June 2017.
-
A generalized quantum Slepian-Wolf
Authors:
Anurag Anshu,
Rahul Jain,
Naqueeb Ahmad Warsi
Abstract:
In this work we consider a quantum generalization of the task considered by Slepian and Wolf [1973] regarding distributed source compression. In our task Alice, Bob, Charlie and Reference share a joint pure state. Alice and Bob wish to send a part of their respective systems to Charlie without collaborating with each other. We give achievability bounds for this task in the one-shot setting and pro…
▽ More
In this work we consider a quantum generalization of the task considered by Slepian and Wolf [1973] regarding distributed source compression. In our task Alice, Bob, Charlie and Reference share a joint pure state. Alice and Bob wish to send a part of their respective systems to Charlie without collaborating with each other. We give achievability bounds for this task in the one-shot setting and provide the asymptotic and i.i.d. analysis in the case when there is no side information with Charlie.
Our result implies the result of Abeyesinghe, Devetak, Hayden and Winter [2009] who studied a special case of this problem. As another special case wherein Bob holds trivial registers, we recover the result of Devetak and Yard [2008] regarding quantum state redistribution.
△ Less
Submitted 5 March, 2018; v1 submitted 29 March, 2017;
originally announced March 2017.
-
Raising and lowering operators for quantum billiards
Authors:
Ayush Kumar Mandwal,
Sudhir R. Jain
Abstract:
For planar integrable billiards, the eigenstates can be classified with respect to a quantity determined by the quantum numbers. Given the quantum numbers as $m, n$, the index which represents a class is $c = m\, \mbox{mod}\, k\,n$ for a natural number, $k$. We show here that the entire tower of states can be generated from an initially given state by application of the operators introduced here.…
▽ More
For planar integrable billiards, the eigenstates can be classified with respect to a quantity determined by the quantum numbers. Given the quantum numbers as $m, n$, the index which represents a class is $c = m\, \mbox{mod}\, k\,n$ for a natural number, $k$. We show here that the entire tower of states can be generated from an initially given state by application of the operators introduced here. Thus, these operators play the same role for billiards as raising and lowering operators in angular momentum algebra.
△ Less
Submitted 22 March, 2017;
originally announced March 2017.
-
Lifting randomized query complexity to randomized communication complexity
Authors:
Anurag Anshu,
Naresh B. Goud,
Rahul Jain,
Srijita Kundu,
Priyanka Mukhopadhyay
Abstract:
We show that for a relation $f\subseteq \{0,1\}^n\times \mathcal{O}$ and a function $g:\{0,1\}^{m}\times \{0,1\}^{m} \rightarrow \{0,1\}$ (with $m= O(\log n)$), $$\mathrm{R}_{1/3}(f\circ g^n) = Ω\left(\mathrm{R}_{1/3}(f) \cdot \left(\log\frac{1}{\mathrm{disc}(M_g)} - O(\log n)\right)\right),$$ where $f\circ g^n$ represents the composition of $f$ and $g^n$, $M_g$ is the sign matrix for $g$,…
▽ More
We show that for a relation $f\subseteq \{0,1\}^n\times \mathcal{O}$ and a function $g:\{0,1\}^{m}\times \{0,1\}^{m} \rightarrow \{0,1\}$ (with $m= O(\log n)$), $$\mathrm{R}_{1/3}(f\circ g^n) = Ω\left(\mathrm{R}_{1/3}(f) \cdot \left(\log\frac{1}{\mathrm{disc}(M_g)} - O(\log n)\right)\right),$$ where $f\circ g^n$ represents the composition of $f$ and $g^n$, $M_g$ is the sign matrix for $g$, $\mathrm{disc}(M_g)$ is the discrepancy of $M_g$ under the uniform distribution and $\mathrm{R}_{1/3}(f)$ ($\mathrm{R}_{1/3}(f\circ g^n)$) denotes the randomized query complexity of $f$ (randomized communication complexity of $f\circ g^n$) with worst case error $\frac{1}{3}$.
In particular, this implies that for a relation $f\subseteq \{0,1\}^n\times \mathcal{O}$, $$\mathrm{R}_{1/3}(f\circ \mathrm{IP}_m^n) = Ω\left(\mathrm{R}_{1/3}(f) \cdot m\right),$$ where $\mathrm{IP}_m:\{0,1\}^m\times \{0,1\}^m\rightarrow \{0,1\}$ is the Inner Product (modulo $2$) function and $m= O(\log(n))$.
△ Less
Submitted 20 January, 2018; v1 submitted 22 March, 2017;
originally announced March 2017.
-
Parallel Device-Independent Quantum Key Distribution
Authors:
Rahul Jain,
Carl A. Miller,
Yaoyun Shi
Abstract:
A prominent application of quantum cryptography is the distribution of cryptographic keys that are provably secure. Recently, such security proofs were extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subseq…
▽ More
A prominent application of quantum cryptography is the distribution of cryptographic keys that are provably secure. Recently, such security proofs were extended by Vazirani and Vidick (Physical Review Letters, 113, 140501, 2014) to the device-independent (DI) scenario, where the users do not need to trust the integrity of the underlying quantum devices. The protocols analyzed by them and by subsequent authors all require a sequential execution of N multiplayer games, where N is the security parameter. In this work, we prove unconditional security of a protocol where all games are executed in parallel. Besides decreasing the number of time-steps necessary for key generation, this result reduces the security requirements for DI-QKD by allowing arbitrary information leakage of each user's inputs within his or her lab. To the best of our knowledge, this is the first parallel security proof for a fully device-independent QKD protocol. Our protocol tolerates a constant level of device imprecision and achieves a linear key rate.
△ Less
Submitted 7 May, 2018; v1 submitted 15 March, 2017;
originally announced March 2017.
-
Noncyclic geometric phases and helicity transitions for neutrino oscillations in a magnetic field
Authors:
Sandeep Joshi,
Sudhir R. Jain
Abstract:
We show that neutrino spin and spin-flavor transitions involve nonvanishing geometric phases. The geometric character of neutrino spin rotation is explored by studying the neutrino spin trajectory in the projective Hilbert space representation and its relation to the geometric phase. Analytical expressions are derived for noncyclic geometric phases. Several calculations are performed for different…
▽ More
We show that neutrino spin and spin-flavor transitions involve nonvanishing geometric phases. The geometric character of neutrino spin rotation is explored by studying the neutrino spin trajectory in the projective Hilbert space representation and its relation to the geometric phase. Analytical expressions are derived for noncyclic geometric phases. Several calculations are performed for different cases of rotating and nonrotating magnetic fields in the context of solar neutrinos and neutrinos produced inside neutron stars. Also the effects of adiabaticity, critical magnetic fields and cross boundary effects in the case of neutrinos emanating out of neutron stars are examined.
△ Less
Submitted 3 November, 2017; v1 submitted 15 March, 2017;
originally announced March 2017.
-
Convex-split and hypothesis testing approach to one-shot quantum measurement compression and randomness extraction
Authors:
Anurag Anshu,
Rahul Jain,
Naqueeb Ahmad Warsi
Abstract:
We consider the problem of quantum measurement compression with side information in the one-shot setting with shared randomness. In this problem, Alice shares a pure state with Reference and Bob and she performs a measurement on her registers. She wishes to communicate the outcome of this measurement to Bob using shared randomness and classical communication, in such a way that the outcome that Bo…
▽ More
We consider the problem of quantum measurement compression with side information in the one-shot setting with shared randomness. In this problem, Alice shares a pure state with Reference and Bob and she performs a measurement on her registers. She wishes to communicate the outcome of this measurement to Bob using shared randomness and classical communication, in such a way that the outcome that Bob receives is correctly correlated with Reference and Bob's own registers. Our goal is to simultaneously minimize the classical communication and randomness cost. We provide a protocol based on convex-split and position based decoding with its communication upper bounded in terms of smooth max and hypothesis testing relative entropies.
We also study the randomness cost of our protocol in both one-shot and asymptotic and i.i.d. setting. By generalizing the convex-split technique to incorporate pair-wise independent random variables, we show that our one shot protocol requires small number of bits of shared randomness. This allows us to construct a new protocol in the asymptotic and i.i.d. setting, which is optimal in both the number of bits of communication and the number of bits of shared randomness required.
We construct a new protocol for the task of strong randomness extraction in the presence of quantum side information. Our protocol achieves error guarantee in terms of relative entropy (as opposed to trace distance) and extracts close to optimal number of uniform bits. As an application, we provide new achievability result for the task of quantum measurement compression without feedback, in which Alice does not need to know the outcome of the measurement. This leads to the optimal number of bits communicated and number of bits of shared randomness required, for this task in the asymptotic and i.i.d. setting.
△ Less
Submitted 19 June, 2018; v1 submitted 7 March, 2017;
originally announced March 2017.
-
A one-shot achievability result for quantum state redistribution
Authors:
Anurag Anshu,
Rahul Jain,
Naqueeb Ahmad Warsi
Abstract:
We study the problem of entanglement-assisted quantum state redistribution in the one-shot setting and provide a new achievability result on the quantum communication required. Our bounds are in terms of the max-relative entropy and the hypothesis testing relative entropy. We use the techniques of convex split and position-based decoding to arrive at our result. We show that our result is upper bo…
▽ More
We study the problem of entanglement-assisted quantum state redistribution in the one-shot setting and provide a new achievability result on the quantum communication required. Our bounds are in terms of the max-relative entropy and the hypothesis testing relative entropy. We use the techniques of convex split and position-based decoding to arrive at our result. We show that our result is upper bounded by the result obtained in Berta, Christandl, Touchette (2016).
△ Less
Submitted 5 March, 2018; v1 submitted 8 February, 2017;
originally announced February 2017.
-
One shot entanglement assisted classical and quantum communication over noisy quantum channels: A hypothesis testing and convex split approach
Authors:
Anurag Anshu,
Rahul Jain,
Naqueeb Ahmad Warsi
Abstract:
Capacity of a quantum channel characterizes the limits of reliable communication through a noisy quantum channel. This fundamental information theoretic question is very well studied specially in the setting of many independent uses of the channel. An important scenario, both from practical and conceptual point of view, is when the channel can be used only once. This is known as the one-shot chann…
▽ More
Capacity of a quantum channel characterizes the limits of reliable communication through a noisy quantum channel. This fundamental information theoretic question is very well studied specially in the setting of many independent uses of the channel. An important scenario, both from practical and conceptual point of view, is when the channel can be used only once. This is known as the one-shot channel coding problem. We provide a tight characterization of the one-shot entanglement assisted classical capacity of a quantum channel. We arrive at our result by introducing a simple decoding technique which we refer to as position-based decoding. We also consider two other important quantum network scenarios: quantum channel with a jammer and quantum broadcast channel. For these problems, we use the recently introduced convex split technique [Anshu, Devabathini and Jain 2014] in addition to position based decoding. Our approach exhibits that the simultaneous use of these two techniques provides a uniform and conceptually simple framework for designing communication protocols for quantum networks.
△ Less
Submitted 9 November, 2017; v1 submitted 7 February, 2017;
originally announced February 2017.
-
Separating quantum communication and approximate rank
Authors:
Anurag Anshu,
Shalev Ben-David,
Ankit Garg,
Rahul Jain,
Robin Kothari,
Troy Lee
Abstract:
One of the best lower bound methods for the quantum communication complexity of a function H (with or without shared entanglement) is the logarithm of the approximate rank of the communication matrix of H. This measure is essentially equivalent to the approximate gamma_2 norm and generalized discrepancy, and subsumes several other lower bounds. All known lower bounds on quantum communication compl…
▽ More
One of the best lower bound methods for the quantum communication complexity of a function H (with or without shared entanglement) is the logarithm of the approximate rank of the communication matrix of H. This measure is essentially equivalent to the approximate gamma_2 norm and generalized discrepancy, and subsumes several other lower bounds. All known lower bounds on quantum communication complexity in the general unbounded-round model can be shown via the logarithm of approximate rank, and it was an open problem to give any separation at all between quantum communication complexity and the logarithm of the approximate rank.
In this work we provide the first such separation: We exhibit a total function H with quantum communication complexity almost quadratically larger than the logarithm of its approximate rank. We construct H using the communication lookup function framework of Anshu et al. (FOCS 2016) based on the cheat sheet framework of Aaronson et al. (STOC 2016). From a starting function F, this framework defines a new function H=F_G. Our main technical result is a lower bound on the quantum communication complexity of F_G in terms of the discrepancy of F, which we do via quantum information theoretic arguments. We show the upper bound on the approximate rank of F_G by relating it to the Boolean circuit size of the starting function F.
△ Less
Submitted 17 November, 2016;
originally announced November 2016.
-
Truncated Calogero-Sutherland Models on a Circle
Authors:
Tarun R. Tummuru,
Sudhir R. Jain,
Avinash Khare
Abstract:
We investigate a quantum many-body system with particles moving on a circle and subject to two-body and three-body potentials. In this new class of models, that extrapolates from the celebrated Calogero-Sutherland model and a system with interactions among nearest and next-to-nearest neighbors, the interactions can be tuned as a function of range. We determine the exact ground state energy and wav…
▽ More
We investigate a quantum many-body system with particles moving on a circle and subject to two-body and three-body potentials. In this new class of models, that extrapolates from the celebrated Calogero-Sutherland model and a system with interactions among nearest and next-to-nearest neighbors, the interactions can be tuned as a function of range. We determine the exact ground state energy and wavefunction and obtain a part of the excitation spectrum.
△ Less
Submitted 26 September, 2016;
originally announced September 2016.
-
Separations in communication complexity using cheat sheets and information complexity
Authors:
Anurag Anshu,
Aleksandrs Belovs,
Shalev Ben-David,
Mika Göös,
Rahul Jain,
Robin Kothari,
Troy Lee,
Miklos Santha
Abstract:
While exponential separations are known between quantum and randomized communication complexity for partial functions (Raz, STOC 1999), the best known separation between these measures for a total function is quadratic, witnessed by the disjointness function. We give the first super-quadratic separation between quantum and randomized communication complexity for a total function, giving an example…
▽ More
While exponential separations are known between quantum and randomized communication complexity for partial functions (Raz, STOC 1999), the best known separation between these measures for a total function is quadratic, witnessed by the disjointness function. We give the first super-quadratic separation between quantum and randomized communication complexity for a total function, giving an example exhibiting a power 2.5 gap. We further present a 1.5 power separation between exact quantum and randomized communication complexity, improving on the previous ~1.15 separation by Ambainis (STOC 2013). Finally, we present a nearly optimal quadratic separation between randomized communication complexity and the logarithm of the partition number, improving upon the previous best power 1.5 separation due to Göös, Jayram, Pitassi, and Watson.
Our results are the communication analogues of separations in query complexity proved using the recent cheat sheet framework of Aaronson, Ben-David, and Kothari (STOC 2016). Our main technical results are randomized communication and information complexity lower bounds for a family of functions, called lookup functions, that generalize and port the cheat sheet framework to communication complexity.
△ Less
Submitted 15 August, 2016; v1 submitted 4 May, 2016;
originally announced May 2016.
-
A difference-equation formalism for the nodal domains of separable billiards
Authors:
Naren Manjunath,
Rhine Samajdar,
Sudhir R. Jain
Abstract:
Recently, the nodal domain counts of planar, integrable billiards with Dirichlet boundary conditions were shown to satisfy certain difference equations in [Ann. Phys. 351, 1-12 (2014)]. The exact solutions of these equations give the number of domains explicitly. For complete generality, we demonstrate this novel formulation for three additional separable systems and thus extend the statement to a…
▽ More
Recently, the nodal domain counts of planar, integrable billiards with Dirichlet boundary conditions were shown to satisfy certain difference equations in [Ann. Phys. 351, 1-12 (2014)]. The exact solutions of these equations give the number of domains explicitly. For complete generality, we demonstrate this novel formulation for three additional separable systems and thus extend the statement to all integrable billiards.
△ Less
Submitted 22 April, 2016;
originally announced April 2016.