-
A condition for the zero-error capacity of quantum channels
Authors:
Marciel M. Oliveira,
Francisco M. de Assis,
Micael A. Dias
Abstract:
In this paper, we present a condition for the zero-error capacity of quantum channels. To achieve this result we first prove that the eigenvectors (or eigenstates) common to the Kraus operators representing the quantum channel are fixed points of the channel. From this fact and assuming that these Kraus operators have at least two eigenstates in common and also considering that every quantum chann…
▽ More
In this paper, we present a condition for the zero-error capacity of quantum channels. To achieve this result we first prove that the eigenvectors (or eigenstates) common to the Kraus operators representing the quantum channel are fixed points of the channel. From this fact and assuming that these Kraus operators have at least two eigenstates in common and also considering that every quantum channel has at least one fixed point, it is proved that the zero-error capacity of the quantum channel is positive. Moreover, this zero-error capacity condition is a lower bound for the zero-error capacity of the quantum channel. This zero-error capacity condition of quantum channels has a peculiar feature that it is easy to verify when one knows the Kraus operators representing the quantum channel.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
Convergence of Density Operators and Security of Discrete Modulated CVQKD Protocols
Authors:
Micael Andrade Dias,
Francisco Marcos de Assis
Abstract:
This communication deals with the problem of bounding the approximation error on weak convergence of mixed coherent state towards a Gaussian thermal state. In the context of CVQKD with discrete modulation, we develop expressions for two specific cases. The first one is the distance between the Gaussian equivalent bipartite state and a reference Gaussian modulated (GG02) and the second one is for t…
▽ More
This communication deals with the problem of bounding the approximation error on weak convergence of mixed coherent state towards a Gaussian thermal state. In the context of CVQKD with discrete modulation, we develop expressions for two specific cases. The first one is the distance between the Gaussian equivalent bipartite state and a reference Gaussian modulated (GG02) and the second one is for the trace distance between the constellation and a thermal state with same photon number. Since, in the convex set of density operators, weak convergence implies convergence in the trace norm, knowing how fast the sequence gets close to the equivalent Gaussian state has implication on the security of QKD Protocols. Here we derive two bounds on the $L_1$ distance, one of them related with an energy test that can be used in the security proof.
△ Less
Submitted 10 September, 2023;
originally announced September 2023.
-
A method for Sampling Bernoulli Variables
Authors:
Francisco Marcos de Assis,
Juliana Martins de Assis,
Micael Andrade Dias
Abstract:
We introduce new method for generating correlated or uncorrelated Bernoulli random variables by using the binary expansion of a continuous random variable with support on the unit interval. We show that when this variable has a symmetric probability density function around 12 , its binary expansion provides equiprobable bits over {0, 1}. In addition we prove that when the random variable is unifor…
▽ More
We introduce new method for generating correlated or uncorrelated Bernoulli random variables by using the binary expansion of a continuous random variable with support on the unit interval. We show that when this variable has a symmetric probability density function around 12 , its binary expansion provides equiprobable bits over {0, 1}. In addition we prove that when the random variable is uniformly distributed over [0, 1], its binary expansion generates independent Bernoulli random variables. Moreover, we give examples where, by choosing some parameterized nonuniform probability density functions over [0, 1], samples of Bernoulli variables with specific correlation values are generated.
△ Less
Submitted 7 September, 2023;
originally announced September 2023.
-
Converging State Distributions for Discrete Modulated CVQKD Protocols
Authors:
Micael Andrade Dias,
Francisco Marcos de Assis
Abstract:
Consider the problem of using a finite set of coherent states to distribute secret keys over a quantum channel. It is known that computing the exact secret key rate in this scenario is intractable due to the infinite dimensionality of the Hilbert spaces and usually one computes a lower bound using a Gaussian equivalent bipartite state in the entangled based version of the protocol, which leads to…
▽ More
Consider the problem of using a finite set of coherent states to distribute secret keys over a quantum channel. It is known that computing the exact secret key rate in this scenario is intractable due to the infinite dimensionality of the Hilbert spaces and usually one computes a lower bound using a Gaussian equivalent bipartite state in the entangled based version of the protocol, which leads to underestimating the actual protocol capability of generating secret keys for the sake of security. Here, we define the QKD protocol's non-Gaussianity, a function quantifying the amount of secret key rate lost due to assuming a Gaussian model when a non-Gaussian modulation was used, and develop relevant properties for it. We show that if the set of coherent states is induced by a random variable approaching the AWGN channel capacity, then the protocol's non-Gaussianity vanishes, meaning that there is no loss of secret key rate due to the use of a Gaussian model for computing bound on the secret key rate. The numerical results show that by using a 256-QAM with Gauss-Hermite shaping, the loss of secret key rate quickly falls below $10^{-5}$ as the distance increases.
△ Less
Submitted 1 June, 2023; v1 submitted 10 May, 2023;
originally announced May 2023.
-
Distributional Transform Based Information Reconciliation
Authors:
Micael Andrade Dias,
Francisco Marcos de Assis
Abstract:
In this paper, we present an information reconciliation protocol designed for Continuous-Variable QKD using the Distributional Transform. By combining tools from copula and information theory, we present a method for extracting independent symmetric Bernoulli bits for Gaussian-modulated CVQKD protocols, which we called the Distributional Transform Expansion (DTE). We derived the expressions for th…
▽ More
In this paper, we present an information reconciliation protocol designed for Continuous-Variable QKD using the Distributional Transform. By combining tools from copula and information theory, we present a method for extracting independent symmetric Bernoulli bits for Gaussian-modulated CVQKD protocols, which we called the Distributional Transform Expansion (DTE). We derived the expressions for the maximum reconciliation efficiency for both homodyne and heterodyne measurements, which, for the last, is achievable with an efficiency greater than 0.9 at a signal-to-noise ratio lower than -3.6 dB.
△ Less
Submitted 11 May, 2023; v1 submitted 19 April, 2022;
originally announced April 2022.
-
Evaluating the Eavesdropper Entropy via Bloch-Messiah Decomposition
Authors:
Micael Andrade Dias,
Francisco Marcos de Assis
Abstract:
We explore the Bloch-Messiah decomposition of Gaussian unitary to analyze the Entangling Cloner Attack performed by an eavesdropper on a discrete modulated continuous variable QKD scenario. Such a decomposition allows to replace the nonlinear unitary resulting from eavesdropping and tracing out Bob's mode into an architecture of single-mode operations (squeezers, phase shifters and displacements)…
▽ More
We explore the Bloch-Messiah decomposition of Gaussian unitary to analyze the Entangling Cloner Attack performed by an eavesdropper on a discrete modulated continuous variable QKD scenario. Such a decomposition allows to replace the nonlinear unitary resulting from eavesdropping and tracing out Bob's mode into an architecture of single-mode operations (squeezers, phase shifters and displacements) and a two-mode beam splitter. Based on such architecture we were able to get tighter upper bounds to the eavesdropper entropy for a discrete modulated CVQKD scheme. The new bounds are justified from the Gaussian extremality property valid for entangled-based equivalent protocols.
△ Less
Submitted 30 July, 2021;
originally announced July 2021.
-
Amplitude-Phase Modulated CVQKD Protocol
Authors:
Micael Andrade Dias,
Francisco Marcos de Assis
Abstract:
Here we report the performance of a discrete modulated Continuous Variable Quantum Key Distribution protocol based on eight and sixteen state optimal Amplitude Phase Keying constellations with pure loss quantum channel transmission. Our constellations use the same amplitudes and state probability as in an optimal four-state unidimensional constellation model and apply amplitude/phase modulation to…
▽ More
Here we report the performance of a discrete modulated Continuous Variable Quantum Key Distribution protocol based on eight and sixteen state optimal Amplitude Phase Keying constellations with pure loss quantum channel transmission. Our constellations use the same amplitudes and state probability as in an optimal four-state unidimensional constellation model and apply amplitude/phase modulation to the quadratures of coherent states. We compare the obtained results with the performance of conventional $m$-PSK and $m$-APK constellations. The results presented show that protocols that use the proposed constellations outperform the ones based on conventional constellations in both secret key rate and link distance. In special, our protocol is able to accomplish viable SKR's in low transmittance regime, $τ<0.2$.
△ Less
Submitted 19 April, 2022; v1 submitted 15 June, 2021;
originally announced June 2021.
-
Entanglement-assisted Quantum Codes from Algebraic Geometry Codes
Authors:
Francisco Revson F. Pereira,
Ruud Pellikaan,
Giuliano Gadioli La Guardia,
Francisco Marcos de Assis
Abstract:
Quantum error correcting codes play the role of suppressing noise and decoherence in quantum systems by introducing redundancy. Some strategies can be used to improve the parameters of these codes. For example, entanglement can provide a way for quantum error correcting codes to achieve higher rates than the one obtained via the traditional stabilizer formalism. Such codes are called entanglement-…
▽ More
Quantum error correcting codes play the role of suppressing noise and decoherence in quantum systems by introducing redundancy. Some strategies can be used to improve the parameters of these codes. For example, entanglement can provide a way for quantum error correcting codes to achieve higher rates than the one obtained via the traditional stabilizer formalism. Such codes are called entanglement-assisted quantum (QUENTA) codes. In this paper, we use algebraic geometry codes to construct several families of QUENTA codes via the Euclidean and the Hermitian construction. Two of the families created have maximal entanglement and have quantum Singleton defect equal to zero or one. Comparing the other families with the codes with the respective quantum Gilbert-Varshamov bound, we show that our codes have a rate that surpasses that bound. At the end, asymptotically good towers of linear complementary dual codes are used to obtain asymptotically good families of maximal entanglement QUENTA codes. Furthermore, a simple comparison with the quantum Gilbert-Varshamov bound demonstrates that using our construction it is possible to create an asymptotically family of QUENTA codes that exceeds this bound.
△ Less
Submitted 21 August, 2019; v1 submitted 15 July, 2019;
originally announced July 2019.
-
Dialectical Multispectral Classification of Diffusion-Weighted Magnetic Resonance Images as an Alternative to Apparent Diffusion Coefficients Maps to Perform Anatomical Analysis
Authors:
Wellington Pinheiro dos Santos,
Francisco Marcos de Assis,
Ricardo Emmanuel de Souza,
Plínio Batista dos Santos Filho,
Fernando Buarque de Lima Neto
Abstract:
Multispectral image analysis is a relatively promising field of research with applications in several areas, such as medical imaging and satellite monitoring. A considerable number of current methods of analysis are based on parametric statistics. Alternatively, some methods in Computational Intelligence are inspired by biology and other sciences. Here we claim that Philosophy can be also consider…
▽ More
Multispectral image analysis is a relatively promising field of research with applications in several areas, such as medical imaging and satellite monitoring. A considerable number of current methods of analysis are based on parametric statistics. Alternatively, some methods in Computational Intelligence are inspired by biology and other sciences. Here we claim that Philosophy can be also considered as a source of inspiration. This work proposes the Objective Dialectical Method (ODM): a method for classification based on the Philosophy of Praxis. ODM is instrumental in assembling evolvable mathematical tools to analyze multispectral images. In the case study described in this paper, multispectral images are composed of diffusion-weighted (DW) magnetic resonance (MR) images. The results are compared to ground-truth images produced by polynomial networks using a morphological similarity index. The classification results are used to improve the usual analysis of the apparent diffusion coefficient map. Such results proved that gray and white matter can be distinguished in DW-MR multispectral analysis and, consequently, DW-MR images can also be used to furnish anatomical information.
△ Less
Submitted 3 December, 2017;
originally announced December 2017.
-
Avaliação do método dialético na quantização de imagens multiespectrais
Authors:
Wellington Pinheiro dos Santos,
Francisco Marcos de Assis
Abstract:
The unsupervised classification has a very important role in the analysis of multispectral images, given its ability to assist the extraction of a priori knowledge of images. Algorithms like k-means and fuzzy c-means has long been used in this task. Computational Intelligence has proven to be an important field to assist in building classifiers optimized according to the quality of the grouping of…
▽ More
The unsupervised classification has a very important role in the analysis of multispectral images, given its ability to assist the extraction of a priori knowledge of images. Algorithms like k-means and fuzzy c-means has long been used in this task. Computational Intelligence has proven to be an important field to assist in building classifiers optimized according to the quality of the grouping of classes and the evaluation of the quality of vector quantization. Several studies have shown that Philosophy, especially the Dialectical Method, has served as an important inspiration for the construction of new computational methods. This paper presents an evaluation of four methods based on the Dialectics: the Objective Dialectical Classifier and the Dialectical Optimization Method adapted to build a version of k-means with optimal quality indices; each of them is presented in two versions: a canonical version and another version obtained by applying the Principle of Maximum Entropy. These methods were compared to k-means, fuzzy c-means and Kohonen's self-organizing maps. The results showed that the methods based on Dialectics are robust to noise, and quantization can achieve results as good as those obtained with the Kohonen map, considered an optimal quantizer.
△ Less
Submitted 3 December, 2017;
originally announced December 2017.
-
Fuzzy-Based Dialectical Non-Supervised Image Classification and Clustering
Authors:
Wellington Pinheiro dos Santos,
Francisco Marcos de Assis,
Ricardo Emmanuel de Souza,
Priscilla B. Mendes,
Henrique S. S. Monteiro,
Havana Diogo Alves
Abstract:
The materialist dialectical method is a philosophical investigative method to analyze aspects of reality. These aspects are viewed as complex processes composed by basic units named poles, which interact with each other. Dialectics has experienced considerable progress in the 19th century, with Hegel's dialectics and, in the 20th century, with the works of Marx, Engels, and Gramsci, in Philosophy…
▽ More
The materialist dialectical method is a philosophical investigative method to analyze aspects of reality. These aspects are viewed as complex processes composed by basic units named poles, which interact with each other. Dialectics has experienced considerable progress in the 19th century, with Hegel's dialectics and, in the 20th century, with the works of Marx, Engels, and Gramsci, in Philosophy and Economics. The movement of poles through their contradictions is viewed as a dynamic process with intertwined phases of evolution and revolutionary crisis. In order to build a computational process based on dialectics, the interaction between poles can be modeled using fuzzy membership functions. Based on this assumption, we introduce the Objective Dialectical Classifier (ODC), a non-supervised map for classification based on materialist dialectics and designed as an extension of fuzzy c-means classifier. As a case study, we used ODC to classify 181 magnetic resonance synthetic multispectral images composed by proton density, $T_1$- and $T_2$-weighted synthetic brain images. Comparing ODC to k-means, fuzzy c-means, and Kohonen's self-organized maps, concerning with image fidelity indexes as estimatives of quantization distortion, we proved that ODC can reach almost the same quantization performance as optimal non-supervised classifiers like Kohonen's self-organized maps.
△ Less
Submitted 3 December, 2017;
originally announced December 2017.
-
New Convolutional Codes Derived from Algebraic Geometry Codes
Authors:
Francisco Revson F. Pereira,
Giuliano G. La Guardia,
Francisco M. de Assis
Abstract:
In this paper, we construct new families of convolutional codes. Such codes are obtained by means of algebraic geometry codes. Additionally, more families of convolutional codes are constructed by means of puncturing, extending, expanding and by the direct product code construction applied to algebraic geometry codes. The parameters of the new convolutional codes are better than or comparable to t…
▽ More
In this paper, we construct new families of convolutional codes. Such codes are obtained by means of algebraic geometry codes. Additionally, more families of convolutional codes are constructed by means of puncturing, extending, expanding and by the direct product code construction applied to algebraic geometry codes. The parameters of the new convolutional codes are better than or comparable to the ones available in literature. In particular, a family of almost near MDS codes is presented.
△ Less
Submitted 21 December, 2016;
originally announced December 2016.
-
Quantum Decoding with Venn Diagrams
Authors:
C. M. F. Barros,
Francisco Marcos de Assis,
H. M. de Oliveira
Abstract:
The quantum error correction theory is as a rule formulated in a rather convoluted way, in comparison to classical algebraic theory. This work revisits the error correction in a noisy quantum channel so as to make it intelligible to engineers. An illustrative example is presented of a naive perfect quantum code (Hamming-like code) with five-qubits for transmitting a single qubit of information. Al…
▽ More
The quantum error correction theory is as a rule formulated in a rather convoluted way, in comparison to classical algebraic theory. This work revisits the error correction in a noisy quantum channel so as to make it intelligible to engineers. An illustrative example is presented of a naive perfect quantum code (Hamming-like code) with five-qubits for transmitting a single qubit of information. Also the (9,1)-Shor codes is addressed.
△ Less
Submitted 14 March, 2015;
originally announced March 2015.
-
Protecting Information Against Computational Errors and Quantum Erasures via Concatenation
Authors:
Gilson O. dos Santos,
Francisco M. de Assis
Abstract:
In this work, we introduce a new concatenation scheme which aims at protecting information against the occurrence of both computational errors and quantum erasures. According to our scheme, the internal code must be a quantum loss-correcting code that does not perform measurements, while the external code must be a quantum error-correcting code. We illustrate the concatenation proposed with an exa…
▽ More
In this work, we introduce a new concatenation scheme which aims at protecting information against the occurrence of both computational errors and quantum erasures. According to our scheme, the internal code must be a quantum loss-correcting code that does not perform measurements, while the external code must be a quantum error-correcting code. We illustrate the concatenation proposed with an example in which one qubit of information is protected against the occurrence of two erasures and one computational error.
△ Less
Submitted 20 May, 2013;
originally announced May 2013.
-
Unconditional Security with Decoherence-Free Subspaces
Authors:
Elloá B. Guedes,
Francisco M. de Assis
Abstract:
We show how to use decoherence-free subspaces over collective-noise quantum channels to convey classical information in perfect secrecy. We argue that codes defined over decoherence-free subspaces are codes for quantum wiretap channels in which the gain of information by a non-authorized receiver is zero. We also show that if some symmetry conditions are guaranteed, the maximum rate on which these…
▽ More
We show how to use decoherence-free subspaces over collective-noise quantum channels to convey classical information in perfect secrecy. We argue that codes defined over decoherence-free subspaces are codes for quantum wiretap channels in which the gain of information by a non-authorized receiver is zero. We also show that if some symmetry conditions are guaranteed, the maximum rate on which these secret communications take place is equal to the Holevo-Schumacher-Westmoreland capacity of the quantum channel.
△ Less
Submitted 18 April, 2012; v1 submitted 13 April, 2012;
originally announced April 2012.
-
A scheme to protect against multiple quantum erasures
Authors:
Gilson O. dos Santos,
Francisco M. de Assis
Abstract:
We present a scheme able to protect k >= 3 qubits of information against the occurrence of multiple erasures, based on the code proposed by Yang et al. (2004 JETP Letters 79 236). In this scheme redundant blocks are used and we restrict to the case that each erasure must occur in distinct blocks. We explicitly characterize the encoding operation and the restoring operation required to implement th…
▽ More
We present a scheme able to protect k >= 3 qubits of information against the occurrence of multiple erasures, based on the code proposed by Yang et al. (2004 JETP Letters 79 236). In this scheme redundant blocks are used and we restrict to the case that each erasure must occur in distinct blocks. We explicitly characterize the encoding operation and the restoring operation required to implement this scheme. The operators used in these operations can be adjusted to construct different quantum erasure-correcting codes. A special feature of this scheme is that no measurement is required. To illustrate our scheme, we present an example in which five-qubits of information are protected against the occurrence of two erasures.
△ Less
Submitted 4 January, 2012; v1 submitted 7 November, 2011;
originally announced November 2011.
-
Quantum Communication Complexity of Quantum Authentication Protocols
Authors:
Elloá B. Guedes,
Francisco Marcos de Assis
Abstract:
In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channe…
▽ More
In order to perform Quantum Cryptography procedures it is often essencial to ensure that the parties of the communication are authentic. Such task is accomplished by quantum authentication protocols which are distributed algorithms based on the intrinsic properties of Quantum Mechanics. The choice of an authentication protocol must consider that quantum states are very delicate and that the channel is subject to eavesdropping. However, even in face of the various existing definitions of quantum authentication protocols in the literature, little is known about them in this perspective, and this lack of knowledge may unfavor comparisons and wise choices. In the attempt to overcome this limitation, in the present work we aim at showing an approach to evaluate quantum authentication protocols based on the determination of their quantum communication complexity. Based on our investigation, no similar methods to analyze quantum authentication protocols were found in the literature. Pursuing this further, our approach has advantages that need to be highlighted: it characterizes a systematic procedure to evaluate quantum authentication protocols; its evaluation is intuitive, based only on the protocol execution; the resulting measure is a concise notation of what resources a quantum authentication protocol demands and how many communications are performed; it allows comparisons between protocols; it makes possible to analyze the communication effort when an eavesdropping occurs; and, lastly, it is likely to be applied in almost any quantum authentication protocol. To illustrate the proposed approach, we also bring results about its application in ten existing quantum authentication protocols (data origin authentication and identity authentication). Such evaluations increase the knowledge about the existing protocols, presenting its advantages, limitations and contrasts.
△ Less
Submitted 26 May, 2011;
originally announced May 2011.
-
Examples of the Generalized Quantum Permanent Compromise Attack to the Blum-Micali Construction
Authors:
Elloá B. Guedes,
Francisco Marcos de Assis,
Bernardo Lula Jr
Abstract:
This paper presents examples of the quantum permanent compromise attack to the Blum-Micali construction. Such attacks illustrate how a previous attack to the Blum-Micali generator can be extended to the whole Blum-Micali construction, including the Blum-Blum-Shub and Kaliski generators.
This paper presents examples of the quantum permanent compromise attack to the Blum-Micali construction. Such attacks illustrate how a previous attack to the Blum-Micali generator can be extended to the whole Blum-Micali construction, including the Blum-Blum-Shub and Kaliski generators.
△ Less
Submitted 8 December, 2010;
originally announced December 2010.
-
A Scheme of Concatenated Quantum Code to Protect against both Computational Error and an Erasure
Authors:
G. O. Santos,
F. M. Assis,
A. F. Lima
Abstract:
We present a description of encoding/decoding for a concatenated quantum code that enables both protection against quantum computational errors and the occurrence of one quantum erasure. For this, it is presented how encoding and decoding for quantum graph codes are done, which will provide the protection against the occurrence of computational errors (external code). As internal code is used enco…
▽ More
We present a description of encoding/decoding for a concatenated quantum code that enables both protection against quantum computational errors and the occurrence of one quantum erasure. For this, it is presented how encoding and decoding for quantum graph codes are done, which will provide the protection against the occurrence of computational errors (external code). As internal code is used encoding and decoding via scheme of GHZ states for protection against the occurrence of one quantum erasure.
△ Less
Submitted 31 May, 2010; v1 submitted 21 May, 2010;
originally announced May 2010.
-
Improving Classical Authentication with Quantum Communication
Authors:
F. M. Assis,
P. Mateus,
Y. Omar
Abstract:
We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more security t…
▽ More
We propose a quantum-enhanced protocol to authenticate classical messages, with improved security with respect to the classical scheme introduced by Brassard in 1983. In that protocol, the shared key is the seed of a pseudo-random generator (PRG) and a hash function is used to create the authentication tag of a public message. We show that a quantum encoding of secret bits offers more security than the classical XOR function introduced by Brassard. Furthermore, we establish the relationship between the bias of a PRG and the amount of information about the key that the attacker can retrieve from a block of authenticated messages. Finally, we prove that quantum resources can improve both the secrecy of the key generated by the PRG and the secrecy of the tag obtained with a hidden hash function.
△ Less
Submitted 11 February, 2010; v1 submitted 6 June, 2008;
originally announced June 2008.
-
Quantum Zero-error Capacity
Authors:
Rex A. C. Medeiros,
Francisco M. De Assis
Abstract:
We define here a new kind of quantum channel capacity by extending the concept of zero-error capacity for a noisy quantum channel. The necessary requirement for which a quantum channel has zero-error capacity greater than zero is given. Finally, we point out some directions on how to calculate the zero-error capacity of such channels.
We define here a new kind of quantum channel capacity by extending the concept of zero-error capacity for a noisy quantum channel. The necessary requirement for which a quantum channel has zero-error capacity greater than zero is given. Finally, we point out some directions on how to calculate the zero-error capacity of such channels.
△ Less
Submitted 8 November, 2006;
originally announced November 2006.
-
Quantum states characterization for the zero-error capacity
Authors:
Rex A C Medeiros,
Romain Alleaume,
Gerard Cohen,
Francisco M. de Assis
Abstract:
The zero-error capacity of quantum channels was defined as the least upper bound of rates at which classical information can be transmitted through a quantum channel with probability of error equal to zero. This paper investigates some properties of input states and measurements used to attain the quantum zero-error capacity. We start by reformulating the problem of finding the zero-error capaci…
▽ More
The zero-error capacity of quantum channels was defined as the least upper bound of rates at which classical information can be transmitted through a quantum channel with probability of error equal to zero. This paper investigates some properties of input states and measurements used to attain the quantum zero-error capacity. We start by reformulating the problem of finding the zero-error capacity in the language of graph theory. This alternative definition is used to prove that the zero-error capacity of any quantum channel can be reached by using tensor products of pure states as channel inputs, and projective measurements in the channel output. We conclude by presenting an example that illustrates our results.
△ Less
Submitted 8 November, 2006; v1 submitted 3 November, 2006;
originally announced November 2006.
-
Zero-error capacity of a quantum channel
Authors:
Rex A. C. Medeiros,
Francisco M. de Assis
Abstract:
We define the quantum zero-error capacity, a new kind of classical capacity of a noisy quantum channel. Moreover, the necessary requirement for which a quantum channel has zero-error capacity greater than zero is also given.
We define the quantum zero-error capacity, a new kind of classical capacity of a noisy quantum channel. Moreover, the necessary requirement for which a quantum channel has zero-error capacity greater than zero is also given.
△ Less
Submitted 26 March, 2004;
originally announced March 2004.
-
Quantum authentication scheme based on algebraic coding
Authors:
Rex A. C. Medeiros,
Francisco M. de Assis,
Bernardo L. Júior,
Aércio F. Lima
Abstract:
This paper presents a simple, but efficient class of non-interactive protocols for quantum authentication of $m$-length clas sical messages. The message is encoded using a classical linear algebraic code $C[n,m,t]$. We assume that Alice and Bob share a classical secret key, $x_{AB}$, of $n$ bits. Alice creates $n$ qubits based on the code word and the key, that indicates the bases used to create…
▽ More
This paper presents a simple, but efficient class of non-interactive protocols for quantum authentication of $m$-length clas sical messages. The message is encoded using a classical linear algebraic code $C[n,m,t]$. We assume that Alice and Bob share a classical secret key, $x_{AB}$, of $n$ bits. Alice creates $n$ qubits based on the code word and the key, that indicates the bases used to create each qubit. The quantum states are sent to Bob through a noiseless quantum channel. We calculate the failure probability of the protocol considering several types of attacks.
△ Less
Submitted 15 July, 2003; v1 submitted 14 July, 2003;
originally announced July 2003.