麻豆传媒AV

Estimating Quantum Entropy

Submitted by admin on Wed, 10/23/2024 - 01:52

The entropy of a quantum system is a measure of its randomness, and has applications in measuring quantum entanglement. We study the problem of estimating the von Neumann entropy, S(蟻), and R茅nyi entropy, S伪(蟻) of an unknown mixed quantum state 蟻 in d dimensions, given access to independent copies of 蟻. We provide algorithms with copy complexity O(d2/伪) for estimating S伪(蟻) for 伪 <; 1, and copy complexity O(d2) for estimating S(蟻), and S伪(蟻) for non-integral 伪 > 1.

Quantum Private Information Retrieval From Coded and Colluding Servers

Submitted by admin on Wed, 10/23/2024 - 01:52

In the classical private information retrieval (PIR) setup, a user wants to retrieve a file from a database or a distributed storage system (DSS) without revealing the file identity to the servers holding the data. In the quantum PIR (QPIR) setting, a user privately retrieves a classical file by receiving quantum information from the servers. The QPIR problem has been treated by Song et al. in the case of replicated servers, both without collusion and with all but one servers colluding.

Communication Cost of Quantum Processes

Submitted by admin on Wed, 10/23/2024 - 01:52

A common scenario in distributed computing involves a client who asks a server to perform a computation on a remote computer. An important problem is to determine the minimum amount of communication needed to specify the desired computation. Here we extend this problem to the quantum domain, analyzing the total amount of (classical and quantum) communication needed by a server in order to accurately execute a quantum process chosen by a client from a parametric family of quantum processes.

Non-Additivity in Classical-Quantum Wiretap Channels

Submitted by admin on Wed, 10/23/2024 - 01:52

Due to Csisz谩r and K枚rner, the private capacity of classical wiretap channels has a single-letter characterization in terms of the private information. For quantum wiretap channels, however, it is known that regularization of the private information is necessary to reach the capacity. Here, we study hybrid classical-quantum wiretap channels in order to resolve to what extent quantum effects are needed to witness non-additivity phenomena in quantum Shannon theory.

Erasable Bit Commitment From Temporary Quantum Trust

Submitted by admin on Wed, 10/23/2024 - 01:52

We introduce a new setting for two-party cryptography by introducing the notion of temporarily trusted third parties. These third parties act honest-but-curious during the execution of the protocol. Once the protocol concludes and the trust period expires, these third parties may collaborate with an adversarial party. We implement a variant of the cryptographic primitive of bit commitment in this setting, which we call erasable bit commitment. In this primitive, the sender has the choice of either opening or erasing her commitment after the commit phase.

Toward Undetectable Quantum Key Distribution Over Bosonic Channels

Submitted by admin on Wed, 10/23/2024 - 01:52

We propose a protocol based on pulse-position modulation and multi-level coding that allows one to bootstrap traditional quantum key distribution protocols while ensuring covertness, in the sense that no statistical test by the adversary can detect the presence of communication over the quantum channel better than a random guess. When run over a bosonic channel, our protocol can leverage existing discrete-modulated continuous-variable protocols.

On the Second-Order Asymptotics of the Partially Smoothed Conditional Min-Entropy & Application to Quantum Compression

Submitted by admin on Wed, 10/23/2024 - 01:52

Recently, Anshu et al. introduced 鈥減artially鈥 smoothed information measures and used them to derive tighter bounds for several information-processing tasks, including quantum state merging and privacy amplification against quantum adversaries [麻豆传媒AV Trans. Inf. Theory 66, 5022 (2020)]. Yet, a tight second-order asymptotic expansion of the partially smoothed conditional min-entropy in the i.i.d. setting remains an open question.

Entanglement-Enabled Communication

Submitted by admin on Wed, 10/23/2024 - 01:52

We introduce and analyse a multiple-access channel with two senders and one receiver, in the presence of i.i.d. noise coming from the environment. Partial side information about the environmental states allows the senders to modulate their signals accordingly. An adversarial jammer with its own access to information on environmental states and the modulation signals can jam a fraction of the transmissions.