scholarly journals Bounding and Estimating the Classical Information Rate of Quantum Channels With Memory

2020 ◽  
Vol 66 (9) ◽  
pp. 5601-5619 ◽  
Author(s):  
Michael X. Cao ◽  
Pascal O. Vontobel
2020 ◽  
Vol 29 (11) ◽  
pp. 110307
Author(s):  
Mei-Jiao Wang ◽  
Yun- Jie Xia ◽  
Yang Yang ◽  
Liao-Zhen Cao ◽  
Qin-Wei Zhang ◽  
...  

2005 ◽  
Vol 03 (supp01) ◽  
pp. 87-95
Author(s):  
KURT JACOBS

To transmit classical information using a quantum system, the sender prepares the system in one of a set of possible states and sends it to the receiver. The receiver then makes a measurement on the system to obtain information about the senders choice of state. The amount of information which is accessible to the receiver depends upon the encoding and the measurement. Here we derive a bound on this information which generalizes the bound derived by Schumacher, Westmoreland and Wootters [Schumacher, Westmoreland and Wootters, Phys. Rev. Lett. 76, 3452 (1996)] to include inefficient measurements, and thus all quantum operations. This also allows us to obtain a generalization of a bound derived by Hall [Hall, Phys. Rev. A 55, 100 (1997)], and to show that the average reduction in the von Neumann entropy which accompanies a measurement is concave in the initial state, for all quantum operations.


2005 ◽  
Vol 16 (08) ◽  
pp. 1293-1301 ◽  
Author(s):  
TING GAO ◽  
FENGLI YAN ◽  
ZHIXI WANG

Two schemes for quantum secure conditional direct communication are proposed, where a set of EPR pairs of maximally entangled particles in Bell states, initially made by the supervisor Charlie, but shared by the sender Alice and the receiver Bob, functions as quantum information channels for faithful transmission. After insuring the security of the quantum channel and obtaining the permission of Charlie (i.e., Charlie is trustworthy and cooperative, which means the "conditional" in the two schemes), Alice and Bob begin their private communication under the control of Charlie. In the first scheme, Alice transmits secret message to Bob in a deterministic manner with the help of Charlie by means of Alice's local unitary transformations, both Alice and Bob's local measurements, and both of Alice and Charlie's public classical communication. In the second scheme, the secure communication between Alice and Bob can be achieved via public classical communication of Charlie and Alice, and the local measurements of both Alice and Bob. The common feature of these protocols is that the communications between two communication parties Alice and Bob depend on the agreement of the third side Charlie. Moreover, transmitting one bit secret message, the sender Alice only needs to apply a local operation on her one qubit and send one bit classical information. We also show that the two schemes are completely secure if quantum channels are perfect.


2012 ◽  
Vol 62 (3) ◽  
Author(s):  
Tomáš Rybár

AbstractQuantum memory channels represent a very general, yet simple and comprehensible model for causal processes. As such they have attracted considerable research interest, mostly aimed on their transfer capabilities and structure properties. Most notably it was shown that memory channels can be implemented via physically naturally motivated collision models. We also define the concept of repeatable channels and show that only unital channels can be implemented repeatably with pure memory channels. In the special case of qubit channels we also show that every unital qubit channel has a repeatable implementation. We also briefly explore the possibilities of stroboscopical simulation of channels and show that all random unitary channels can be stroboscopically simulated. Particularly in qubit case, all indivisible qubit channels are also random unitary, hence for qubit all indivisible channels can be stroboscopically simulated. Memory channels also naturally capture the framework of correlated experiments. We develop methods to gather and interpret data obtained in such setting and in detail examine the two qubit case. We also show that for control unitary interactions the measured data will never contradict a simple unitary evolution. Thus no memory effects can be spotted then.


2016 ◽  
Vol 15 (12) ◽  
pp. 5129-5144 ◽  
Author(s):  
You-neng Guo ◽  
Mao-fa Fang ◽  
Guo-you Wang ◽  
Ke Zeng

2012 ◽  
Vol 60 (9) ◽  
pp. 2511-2521 ◽  
Author(s):  
Georg Zeitler ◽  
Andrew C. Singer ◽  
Gerhard Kramer

2017 ◽  
Vol 16 (12) ◽  
Author(s):  
You-neng Guo ◽  
Qing-long Tian ◽  
Ke Zeng ◽  
Zheng-da Li

Sign in / Sign up

Export Citation Format

Share Document