Comment on “Secret-key-assisted private classical communication capacity over quantum channels”

2011 ◽  
Vol 83 (4) ◽  
Author(s):  
Mark M. Wilde
2013 ◽  
Vol 02 (01) ◽  
pp. 1250018 ◽  
Author(s):  
BENOÎT COLLINS ◽  
MOTOHISA FUKUDA ◽  
ION NECHITA

In this paper, we study the behavior of the output of pure entangled states after being transformed by a product of conjugate random unitary channels. This study is motivated by the counterexamples by Hastings [Superadditivity of communication capacity using entangled inputs, Nat. Phys.5 (2009) 255–257] and Hayden–Winter [Counterexamples to the maximal p-norm multiplicativity conjecture for all p > 1, Comm. Math. Phys.284(1) (2008) 263–280] to the additivity problems. In particular, we study in depth the difference of behavior between random unitary channels and generic random channels. In the case where the number of unitary operators is fixed, we compute the limiting eigenvalues of the output states. In the case where the number of unitary operators grows linearly with the dimension of the input space, we show that the eigenvalue distribution converges to a limiting shape that we characterize with free probability tools. In order to perform the required computations, we need a systematic way of dealing with moment problems for random matrices whose blocks are i.i.d. Haar distributed unitary operators. This is achieved by extending the graphical Weingarten calculus introduced in [B. Collins and I. Nechita, Random quantum channels I: Graphical calculus and the Bell state phenomenon, Comm. Math. Phys.297(2) (2010) 345–370].


2012 ◽  
Vol 10 (05) ◽  
pp. 1250059 ◽  
Author(s):  
MAOZHU SUN ◽  
XIANG PENG ◽  
YUJIE SHEN ◽  
HONG GUO

The original two-way continuous-variable quantum-key-distribution (CV-QKD) protocols [S. Pirandola, S. Mancini, S. Lloyd and S. L. Braunstein, Nat. Phys. 4 (2008) 726] give the security against the collective attack on the condition of the tomography of the quantum channels. We propose a family of new two-way CV-QKD protocols and prove their security against collective entangling cloner attacks without the tomography of the quantum channels. The simulation result indicates that the new protocols maintain the same advantage as the original two-way protocols whose tolerable excess noise surpasses that of the one-way CV-QKD protocol. We also show that all sub-protocols within the family have higher secret key rate and much longer transmission distance than the one-way CV-QKD protocol for the noisy channel.


2014 ◽  
Vol 12 (03) ◽  
pp. 1450011 ◽  
Author(s):  
Pengfei Xing ◽  
Yimin Liu ◽  
Chuanmei Xie ◽  
Xiansong Liu ◽  
Zhanjun Zhang

Two three-party schemes are put forward for sharing quantum operations on a remote qutrit with local operation and classical communication as well as shared entanglements. The first scheme uses a two-qutrit and three-qutrit non-maximally entangled states as quantum channels, while the second replaces the three-qutrit non-maximally entangled state with a two-qutrit. Both schemes are treated and compared from the four aspects of quantum and classical resource consumption, necessary-operation complexity, success probability and efficiency. It is found that the latter is overall more optimal than the former as far as a restricted set of operations is concerned. In addition, comparisons of both schemes with other four relevant ones are also made to show their two features, including degree generalization and channel-state generalization. Furthermore, some concrete discussions on both schemes are made to expose their important features of security, symmetry and experimental feasibility. Particularly, it is revealed that the success probabilities and intrinsic efficiencies in both schemes are completely determined by the shared entanglement.


2005 ◽  
Vol 16 (08) ◽  
pp. 1293-1301 ◽  
Author(s):  
TING GAO ◽  
FENGLI YAN ◽  
ZHIXI WANG

Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission of Charlie (i.e., Charlie is trustworthy and cooperative, which means the "conditional" in the two schemes), Alice and Bob begin their private communication under the control of Charlie. In the first scheme, Alice transmits secret message to Bob in a deterministic manner with the help of Charlie by means of Alice's local unitary transformations, both Alice and Bob's local measurements, and both of Alice and Charlie's public classical communication. In the second scheme, the secure communication between Alice and Bob can be achieved via public classical communication of Charlie and Alice, and the local measurements of both Alice and Bob. The common feature of these protocols is that the communications between two communication parties Alice and Bob depend on the agreement of the third side Charlie. Moreover, transmitting one bit secret message, the sender Alice only needs to apply a local operation on her one qubit and send one bit classical information. We also show that the two schemes are completely secure if quantum channels are perfect.


2020 ◽  
Vol 66 (11) ◽  
pp. 7113-7131
Author(s):  
Mehrdad Tahmasbi ◽  
Matthieu R. Bloch
Keyword(s):  

2005 ◽  
Vol 5 (4&5) ◽  
pp. 380-395
Author(s):  
A.W. Harrow ◽  
D.W. Leung

A unitary interaction coupling two parties enables quantum or classical communication in both the forward and backward directions. Each communication capacity can be thought of as a tradeoff between the achievable rates of specific types of forward and backward communication. Our first result shows that for any bipartite unitary gate, bidirectional coherent classical communication is no more difficult than bidirectional classical communication --- they have the same achievable rate regions. Previously this result was known only for the unidirectional capacities (i.e., the boundaries of the tradeoff). We then relate the tradeoff for two-way coherent communication to the tradeoff for two-way quantum communication and the tradeoff for coherent communication in one direction and quantum communication in the other.


2019 ◽  
Vol 60 (1) ◽  
pp. 012204 ◽  
Author(s):  
Anurag Anshu ◽  
Rahul Jain ◽  
Naqueeb Ahmad Warsi

Sign in / Sign up

Export Citation Format

Share Document