Absolute Maximal Entanglement and Quantum Secret Sharing
Wolfram Helwig,1 Wei Cui,1 José Ignacio Latorre,2 Arnau Riera,3, 4 and Hoi-Kwong Lo1
arXiv:1204.2289v1 [quant-ph] 10 Apr 2012
1
Center for Quantum Information and Quantum Control (CQIQC),
Department of Physics and Department of Electrical & Computer Engineering,
University of Toronto, Toronto, Ontario, M5S 3G4, Canada
2
Dept. d’Estructura i Constituents de la Matèria, Universitat de Barcelona, 647 Diagonal, 08028 Barcelona, Spain
3
Max Planck Institute for Gravitational Physics, Albert Einstein Institute, Am Mühlenberg 1, D-14476 Golm, Germany
4
Dahlem Center for Complex Quantum Systems, Freie Universität Berlin, 14195 Berlin, Germany
(Dated: April 12, 2012)
We study the existence of absolutely maximally entangled (AME) states in quantum mechanics and its applications to quantum information. AME states are characterized by being maximally entangled for all bipartitions
of the system and exhibit genuine multipartite entanglement. With such states, we present a novel parallel
teleportation protocol which teleports multiple quantum states between groups of senders and receivers. The
notable features of this protocol are that (i) the partition into senders and receivers can be chosen after the state
has been distributed, and (ii) one group has to perform joint quantum operations while the parties of the other
group only have to act locally on their system. We also prove the equivalence between pure state quantum secret
sharing schemes and AME states with an even number of parties. This equivalence implies the existence of
AME states for an arbitrary number of parties based on known results about the existence of quantum secret
sharing schemes.
PACS numbers:
Introduction. Entanglement is at the core of the power
of quantum information processing and has been extensively
studied for few qubits. The classification of entanglement
classes for three and four qubits is well understood [1–7] and
canonical forms of pure states under local unitary transformations of each local Hilbert space have also been analyzed
[6, 8, 9]. As the number of local quantum degrees of freedom
increases, our understanding of entanglement gets poorer. The
number of independent invariants that classify entanglement
grows exponentially and it is unclear which purpose each category of entanglement serves [10, 11]. In recent years, there
has been an important progress in the classification of the
maximally multipartite entangled states composed of qubits
[7, 12–15]. Nevertheless, a complete understanding of the
structure, classification and usefulness of quantum states with
the largest possible entanglement for arbitrary dimension is
still missing. Another motivation for studying multipartite entanglement is its connection to other apparently unrelated areas of physics, like string theory and black-holes [16, 17].
Quantum teleportation is one of the most intriguing utilizations of entanglement. It allows distant parties, who share a resource of entanglement, to transport a quantum state from one
party to the other by only exchanging classical information
and using up said entanglement. The first proposal of such a
protocol used the resource of bipartite entanglement between
two parties [18]. Later teleportation protocols using genuine
multipartite entanglement between more than two parties were
proposed theoretically for four qubit entanglement [19], and
experimentally in the form of open-destination teleportation
for five qubits [20].
This manuscript is devoted to initiate the study of a class of
states with genuine multipartite entanglement. These states,
which we call absolutely maximally entangled (AME) states,
are defined as having the strict maximal entanglement in all
bipartitions of the system. Up until now, AME states have
been thought to be a rather limited concept, because only few
AME states exist for qubits [21], specifically no AME states
exist for four, or eight and more qubits [15, 22]. In this work,
we consider the qudit problem, and show that AME states exist for any number of parties by choosing an appropriate qudit
dimension.
The fact that AME states contain maximal entanglement
makes them the natural candidates to implement novel multipartite communication protocols. Indeed, we shall here show
how they can be used to implement novel parallel teleportation
scenarios that postpone the choice of senders and receivers until after the state has been distributed. These protocols require
that either the senders or receivers perform joint quantum operations, while the respective other parties only have to act
locally on their systems. We further establish a one-to-one
correspondence between pure state quantum secret sharing
(QSS) schemes [23, 24] and even-party AME states, which
also proves the existence of AME states for any number of
parties given an appropriate choice of the system dimensions.
This follows from the existence of pure state QSS schemes for
any odd number of parties [23]. It should be mentioned that,
while our parallel teleportation protocol is different from the
aforementioned open-destination teleportation, it is also possible to implement open-destination teleportation with AME
states [25].
Definition of AME states. An AME(n, d) state (absolutely
maximally entangled state) of n qudits of dimension d, |ψi ∈
C⊗n
d , is a pure state for which every bipartition of the system
into the sets B and A, with m = |B| ≤ |A| = n − m, is
strictly maximally entangled such that
S(ρB ) = m log2 d .
(1)
Consequently, every partition of m local degrees of freedom
2
is represented by a reduced density matrix proportional to the
identity
ρB = T rA |ψihψ| =
1
Idm ,
dm
1≤m≤
n
.
2
A
A
B
B
(2)
In practice, todetect an AME state it is sufficient to check that
n
all the bn/2c
possible bipartitions of bn/2c qudits are maximally entangled, since all subsequent traces of the identity
matrix are again identity matrices.
A state is an AME state iff it can be written as
1 X
|k1 iB1 · · · |km iBm |φ(k)iA , (3)
|AMEi = √
dm k∈Zm
FIG. 1: Parallel Teleportation scenarios of Theorem 1. Scenario (i) is
on the left, and (ii) on the right. Parties in A perform joint quantum
operations, parties in B only local quantum operations.
d
with hφ(k)|φ(k 0 )i = δkk0 , for every partition into m = |B| ≤
|A| = n − m disjoint sets B and A.
Two obvious examples of AME states are the EinsteinRosen-Podolsky (EPR) and the Greenberger-Horne-Zeilinger
(GHZ) states for two and three qubits, respectively. In both
cases, the entanglement entropy is maximal for all their partitions. It has been proven that there are no absolutely maximally entangled states for four qubits [15]. AME states exist
for five and six qubits [26], and a possible form for them will
be given later in Example 1. No AME states exist for eight or
more qubits [15, 22]. The existence of an AME(7, 2) state is
still an open question, but it has been conjectured in Ref [26]
that no such state exists. By increasing the party dimension,
AME states can be found for these cases in which no qubit
AME states exist. We remark, however, that, although we will
show that for each n, AME(n, d) states exist for some appropriate choice of d, finding the conditions for the existence of
AME(n,d) states, depending on n and d, is generally a nontrivial problem. In a future publication [25], we will show
that, interestingly, a special class of AME states can be constructed from certain classical error correcting codes, namely
those that satisfy the singleton bound [27].
Parallel Teleportation. The maximal entanglement property
of an AME(n, d) state for any bipartition into the sets A and
B can be used to teleport quantum states between those two
sets. In contrast to the teleportation scenario where A and B
share a maximally entangled state that is not an AME state, in
the AME scenario the sets A and B do not have to be specified
when the state is created, but instead can be chosen after the
AME state has been distributed.
There are essentially three different ways in which the teleportation can be performed, depending on which parties can
perform joint quantum operations, and which are separated
and only able to perform local operations on their own quantum systems.
In the first case, the parties within each set, A and B, are
able to perform joint quantum operations. A standard teleportation of an arbitrary dm -dimensional state, where m =
min(|A|, |B|), can be performed in either direction.
In the second case, the sending parties A can perform a
joint quantum operation, but the parties in B are only able to
perform local quantum operations. Additionally we require
m = |B| ≤ |A| = n − m. Then one qudit can be teleported
from A to each of the parties in B, and thus in total m qudits
are teleported from A to B. This is illustrated in the left hand
side of Figure 1.
In the third and probably the most interesting case, the
sending parties can only perform local operations, but the receiving parties can perform joint quantum operations. In this
case, a teleportation is possible if the number of receiving parties is larger or equal n/2. Hence, sticking to our convention
m = |B| ≤ |A|, we now consider a teleportation from B to
A. See the right hand side of Figure 1 for an illustration.
The first scenario is just a straightforward teleportation between maximally entangled parties. The second and third scenarios are presented in the following theorem.
Theorem 1. Given an AME(n, d) state, and a bipartition of
the n parties into the sets A and B such that m = |B| ≤
|A| = n − m, then the following two parallel teleportation
scenarios are possible
(i) A can teleport one qudit to each party in B by performing a joint quantum operation and communicating two
classical “dits" to each party in B. Each party in B can
then locally recover their respective qudit with a local
operation.
(ii) Each party in B can locally teleport one qudit to A. After receiving the measurement outcomes, consisting of
two “dits” of classical information from each party in
B, the parties in A are able to recover all m qudits by
performing a joint quantum operation.
Proof. In both scenarios the parties in set A perform a joint
quantum operation to transform the AME state into m ddimensional EPR pairs. Then these pairs are used to teleport
m qudits from the sending to the receiving parties. This is
done by performing the joint unitary operation
UA |φ(k)iA = |k1 iA1 · · · |km iAm |0iA0 .
(4)
on the initial AME(n, d) state
1 X
|k1 iB1 · · · |km iBm |φ(k)iA ,
|Φi = √
dm k∈Zm
d
(5)
3
with hφ(k)|φ(k 0 )i = δkk0 . This results in the state
UA |Φi = |ΨiB1 A1 · · · |ΨiBm Am |0iA0 ,
D
(6)
P
where |Ψi =
|ii |ii are d-dimensional EPR pairs. These
EPR pairs can now be used to teleport a qudit from Ai to Bi
in case (i) (Bi to Ai in case (ii)). This requires Ai (Bi ) to
perform a generalized Bell measurement on her qudit and the
qudit she wants to teleport, and communicate the measurement result to Bi (Ai ). This amounts to sending the classical
information of two “dits" for each EPR pair. Upon reception
of the measurement result, Bi (Ai ) can recover the teleported
qudit by performing an appropriate unitary on his qudit.
Quantum Secret Sharing. The last teleportation scenario
suggests a close relationship between AME states and quantum secret sharing (QSS) schemes [23]. In a QSS protocol
[23, 24], a dealer encodes a secret S in a quantum state that is
shared among n players in such a way that only special subsets
of players are able to recover the secret. The set of all subsets
that are able to recover the secret form the access structure
and the set of all subsets that can gain no information about
the secret form the adversary structure. If the encoded state is
a pure state, we call it a pure state QSS scheme. We are only
interested in pure state QSS schemes here.
Additionally, we restrict our attention to threshold QSS
schemes [23], which means that the access structure is formed
by all sets that contain k or more number of parties, while
any set with less than k parties cannot obtain any information
about the secret. Thus k is the threshold number of parties
required to recover the secret. Such a QSS scheme is denoted
as a ((k, n)) threshold QSS scheme. For pure state threshold
QSS schemes, n and k are always related by n = 2k − 1.
To see the relation between AME states and threshold QSS
schemes, we consider an AME(2m, d) state with an even
number of parties and divide the parties into two sets A =
{A1 , . . . , Am } and B = {D, B1 , . . . , Bm−1 } of equal size
m. In set B we have singled out one party D, which will act
as the dealer of the QSS scheme. Now we perform the protocol of Theorem 1 (ii), but only D ∈ B performs the final
teleportation operation. Also note that the unitary operation
in Equation (4) and the Bell measurement by the dealer commute. Thus, D can first perform her Bell measurement, effectively encoding the teleported qudit onto the residual AME
state, from which it can be recovered by the players in A.
Furthermore, instead of the bipartition into the sets A and
B, we could have equally well chosen any other bipartition
into two sets A0 and B 0 of cardinality m with D ∈ B 0 . Then,
without changing the operations that D has to perform, the
parties in A0 are able to recover the teleported qudit (see Figure 2 for an illustration).
Thus, any set of at least m of the residual 2m − 1 parties
without D can recover the teleported state, given that the measurement outcome is broadcasted to all parties. Furthermore,
the no-cloning theorem guarantees that any set of less than
m players cannot gain any information about the state [24].
D
D
B/D
A0
A
A00
B 0/D
B 00/D
FIG. 2: (Color online) After D (blue) performs her teleportation operation, any set of m parties (red), A, A0 , A00 etc., can recover the
teleported state. Any set of parties with m − 1 or less parties (any set
consisting only of green parties) cannot gain any information about
the teleported state.
Hence we accomplished to construct a ((m, 2m − 1)) threshold QSS scheme from an AME(2m, d) state.
Before stating the theorem that formulates this observation
concisely, we shortly review how
P a QSS protocol works. A
secretPof dimension d, |Si =
ai |ii, is encoded into the
state
ai |Φi i which is shared by the players such that each
authorized set can deterministically recover |Si from its reduced state, while the reduced state of unauthorized sets is independent of the encoded secret. We call |Φi i the basis states
of the QSS scheme, and we show in [25] that they are AME
states for pure state threshold QSS schemes with equal share
and dimension size.
Theorem 2. There is a one to one correspondence between an
AME(2m, d) state and a pure state ((m, 2m − 1)) threshold
QSS scheme, whose share and secret dimensions are d.
Proof. AME to QSS: For any bipartition into parties
A = {A1 , . . . , Am } and B = {D, B1 , . . . , Bm−1 }, the
AME(2m, d) states has the form
1
|Φi = √
dm
X
(i,k)∈Zm
d
|iiD |k1 iB1 · · · |km−1 iBm−1 |φ(i, k)iA ,
with hφ(k, i)|φ(k 0 , j)i = δkk0 δij . We define the QSS basis
states
√
|Φi i = d Dhi|Φi
X
1
=√
|k1 · · · km−1 iB |φ(k, i)iA . (7)
dm−1
m−1
k∈Zd
A secret encoded as
|ai =
X
ai |ii →
X
ai |Φi i ,
(8)
satisfies the requirement of a threshold QSS scheme, because
the parties B have a completely mixed states, independent of
the encoded secret. Additionally, the set A, which can be chosen to be any set of n players, can restore the secret |ai by
performing the joint unitary operation
UA |φ(k, i)iA = |k1 iA1 · · · |km−1 iAm−1 |iiAm .
(9)
4
QSS to AME: For any bipartition into m authorized parties
A = {A1 , . . . , Am } and m − 1 unauthorized parties B =
{B1 , . . . , Bm−1 }, the AME basis states of the QSS scheme
can be written in the form
|Φi i = √
1
X
dm−1
m−1
k∈Zd
|k1 iB1 · · · |km−1 iBm−1 |φ(k, i)iA ,
where hφ(k, i)|φ(k , i)i = δkk0 , because the states are AME
states, and hφ(k, i)|φ(k, j)i = δij , because the authorized
parties can recover the secret deterministically. Thus,
(10)
From these basis states, define the state
1 X
|ii |Φi i
|Φi = √
d i∈Zd
X
1
=√
|iiD |k1 iB1 · · · |km−1 iBm−1 |φ(k, i)i .
dm (i,k)∈Zm
d
Because of Equation (10), |Φi is a maximally entangled state
with respect to the bipartition B ∪ {D} vs. A. Since the original bipartition into A and B was arbitrary, |Φi is maximally
entangled with respect to any bipartition into two cardinality
m sets and thus is an AME(2m, d) state.
Since it is known that ((m, 2m−1)) threshold QSS scheme
exist for any number of m and an appropriate choice of d [23],
Theorem 2 proves the existence of AME states for any number
of parties.
Example 1. In this example, we show how the five qubit code
can be used to construct AME(5, 2) and AME(6, 2) states.
From the five qubit code a ((3, 5)) threshold QSS scheme can
be constructed [23]. The corresponding basis states are
|0L i =
1
( |00000i + |10010i + |01001i + |10100i
4
+ |01010i − |11011i − |00110i − |11000i
1
|Φi = √ [|0i |0L i + |1i |1L i]
2
1
= [|000i (|+ − +i + |− + −i)
4
+ |001i (− |+ − −i + |− + +i)
+ |010i (|+ + −i − |− − +i)
0
hφ(k, i)|φ(k 0 , j)i = δkk0 δij .
receipe of Theorem 2, we obtain the AME(6, 2) state
(11)
− |11101i − |00011i − |11110i − |01111i
− |10001i − |01100i − |10111i + |00101i),
1
|1L i = ( |11111i + |01101i + |10110i + |01011i
4
+ |10101i − |00100i − |11001i − |00111i (12)
− |00010i − |11100i − |00001i − |10000i
− |01110i − |10011i − |01000i + |11010i).
These states are AME(5, 2) states as required. Following the
(13)
+ |011i (− |+ + +i − |− − −i)
+ |100i (− |+ + +i + |− − −i)
+ |101i (− |+ + −i − |− − +i)
+ |110i (− |+ − −i − |− + +i)
+ |111i (− |+ − +i + |− + −i)].
Conclusion. In this manuscript, we have introduced AME
states, a class of highly entangled states, for n qudits shared
among n locally separated parties. Previous investigations of
maximal entanglement showed that AME states do not exist
when the number of qubits is eight or larger. Here we proved
the existence of AME states for any number of parties with
the appropriate qudit dimension. Moreover, we have shown
how they can be utilized in different parallel teleportation scenarios, which require some parties to perform joint quantum
operations, while others’ capabilities may be restricted to local operations. In those scenarios the advantage of AME states
over less entangled states like a collection of EPR pairs lies in
the fact that the partition into senders and receivers may be
chosen after the state has been distributed.
Furthermore, we have investigated the relationship of AME
states with QSS schemes and established a one-to-one correspondence between even party AME states and pure state
threshold QSS schemes. This correspondence allows us to
prove the existence of AME states for any number of parties
with the appropriate dimension. In future work we further explore this very intuitive approach to develop new communication protocols from AME states as well as extending the range
of QSS schemes that can be derived from AME states. For instance, instead of assigning the role of the dealer to only one
of the parties in the AME state, we can imagine multiple dealers who encode independent secrets onto the residual AME
states, resulting in QSS schemes with more involved access
structures. The established connection to QSS schemes also
confirms a relation between AME states and quantum error
correction codes that was already suggested in Ref. [28]. A
better understanding of this relation will allow us to construct
new quantum error correction codes from AME states as well
as deriving AME states from already known quantum codes.
This might also shed light upon the open question of existence of AME states for a given number of parties and system
dimension.
Acknowledgments. W.H., W.C., and H.K.L. acknowledge
financial support from funding agencies including NSERC,
Quantum-Works, the CRC program and CIFAR. J.I.L. and
A.R. acknowledge financial support from MICIN (Spain) and
Grup consolidat (Generalitat de Catalunya). We would also
5
like to thank David Gosset and Sandu Popescu for very helpful comments.
[1] W. Dür, G. Vidal, and J. I. Cirac, Phys. Rev. A 62, 062314
(2000).
[2] F. Verstraete, J. Dehaene, B. De Moor, and H. Verschelde, Phys.
Rev. A 65, 052112 (2002).
[3] A. Higuchi and A. Sudbery, Physics Letters A 273, 213 (2000),
ISSN 0375-9601.
[4] P. Lévay, Journal of Physics A: Mathematical and General 39,
9533 (2006).
[5] J.-G. Luque and J.-Y. Thibon, Phys. Rev. A 67, 042303 (2003).
[6] A. Acín, A. Andrianov, L. Costa, E. Jané, J. I. Latorre, and
R. Tarrach, Phys. Rev. Lett. 85, 1560 (2000).
[7] S. Brierley and A. Higuchi, J. Phys. A 40, 8455 (2007).
[8] B. Kraus, Phys. Rev. Lett. 104, 020504 (2010).
[9] B. Kraus, Phys. Rev. A 82, 032121 (2010).
[10] A. Miyake and M. Wadati, Quant. Inf. & Comp. 2, 540 (2002).
[11] I. Gelfand, M. Kapranov, and A. Zelevinsky, Discriminants,
Resultants and Multidimensional Determinants (Birkhauser,
1994).
[12] A. Osterloh and J. Siewert, Int. J. Quant. Inf. 4, 531 (2006).
[13] I. D. K. Brown, S. Stepney, A. Sudbery, and S. L. Braunstein, Journal of Physics A: Mathematical and General 38, 1119
(2005).
View publication stats
[14] P. Facchi, G. Florio, G. Parisi, and S. Pascazio, Phys. Rev. A
77, 060304 (2008).
[15] G. Gour and N. R. Wallach, Journal of Mathematical Physics
51, 112201 (2010).
[16] L. Borsten, D. Dahanayake, M. J. Duff, A. Marrani, and
W. Rubens, Phys. Rev. Lett. 105, 100507 (2010).
[17] L. Borsten, M. Duff, A. Marrani, and W. Rubens, The European
Physical Journal Plus 126, 1 (2011).
[18] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, and
W. K. Wootters, Phys. Rev. Lett. 70, 1895 (1993).
[19] Y. Yeo and W. K. Chua, Phys. Rev. Lett. 96, 060502 (2006).
[20] Z. Zhao, Y.-A. Chen, A.-N. Zhang, T. Yang, H. J. Briegel, and
J.-W. Pan, Nature 430, 54 (2004).
[21] H.-K. Lo thanks Sandu Popescu for an englightening discussion
many years ago.
[22] E. M. Rains, Information theory, IEEE Transactions on 45, 266
(1999).
[23] R. Cleve, D. Gottesman, and H.-K. Lo, Phys. Rev. Lett. 83, 648
(1999).
[24] D. Gottesman, Phys. Rev. A 61, 042311 (2000).
[25] W. Helwig, W. Cui, J. I. Latorre, A. Riera, and H.-K. Lo (in
preparation).
[26] A. Borras, A. R. Plastino, J. Batle, C. Zander, M. Casas, and
A. Plastino, J. Phys. A 40, 13407 (2007).
[27] F. MacWilliams and N. Sloane, The Theory of Error-Correcting
Codes (North Holland Publishing Co., 1977).
[28] A. J. Scott, Phys. Rev. A 69, 052330 (2004).