Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Absolute Maximal Entanglement and Quantum Secret Sharing

2012

Absolute Maximal Entanglement and Quantum Secret Sharing Wolfram Helwig,1 Wei Cui,1 José Ignacio Latorre,2 Arnau Riera,3, 4 and Hoi-Kwong Lo1 arXiv:1204.2289v1 [quant-ph] 10 Apr 2012 1 Center for Quantum Information and Quantum Control (CQIQC), Department of Physics and Department of Electrical & Computer Engineering, University of Toronto, Toronto, Ontario, M5S 3G4, Canada 2 Dept. d’Estructura i Constituents de la Matèria, Universitat de Barcelona, 647 Diagonal, 08028 Barcelona, Spain 3 Max Planck Institute for Gravitational Physics, Albert Einstein Institute, Am Mühlenberg 1, D-14476 Golm, Germany 4 Dahlem Center for Complex Quantum Systems, Freie Universität Berlin, 14195 Berlin, Germany (Dated: April 12, 2012) We study the existence of absolutely maximally entangled (AME) states in quantum mechanics and its applications to quantum information. AME states are characterized by being maximally entangled for all bipartitions of the system and exhibit genuine multipartite entanglement. With such states, we present a novel parallel teleportation protocol which teleports multiple quantum states between groups of senders and receivers. The notable features of this protocol are that (i) the partition into senders and receivers can be chosen after the state has been distributed, and (ii) one group has to perform joint quantum operations while the parties of the other group only have to act locally on their system. We also prove the equivalence between pure state quantum secret sharing schemes and AME states with an even number of parties. This equivalence implies the existence of AME states for an arbitrary number of parties based on known results about the existence of quantum secret sharing schemes. PACS numbers: Introduction. Entanglement is at the core of the power of quantum information processing and has been extensively studied for few qubits. The classification of entanglement classes for three and four qubits is well understood [1–7] and canonical forms of pure states under local unitary transformations of each local Hilbert space have also been analyzed [6, 8, 9]. As the number of local quantum degrees of freedom increases, our understanding of entanglement gets poorer. The number of independent invariants that classify entanglement grows exponentially and it is unclear which purpose each category of entanglement serves [10, 11]. In recent years, there has been an important progress in the classification of the maximally multipartite entangled states composed of qubits [7, 12–15]. Nevertheless, a complete understanding of the structure, classification and usefulness of quantum states with the largest possible entanglement for arbitrary dimension is still missing. Another motivation for studying multipartite entanglement is its connection to other apparently unrelated areas of physics, like string theory and black-holes [16, 17]. Quantum teleportation is one of the most intriguing utilizations of entanglement. It allows distant parties, who share a resource of entanglement, to transport a quantum state from one party to the other by only exchanging classical information and using up said entanglement. The first proposal of such a protocol used the resource of bipartite entanglement between two parties [18]. Later teleportation protocols using genuine multipartite entanglement between more than two parties were proposed theoretically for four qubit entanglement [19], and experimentally in the form of open-destination teleportation for five qubits [20]. This manuscript is devoted to initiate the study of a class of states with genuine multipartite entanglement. These states, which we call absolutely maximally entangled (AME) states, are defined as having the strict maximal entanglement in all bipartitions of the system. Up until now, AME states have been thought to be a rather limited concept, because only few AME states exist for qubits [21], specifically no AME states exist for four, or eight and more qubits [15, 22]. In this work, we consider the qudit problem, and show that AME states exist for any number of parties by choosing an appropriate qudit dimension. The fact that AME states contain maximal entanglement makes them the natural candidates to implement novel multipartite communication protocols. Indeed, we shall here show how they can be used to implement novel parallel teleportation scenarios that postpone the choice of senders and receivers until after the state has been distributed. These protocols require that either the senders or receivers perform joint quantum operations, while the respective other parties only have to act locally on their systems. We further establish a one-to-one correspondence between pure state quantum secret sharing (QSS) schemes [23, 24] and even-party AME states, which also proves the existence of AME states for any number of parties given an appropriate choice of the system dimensions. This follows from the existence of pure state QSS schemes for any odd number of parties [23]. It should be mentioned that, while our parallel teleportation protocol is different from the aforementioned open-destination teleportation, it is also possible to implement open-destination teleportation with AME states [25]. Definition of AME states. An AME(n, d) state (absolutely maximally entangled state) of n qudits of dimension d, |ψi ∈ C⊗n d , is a pure state for which every bipartition of the system into the sets B and A, with m = |B| ≤ |A| = n − m, is strictly maximally entangled such that S(ρB ) = m log2 d . (1) Consequently, every partition of m local degrees of freedom 2 is represented by a reduced density matrix proportional to the identity ρB = T rA |ψihψ| = 1 Idm , dm 1≤m≤ n . 2 A A B B (2) In practice, todetect an AME state it is sufficient to check that n all the bn/2c possible bipartitions of bn/2c qudits are maximally entangled, since all subsequent traces of the identity matrix are again identity matrices. A state is an AME state iff it can be written as 1 X |k1 iB1 · · · |km iBm |φ(k)iA , (3) |AMEi = √ dm k∈Zm FIG. 1: Parallel Teleportation scenarios of Theorem 1. Scenario (i) is on the left, and (ii) on the right. Parties in A perform joint quantum operations, parties in B only local quantum operations. d with hφ(k)|φ(k 0 )i = δkk0 , for every partition into m = |B| ≤ |A| = n − m disjoint sets B and A. Two obvious examples of AME states are the EinsteinRosen-Podolsky (EPR) and the Greenberger-Horne-Zeilinger (GHZ) states for two and three qubits, respectively. In both cases, the entanglement entropy is maximal for all their partitions. It has been proven that there are no absolutely maximally entangled states for four qubits [15]. AME states exist for five and six qubits [26], and a possible form for them will be given later in Example 1. No AME states exist for eight or more qubits [15, 22]. The existence of an AME(7, 2) state is still an open question, but it has been conjectured in Ref [26] that no such state exists. By increasing the party dimension, AME states can be found for these cases in which no qubit AME states exist. We remark, however, that, although we will show that for each n, AME(n, d) states exist for some appropriate choice of d, finding the conditions for the existence of AME(n,d) states, depending on n and d, is generally a nontrivial problem. In a future publication [25], we will show that, interestingly, a special class of AME states can be constructed from certain classical error correcting codes, namely those that satisfy the singleton bound [27]. Parallel Teleportation. The maximal entanglement property of an AME(n, d) state for any bipartition into the sets A and B can be used to teleport quantum states between those two sets. In contrast to the teleportation scenario where A and B share a maximally entangled state that is not an AME state, in the AME scenario the sets A and B do not have to be specified when the state is created, but instead can be chosen after the AME state has been distributed. There are essentially three different ways in which the teleportation can be performed, depending on which parties can perform joint quantum operations, and which are separated and only able to perform local operations on their own quantum systems. In the first case, the parties within each set, A and B, are able to perform joint quantum operations. A standard teleportation of an arbitrary dm -dimensional state, where m = min(|A|, |B|), can be performed in either direction. In the second case, the sending parties A can perform a joint quantum operation, but the parties in B are only able to perform local quantum operations. Additionally we require m = |B| ≤ |A| = n − m. Then one qudit can be teleported from A to each of the parties in B, and thus in total m qudits are teleported from A to B. This is illustrated in the left hand side of Figure 1. In the third and probably the most interesting case, the sending parties can only perform local operations, but the receiving parties can perform joint quantum operations. In this case, a teleportation is possible if the number of receiving parties is larger or equal n/2. Hence, sticking to our convention m = |B| ≤ |A|, we now consider a teleportation from B to A. See the right hand side of Figure 1 for an illustration. The first scenario is just a straightforward teleportation between maximally entangled parties. The second and third scenarios are presented in the following theorem. Theorem 1. Given an AME(n, d) state, and a bipartition of the n parties into the sets A and B such that m = |B| ≤ |A| = n − m, then the following two parallel teleportation scenarios are possible (i) A can teleport one qudit to each party in B by performing a joint quantum operation and communicating two classical “dits" to each party in B. Each party in B can then locally recover their respective qudit with a local operation. (ii) Each party in B can locally teleport one qudit to A. After receiving the measurement outcomes, consisting of two “dits” of classical information from each party in B, the parties in A are able to recover all m qudits by performing a joint quantum operation. Proof. In both scenarios the parties in set A perform a joint quantum operation to transform the AME state into m ddimensional EPR pairs. Then these pairs are used to teleport m qudits from the sending to the receiving parties. This is done by performing the joint unitary operation UA |φ(k)iA = |k1 iA1 · · · |km iAm |0iA0 . (4) on the initial AME(n, d) state 1 X |k1 iB1 · · · |km iBm |φ(k)iA , |Φi = √ dm k∈Zm d (5) 3 with hφ(k)|φ(k 0 )i = δkk0 . This results in the state UA |Φi = |ΨiB1 A1 · · · |ΨiBm Am |0iA0 , D (6) P where |Ψi = |ii |ii are d-dimensional EPR pairs. These EPR pairs can now be used to teleport a qudit from Ai to Bi in case (i) (Bi to Ai in case (ii)). This requires Ai (Bi ) to perform a generalized Bell measurement on her qudit and the qudit she wants to teleport, and communicate the measurement result to Bi (Ai ). This amounts to sending the classical information of two “dits" for each EPR pair. Upon reception of the measurement result, Bi (Ai ) can recover the teleported qudit by performing an appropriate unitary on his qudit. Quantum Secret Sharing. The last teleportation scenario suggests a close relationship between AME states and quantum secret sharing (QSS) schemes [23]. In a QSS protocol [23, 24], a dealer encodes a secret S in a quantum state that is shared among n players in such a way that only special subsets of players are able to recover the secret. The set of all subsets that are able to recover the secret form the access structure and the set of all subsets that can gain no information about the secret form the adversary structure. If the encoded state is a pure state, we call it a pure state QSS scheme. We are only interested in pure state QSS schemes here. Additionally, we restrict our attention to threshold QSS schemes [23], which means that the access structure is formed by all sets that contain k or more number of parties, while any set with less than k parties cannot obtain any information about the secret. Thus k is the threshold number of parties required to recover the secret. Such a QSS scheme is denoted as a ((k, n)) threshold QSS scheme. For pure state threshold QSS schemes, n and k are always related by n = 2k − 1. To see the relation between AME states and threshold QSS schemes, we consider an AME(2m, d) state with an even number of parties and divide the parties into two sets A = {A1 , . . . , Am } and B = {D, B1 , . . . , Bm−1 } of equal size m. In set B we have singled out one party D, which will act as the dealer of the QSS scheme. Now we perform the protocol of Theorem 1 (ii), but only D ∈ B performs the final teleportation operation. Also note that the unitary operation in Equation (4) and the Bell measurement by the dealer commute. Thus, D can first perform her Bell measurement, effectively encoding the teleported qudit onto the residual AME state, from which it can be recovered by the players in A. Furthermore, instead of the bipartition into the sets A and B, we could have equally well chosen any other bipartition into two sets A0 and B 0 of cardinality m with D ∈ B 0 . Then, without changing the operations that D has to perform, the parties in A0 are able to recover the teleported qudit (see Figure 2 for an illustration). Thus, any set of at least m of the residual 2m − 1 parties without D can recover the teleported state, given that the measurement outcome is broadcasted to all parties. Furthermore, the no-cloning theorem guarantees that any set of less than m players cannot gain any information about the state [24]. D D B/D A0 A A00 B 0/D B 00/D FIG. 2: (Color online) After D (blue) performs her teleportation operation, any set of m parties (red), A, A0 , A00 etc., can recover the teleported state. Any set of parties with m − 1 or less parties (any set consisting only of green parties) cannot gain any information about the teleported state. Hence we accomplished to construct a ((m, 2m − 1)) threshold QSS scheme from an AME(2m, d) state. Before stating the theorem that formulates this observation concisely, we shortly review how P a QSS protocol works. A secretPof dimension d, |Si = ai |ii, is encoded into the state ai |Φi i which is shared by the players such that each authorized set can deterministically recover |Si from its reduced state, while the reduced state of unauthorized sets is independent of the encoded secret. We call |Φi i the basis states of the QSS scheme, and we show in [25] that they are AME states for pure state threshold QSS schemes with equal share and dimension size. Theorem 2. There is a one to one correspondence between an AME(2m, d) state and a pure state ((m, 2m − 1)) threshold QSS scheme, whose share and secret dimensions are d. Proof. AME to QSS: For any bipartition into parties A = {A1 , . . . , Am } and B = {D, B1 , . . . , Bm−1 }, the AME(2m, d) states has the form 1 |Φi = √ dm X (i,k)∈Zm d |iiD |k1 iB1 · · · |km−1 iBm−1 |φ(i, k)iA , with hφ(k, i)|φ(k 0 , j)i = δkk0 δij . We define the QSS basis states √ |Φi i = d Dhi|Φi X 1 =√ |k1 · · · km−1 iB |φ(k, i)iA . (7) dm−1 m−1 k∈Zd A secret encoded as |ai = X ai |ii → X ai |Φi i , (8) satisfies the requirement of a threshold QSS scheme, because the parties B have a completely mixed states, independent of the encoded secret. Additionally, the set A, which can be chosen to be any set of n players, can restore the secret |ai by performing the joint unitary operation UA |φ(k, i)iA = |k1 iA1 · · · |km−1 iAm−1 |iiAm . (9) 4 QSS to AME: For any bipartition into m authorized parties A = {A1 , . . . , Am } and m − 1 unauthorized parties B = {B1 , . . . , Bm−1 }, the AME basis states of the QSS scheme can be written in the form |Φi i = √ 1 X dm−1 m−1 k∈Zd |k1 iB1 · · · |km−1 iBm−1 |φ(k, i)iA , where hφ(k, i)|φ(k , i)i = δkk0 , because the states are AME states, and hφ(k, i)|φ(k, j)i = δij , because the authorized parties can recover the secret deterministically. Thus, (10) From these basis states, define the state 1 X |ii |Φi i |Φi = √ d i∈Zd X 1 =√ |iiD |k1 iB1 · · · |km−1 iBm−1 |φ(k, i)i . dm (i,k)∈Zm d Because of Equation (10), |Φi is a maximally entangled state with respect to the bipartition B ∪ {D} vs. A. Since the original bipartition into A and B was arbitrary, |Φi is maximally entangled with respect to any bipartition into two cardinality m sets and thus is an AME(2m, d) state. Since it is known that ((m, 2m−1)) threshold QSS scheme exist for any number of m and an appropriate choice of d [23], Theorem 2 proves the existence of AME states for any number of parties. Example 1. In this example, we show how the five qubit code can be used to construct AME(5, 2) and AME(6, 2) states. From the five qubit code a ((3, 5)) threshold QSS scheme can be constructed [23]. The corresponding basis states are |0L i = 1 ( |00000i + |10010i + |01001i + |10100i 4 + |01010i − |11011i − |00110i − |11000i 1 |Φi = √ [|0i |0L i + |1i |1L i] 2 1 = [|000i (|+ − +i + |− + −i) 4 + |001i (− |+ − −i + |− + +i) + |010i (|+ + −i − |− − +i) 0 hφ(k, i)|φ(k 0 , j)i = δkk0 δij . receipe of Theorem 2, we obtain the AME(6, 2) state (11) − |11101i − |00011i − |11110i − |01111i − |10001i − |01100i − |10111i + |00101i), 1 |1L i = ( |11111i + |01101i + |10110i + |01011i 4 + |10101i − |00100i − |11001i − |00111i (12) − |00010i − |11100i − |00001i − |10000i − |01110i − |10011i − |01000i + |11010i). These states are AME(5, 2) states as required. Following the (13) + |011i (− |+ + +i − |− − −i) + |100i (− |+ + +i + |− − −i) + |101i (− |+ + −i − |− − +i) + |110i (− |+ − −i − |− + +i) + |111i (− |+ − +i + |− + −i)]. Conclusion. In this manuscript, we have introduced AME states, a class of highly entangled states, for n qudits shared among n locally separated parties. Previous investigations of maximal entanglement showed that AME states do not exist when the number of qubits is eight or larger. Here we proved the existence of AME states for any number of parties with the appropriate qudit dimension. Moreover, we have shown how they can be utilized in different parallel teleportation scenarios, which require some parties to perform joint quantum operations, while others’ capabilities may be restricted to local operations. In those scenarios the advantage of AME states over less entangled states like a collection of EPR pairs lies in the fact that the partition into senders and receivers may be chosen after the state has been distributed. Furthermore, we have investigated the relationship of AME states with QSS schemes and established a one-to-one correspondence between even party AME states and pure state threshold QSS schemes. This correspondence allows us to prove the existence of AME states for any number of parties with the appropriate dimension. In future work we further explore this very intuitive approach to develop new communication protocols from AME states as well as extending the range of QSS schemes that can be derived from AME states. For instance, instead of assigning the role of the dealer to only one of the parties in the AME state, we can imagine multiple dealers who encode independent secrets onto the residual AME states, resulting in QSS schemes with more involved access structures. The established connection to QSS schemes also confirms a relation between AME states and quantum error correction codes that was already suggested in Ref. [28]. A better understanding of this relation will allow us to construct new quantum error correction codes from AME states as well as deriving AME states from already known quantum codes. This might also shed light upon the open question of existence of AME states for a given number of parties and system dimension. Acknowledgments. W.H., W.C., and H.K.L. acknowledge financial support from funding agencies including NSERC, Quantum-Works, the CRC program and CIFAR. J.I.L. and A.R. acknowledge financial support from MICIN (Spain) and Grup consolidat (Generalitat de Catalunya). We would also 5 like to thank David Gosset and Sandu Popescu for very helpful comments. [1] W. Dür, G. Vidal, and J. I. Cirac, Phys. Rev. A 62, 062314 (2000). [2] F. Verstraete, J. Dehaene, B. De Moor, and H. Verschelde, Phys. Rev. A 65, 052112 (2002). [3] A. Higuchi and A. Sudbery, Physics Letters A 273, 213 (2000), ISSN 0375-9601. [4] P. Lévay, Journal of Physics A: Mathematical and General 39, 9533 (2006). [5] J.-G. Luque and J.-Y. Thibon, Phys. Rev. A 67, 042303 (2003). [6] A. Acín, A. Andrianov, L. Costa, E. Jané, J. I. Latorre, and R. Tarrach, Phys. Rev. Lett. 85, 1560 (2000). [7] S. Brierley and A. Higuchi, J. Phys. A 40, 8455 (2007). [8] B. Kraus, Phys. Rev. Lett. 104, 020504 (2010). [9] B. Kraus, Phys. Rev. A 82, 032121 (2010). [10] A. Miyake and M. Wadati, Quant. Inf. & Comp. 2, 540 (2002). [11] I. Gelfand, M. Kapranov, and A. Zelevinsky, Discriminants, Resultants and Multidimensional Determinants (Birkhauser, 1994). [12] A. Osterloh and J. Siewert, Int. J. Quant. Inf. 4, 531 (2006). [13] I. D. K. Brown, S. Stepney, A. Sudbery, and S. L. Braunstein, Journal of Physics A: Mathematical and General 38, 1119 (2005). View publication stats [14] P. Facchi, G. Florio, G. Parisi, and S. Pascazio, Phys. Rev. A 77, 060304 (2008). [15] G. Gour and N. R. Wallach, Journal of Mathematical Physics 51, 112201 (2010). [16] L. Borsten, D. Dahanayake, M. J. Duff, A. Marrani, and W. Rubens, Phys. Rev. Lett. 105, 100507 (2010). [17] L. Borsten, M. Duff, A. Marrani, and W. Rubens, The European Physical Journal Plus 126, 1 (2011). [18] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and W. K. Wootters, Phys. Rev. Lett. 70, 1895 (1993). [19] Y. Yeo and W. K. Chua, Phys. Rev. Lett. 96, 060502 (2006). [20] Z. Zhao, Y.-A. Chen, A.-N. Zhang, T. Yang, H. J. Briegel, and J.-W. Pan, Nature 430, 54 (2004). [21] H.-K. Lo thanks Sandu Popescu for an englightening discussion many years ago. [22] E. M. Rains, Information theory, IEEE Transactions on 45, 266 (1999). [23] R. Cleve, D. Gottesman, and H.-K. Lo, Phys. Rev. Lett. 83, 648 (1999). [24] D. Gottesman, Phys. Rev. A 61, 042311 (2000). [25] W. Helwig, W. Cui, J. I. Latorre, A. Riera, and H.-K. Lo (in preparation). [26] A. Borras, A. R. Plastino, J. Batle, C. Zander, M. Casas, and A. Plastino, J. Phys. A 40, 13407 (2007). [27] F. MacWilliams and N. Sloane, The Theory of Error-Correcting Codes (North Holland Publishing Co., 1977). [28] A. J. Scott, Phys. Rev. A 69, 052330 (2004).