Literature DB >> 29196751

The solvability of quantum k-pair network in a measurement-based way.

Jing Li1, Gang Xu1,2, Xiu-Bo Chen3,4, Zhiguo Qu5, Xin-Xin Niu1,6, Yi-Xian Yang1,6.   

Abstract

Network coding is an effective means to enhance the communication efficiency. The characterization of network solvability is one of the most important topic in this field. However, for general network, the solvability conditions are still a challenge. In this paper, we consider the solvability of general quantum k-pair network in measurement-based framework. For the first time, a detailed account of measurement-based quantum network coding(MB-QNC) is specified systematically. Differing from existing coding schemes, single qubit measurements on a pre-shared graph state are the only allowed coding operations. Since no control operations are concluded, it makes MB-QNC schemes more feasible. Further, the sufficient conditions formulating by eigenvalue equations and stabilizer matrix are presented, which build an unambiguous relation among the solvability and the general network. And this result can also analyze the feasibility of sharing k EPR pairs task in large-scale networks. Finally, in the presence of noise, we analyze the advantage of MB-QNC in contrast to gate-based way. By an instance network [Formula: see text], we show that MB-QNC allows higher error thresholds. Specially, for X error, the error threshold is about 30% higher than 10% in gate-based way. In addition, the specific expressions of fidelity subject to some constraint conditions are given.

Entities:  

Year:  2017        PMID: 29196751      PMCID: PMC5712000          DOI: 10.1038/s41598-017-16272-x

Source DB:  PubMed          Journal:  Sci Rep        ISSN: 2045-2322            Impact factor:   4.379


Introduction

Quantum communication has become one of the most potential applications in quantum information since Bennet and Brassard have proposed a famous quantum key distribution (QKD) scheme in 1984[1]. Recently, point-to-point quantum communication is extending to quantum network[2,3] where nodes with quantum storage and processing power are connected by quantum channels to meet the demands with high capacity(the amount of messages transmitted per network use), long distance and networking. Quantum components, like QKD whose original idea is to create a string of random private key between two distant parties securely, have been even realized in network[4,5]. Quantum secure direct communication(QSDC)[6] in which secure message can be sent through quantum channel directly and need not to pre-share a private key are also generalized to accomplish the task in multi-parties[7,8]. This trend is also pushing other branches forward, such as quantum secret sharing(QSS)[9,10], quantum teleportation(QT)[11-13], quantum dense coding[14,15] and other sub-branches based on them[16-21]. In this context, because of the complexity of network structure, a difficult problem is how to efficiently transmit quantum information against channel or local nodes errors such as the bottleneck problem caused by links collision. Or we can conclude this problem as the network “solvability” for a given communication task usually with capacity constraints. Network coding[22,23] refers to perform coding operations (consist of the combination operations such as exclusive-or operation and replicate of the received classical bits) on intermediate nodes to achieve higher capacity, load balancing and lower computation complexity. As an underlying tool, it is proved to be an effective means for communication efficiency in all kinds of practical applications[24-27]. Note that, here, we call network coding especially for the set up transmitting classical bits as classical network coding(CNC). Zhou designed an efficiency and accuracy near-duplicate elimination approach for visual sensor networks[24]. A fast motion estimation method is proposed to reduce the encoding complexity to 20% time saving[25]. For reducing the computational complexity, a content similarity based fast reference frame selection algorithm is also proposed[26]. And some optimal cluster-based mechanisms are proved to be efficient for load balancing with multiple mobile sinks for these problems[27]. For the theoretical researches, many good results have been made. A simple and outstanding example is butterfly network (a typical 2-pair network) as shown in Fig. 1 in which two bits can be transmitted simultaneously from to and to via exclusive-or operation on , and . This capacity is generally not accomplished because of the capacity constraints in common channels . A network is solvable if there exists a network coding scheme (a choice of coding operations, also called solution)such that a given communication task is achievable. The solvability consider the question whether a given network is solvable for specific communication task with network coding. And two kinds network coding problems are mainly concerned: multicast problem[22] and multi-unicast problem (k-pair problem)[23]. In its first stage, multicast problem where all messages of the only source are needed by all sinks attracted wide attentions and effective solutions have been obtained by the min-cut/max-flow condition[22] and linear coding operations[28]. The k-pair problem is another important branch in network coding where the message of each source is only needed by its corresponding sink. The solvability is more complicated than multicast network problem. Researchers attempt to either design constructive coding schemes or present the necessary and/or sufficient conditions[29,30] for some specific networks. However, for more general k-pair network, it is still an open challenge.
Figure 1

Butterfly network.

Butterfly network. In this paper, our work is closest in spirit to these papers. Specifically, we also examine the solvability of general k-pair network. However, they are some essential differences in the problem setting which give rise to a new field–Quantum network coding(QNC). A typical difference is cloning. Classical bits can be accurately copied arbitrarily but it is not possible exactly for quantum bits because of quantum no cloning theorem[31]. In addition, different from classical butterfly network, it has proved that two qubits perfect transmission is not possible without any assistant resource for quantum butterfly network[32,33]. Consequently, QNC is not a simple repetition of CNC, but an important subject need to further study. The study on the solvability of quantum k-pair network got going in 2006[32]. Hayashi et al. firstly shown the butterfly network is solvable with fidelity strictly greater than 0.5. To analyze the solvability of specific network and to design constructive schemes with lower communication cost are still two major issues[34]. It is well known that the network solvability is closely related to its topology structure, and for general k-pair network, its determinant is still a challenge. Related to these studies, entanglement[33,35-39] is introduced to explore this problem. Kobayashi et al.[35,36] presented the sufficient condition for a class of k-pair network in gate-based framework. We call network coding as Gate-based QNC (GB-QNC) where the coding operations consisting of projective measurements and coherent control gates are performed node-by-node by simulating the coding scheme solving the classical problem. It is also proved to be effective in entanglement distribution[40,41]. In fact, The essence of its encoding process is to create entanglement. Therefore, there is no obvious boundaries between the entanglement creation and its use as a resource making the relationship between the solvability and network structure misty. It is worth mentioning that, Beaudrap[42] demonstrated that GB-QNC[35,36] is in fact a special case of measurement-based procedure[43]. In MB-QNC, coding operation consists of local (projective) measurements on a highly entangled resource graph state which are responsible for the transmission of quantum bits. In this sense, it also offers a potential experimental advantage since no coherent operations are concluded. MB-QNC which can systematize the coding operations is a desirable way to design efficient communication schemes. The solvability of some special networks in Measurement-based have been examined[39]. However, no solvability conditions are presented yet for general k-pair network. One contribution of this paper is to present sufficient conditions for the solvability with MB-QNC for the first time. To start with the correlation between network structures and graph states, the general process of MB-QNC is systematically specified. In contrast to the standard GB-QNC, no entanglement is created during the computation, we thus have a clear distinction between the entanglement creation and its use as a resource. Secondly, by reducing k-pair task to a specific clifford group operation, we build an unambiguous functional relationship between the solvability and the network structure with 2k eigenvalue equations. Further, for the question how to construct coding scheme? We present another sufficient condition given by the stabilizer matrix. This conclusion can also analyze the feasibility in the communication task to sharing k EPR pairs over arbitrary networks. The works above are mainly focused on the noiseless resource states and the perfect quantum operations. In 2016, Satoh[44] find that GB-QNC is more sensitive to noises especially on control operations. Specially, for pauli X and Z error, they prove that final fidelity would drop below 0.5 if the initial resource error is 10%. Motivated by these works, the performance of QNC in presence of noise is another concern in this paper. A second contribution of this paper is that we show the performance advantage of MB-QNC compared with GB-QNC. We will use a heuristic local Pauli-diagonal-noise channels to describe both errors. Since fidelity is usually difficult to calculate for complex network, we will work in stabilizer basis representation of mixed graph states by which the evolution of graph states can be easily tracked and just keeps them in diagonal form. Further, we present a set of constraint conditions to obtain more simpler expressions for fidelity in noisy resource error, noisy measurement error and both of them cases respectively. The property that multiple noises on the same qubit are equal to its the linear superposition makes us summarize all noises effects on resource state noise only. Finally, we apply above results to an instance butterfly network, showing that MB-QNC allows higher error threshold compared with the GB-QNC.

Results

Network Setting

The basic set up of a k-pair network is as follows. Specially, a general k-pair network here refers to a finite, directed and acyclic graph , where is the set of nodes or vertices, and is the set of edges, whose elements are pairs of nodes that are adjacent. The set of its k source nodes is , k sink nodes is and arbitrary intermediate nodes is . The quantum operations on each node are defined by any trace-preserving completely positive(CP-TP) map. The goal in any given k-pair network is to communicate k independent messages simultaneously from each source to its corresponding sink. Clearly, this task depends on the particular properties of the network and it might or might not be possible to achieve for the given G, S, and T. We shall be concerned with cases where the actual network topology given by G does not allow disjoint paths between the qubits in S and the qubits in T, but we nevertheless want to achieve perfect state transfer. Let be a Hilbert space where C is complex field, we say is quantum solvable with fidelity if there is choice of quantum operations(QNC scheme) over all nodes allowing us to send a quantum state supported on the source nodes to the sink nodes with fidelity at least F. In particular, when F = 1, it is simply called (perfect) solvable. Here we consider MB-QNC local projective measurements on a highly entangled resource graph state associated to the network are responsible for the transmission of quantum bits. Among all research hotspots in k-pair network, Butterfly network and G network keep appearing in a high frequency, as denote in Figs 1 and 2.
Figure 2

G network.

G network.

Graph state and its properties

Now, we review the concept of graph state, describe some of its properties, and fix the notation. It is sufficient to describe graph states with undirected finite graphs since the interaction of pairs of qubits are not necessarily bound up with the direction of edges. A undirected finite graph is an ordered pair of sets: the set of nodes or vertices, and the set of edges, whose elements are pairs of nodes that are adjacent. In the following, we will mainly consider simple graph which contains neither loops (edges connecting nodes with itself) nor multiple edges between the same vertices. The set of nodes adjacent with is denoted by , simply by , the set of other nodes is simply denoted by and the degree is the number of nodes in . The adjacency relation gives rise to an adjacency matrix , where , if , otherwise . The adjacency relation of node can be represent by adjacency vector . A graph state[45] is a quantum state associated with a graph G, where vertices correspond to qubits and edges to interactions. A common description of graph states by stabilizer formalism is described as follows. For a graph G, there are stabilizer operators (one for each vertex ) defined aswhere X, Y, Z are the Pauli operators. A pure graph state , , is a common eigenstate of all stabilizer operators withhere is the ith component of corresponding to , forms a basis we call graph state basis. Graph state is uniquely stabilized by , namely, is the stabilizer of , is the set of generators (that is, each element in can be represented in this set). We say is the correlation center on which we perform X operation and its neighbor nodes perform Z operation. An alternative description[45] is by means of the interaction picture, where is created by preparing all qubits in the state where And then applying a control operator for each edge , where is the control qubit and is the target qubit, that is Through this paper, we will use both these two descriptions alternatively. In our following schemes, keeping track of the evolution of graph state is crucial to calculate the final fidelity. Here, we will give this evolution of pure graph state under pauli operators by adjacency matrix . For any graph state , where and denote the components of corresponding to nodes in and , where i is a natural number, respectively. One can verify the following equations. For the case of single qubit pauli operations on the ith node , it satisfies[46] that where denotes the bitwise complement with , , and is the imaginary unit. By extending above properties to the case of multiple particles, we obtain that where , . Here and likewise for , . Eq. (7) follows immediately from Eqs (4) and (8) can be verified by direct calculation with . Finally, Eqs (7) and (8) imply thatthus together with , Eq. (9) holds.

MB-QNC over noiseless quantum network

The general MB-QNC procedures

Here, the general process of MB-QNC is systematically specified. In contrast to the standard GB-QNC, no entanglement is created during the computation, we thus have a clear distinction between the entanglement creation and its use as a resource. The MB-QNC has several important components , The network graph G: the preparation of resource graph state . The solvability are closely related to it; The set of input nodes and output nodes : The holders and receivers of quantum information. By specifying them, the k-pair network problem is reduced to some quantum operations; Measurement pattern : the MB-QNC solution, it includes measurement basis and measurement order. The main task of MB-QNC is to design a suitable measurement pattern for a given network problem. The general steps of the MB-QNC scheme are as follows: Encode information into initial graph state pre-shared among all distant nodes; Apply local single qubit measurements on intermediate nodes and source nodes; Send the measurement results to output nodes and apply local Pauli operations to correct phases. A specific network for k = 2 and k = 4 have been examined in measurement-based way[39]. And for general k-pair network, exact conditions should be developed in measurement-based framework. In following, we will give the sufficient conditions.

The sufficient conditions for solvability of general k-pair networks

For quantum k-pair problem, all source-sink pairs wish to communicate simultaneously in network with common channel. This task would equivalent to a specific unitary operation–k qubits permutation , where is a bijective with , . is any k qubits state held by source nodes and output by source nodes, we have Raussendorf et al.[43] shows the conditions for simulating any unitary operations successfully in measurement-based way. We generalize this conclusion to quantum k-pair problem. Since the permutation operation mapped pauli operators onto pauli operators under conjugation, that is, Therefore is Clifford group operations defined as the operations map Pauli group operators to itself under conjugation. Browne et al.[45] shows that all Clifford group operations can be implemented by measurement pattern with Pauli measurements alone which are parallelized in chronological order. This makes the solvability can be examined in relatively simple measurement pattern–Pauli measurement. Letdenotes the pauli measurement on vertex , where . Specifically, denotes -basis measurement if ; -basis measurement if ; Z-basis measurement if , and labels the measurement outcome , respectively. Consequently, a deduced result would be obtained. Theorem 1. Let be a -pair network graph with and is a corresponding graph state. Suppose there exists a pauli measurement pattern on intermediate nodes such that obeys the eigenvalue equations where , are the function of measurement outcomes. Then -pair network is solvable up to some local Pauli operators with the measurement pattern on and described by and X-basis measurements respectively, With the correlation between quantum k-pair networks and a highly entangled graph states, by reducing k-pair task to a specific clifford group operation, the sufficient conditions is constructed with 2k eigenvalue Equations (15) and (16), building an unambiguous functional relationship between the solvability and the network structure. However, how should we design proper measurement pattern meeting these eigenvalue equations and what conditions the measurement pattern should exactly satisfies? From this point, another sufficient condition is given by the stabilizer matrix and adjacency matrix. Note that by selecting a range of correlation centers denoted by , we can construct stabilizer equations. Thus the product of these stabilizer generators are represented bywith , where . For all these , we call the stabilizer matrix. Now, we consider the solvability with this stabilizer matrix and adjacency matrix. Corollary 2 Let graph be a -pair network with adjacency matrix . If stabilizer matrix satisfies the following conditions (1)  and are the form of and , respectively, and are identity matrix and zero matrix, (2)  For any given column in and , implies or , . Then network is solvable with MB-QNC. Further, the exact parameters and in each measurement basis as in Eq. (12) can be obtained from and , respectively. Note that Theorem 1 does not imply anything about how to construct measurement basis, but Corollary 2 does by the conditions stabilizer matrix meet. It is helpful to propose specific network coding in measurement-based way. Note that Theorem 1 and Corollary 2 can also be used as the analysis of feasibility and the design of schemes for sharing EPR pairs simultaneously for some communication tasks only if we do not measure input qubits since it is the unique quantum state (up to a global phase) which is stabilized by these operators and .

An instance network G

In the following, we apply the results developed above to an instance -pair network as shown in Fig. 2, in which k source-sink pairs sharing a common channel wish to communicate with each other simultaneously. Here we introduce input nodes for quantum states to be transferred. Now, all nodes are denoted by as shown in Fig. 3. In maths, all nodes in network graph can be divided into two disjoint parts , . The solvability of network can be easily verified by Corollary 2.
Figure 3

Network with introduced input nodes.

Network with introduced input nodes. The adjacency matrix of graph obtained from its partition isWe find a matrix satisfies the conditions (1) and (2). Thus is solvable in MB-QNC. In fact, by matrix , we can construct stabilizer equations Measure the intermediate nodes in -basis, we get classical results . The above equations induce the following eigenvalue equations for projected state by measurements on with , where , we have Also with these measurement pattern, we can share EPR pairs among the source-sinks pairs simultaneously just leaving the input qubits unmeasured.

The performance benefits of MB-QNC over noisy k-pair network

The transmission of quantum resource states also measurement on them will reduce the performance of long-range quantum information processing schemes. Moreover, encoding on intermediate nodes even makes things worse. Satoh[44] shows that Gb-QNC is more sensitive to noise errors. The performance optimization in presence of noise is another concern of QNC. In this section, we explore the benefits of MB-QNC by k-pair communication instance and the merit of it is shown in terms of the output fidelity.

Noise model and assumptions

We mainly consider two kinds of noise sources: noisy resource states and noisy measurement caused by the errors on channel and imperfect projective measurements. Local Pauli-diagonal-noise channels are applied to described these errors. Specially, the effect on the ath qubit according to a probability iswhere is the density operator, is the error parameter with , . We assume that it is independent and identically distributed on each quantum systems, i.e. . That is well justified since in large-scale network the separation among the participants is large enough so that collective effects need not be taken into account. Some special channels of this kind include the bit-flip channel (with random noise) with , the phase-flip channel (with random noise) with , the bit-phase-flip channel here we denote as with and the depolarizing white-noise channel with , . In addition, it assumes that a pre-prepared graph state according to network is distributed through noise channel.

Channel transmission errors

Generally speaking, the output fidelity of a general -pair network is hard to calculate. However, we will work in stabilizer basis representation of mixed graph states by which the evolution of graph states can be easily tracked and just keeps the graph state in diagonal form. Further, we present a set of constraint conditions to obtain some simpler expressions of fidelity. The noisy evolution of graph state in stabilizer basis: Let the prepared graph state be . Since pauli operators map graph state basis to itself by properties (4)–(6), we consider mixed graph states diagonal in the graph state basis, , with , and . We have the graph state in diagonal form[47].where the coefficient . In this form, the fidelity can be described as Thus the final fidelity would be closely related to the change of parameter . Firstly, we will describe it according the noise evolution of graph state. Since local Pauli-diagonal-noise channels on each subsystem except input qubits, (as the set of all under addition module 2 is a group which is isomorphism to ). It denotes no errors on input qubits are considered, similar to . Accordingly, in local Pauli-diagonal-noise channels, the state evolution maps initial graph state to mixed graph statewhere . According to Eqs (7–9), graph state basis is closed under pauli operators and only subscripts are transformed. Thus we have Here, since traverses all value of , it builds a surjection between and . Thus we have, for each , Under channel noise, the evolution of graph state which embodied in the coefficient of each stabilizer element can be described for a special error parameter as in Eq. (29).

Perfect measurement evolution in stabilizer basis

The action of Pauli measurements can also be easily described in this formalism as a transformation of the graph (up to some local unitaries) and also keep the graph state in stabilizer basis: it just multiplies each stabilizer basis by a coefficient. In terms of the stabilizer operators, the measurement of commutes with , anticommutes with all , . Thus After tracing out qubit , the new stabilizer iswhere the new corresponds to a new graph obtained from by removing or transforming the neighborhood of vertex . In fact, as described in Cuquet et al.’s ref.[47] measurement of simply disconnects the measured qubit from the rest of the graph, while and transform the neighborhood of the measured qubit and then disconnect it. Here, the phase can be corrected by since . By the constraint conditions , each measurement on subsystem will remove some certain and leave the remains combining like terms. Here, is closely related the choice of neighbor node of . Thus, by Hein et al.’s ref.[48],where for ,, . In addition, for and , we can divide as Consequently, for , -basis measurement on leads Theorem 2. In network , we denote as . Measurement with -basis on leads to a new with That is, subscript is replaced by , is deleted and others remain unchanged. For example, we measure node with -basis, and as the selected neighbor node with . It implies that , and . Thus, this measurement leads a new neighborhood that build a new graph as shown in Fig. 4. Each is transformed as Here, all pauli components of the measured subsystem in are deleted. Furthermore, a constraint condition can be attained, that is . The details about the transform of and the constraint conditions can be seen in Table 1. Finally, we get the constraint conditions:
Figure 4

The new graph after measure node with -basis. Node and all edges connected to it is disconnected denoted by dotted lines and the transformed neighborhoods denote by bold lines.

Table 1

Transformation of subscript after each measurement. After the measurement on with , and selected neighbor node , the initial is transformed to with constraints ( ), until the final measurement on with , and selected neighbor node , is transformed to with constraints ( ).

initial \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\boldsymbol{x}}$$\end{document}x measured nodes and basisselected neighbor nodesresults \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\bar{{\boldsymbol{x}}}$$\end{document}x¯ with constraints \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${{\boldsymbol{\delta }}}_{{\bf{0}},{\sum }_{{\boldsymbol{v}}\in {\boldsymbol{N}}({\boldsymbol{u}})}{{\boldsymbol{x}}}_{{\boldsymbol{v}}}}$$\end{document}δ0,vN(u)xv
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{1},\cdots ,{x}_{3k+2}$$\end{document}x1,,x3k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${P}_{{X}_{k+1}}$$\end{document}PXk+1 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${v}_{1}$$\end{document}v1 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{k+1},{x}_{2},\cdots ,{x}_{3k+2}$$\end{document}xk+1,x2,,x3k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$({C}_{1}){x}_{1}+{x}_{2k+1}+{x}_{2k+4}+\cdots +{x}_{3k+2}=0$$\end{document}(C1)x1+x2k+1+x2k+4++x3k+2=0
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ddots $$\end{document} \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ddots $$\end{document} \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ddots $$\end{document} \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ddots $$\end{document} \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ddots $$\end{document}
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{k+1},{x}_{2},\cdots ,{x}_{3k+2}$$\end{document}xk+1,x2,,x3k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${P}_{{X}_{2k}}$$\end{document}PX2k \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${v}_{k}$$\end{document}vk \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{k+1},\cdots ,{x}_{2k},$$\end{document}xk+1,,x2k, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+1},{x}_{2k+2},$$\end{document}x2k+1,x2k+2, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+3},\cdots ,{x}_{3k+2}$$\end{document}x2k+3,,x3k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$({C}_{k}){x}_{k}+{x}_{2k+1}+{x}_{2k+4}+\cdots +{{x}}_{3k+1}=0$$\end{document}(Ck)xk+x2k+1+x2k+4++x3k+1=0
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{k+1},\cdots ,{x}_{2k},$$\end{document}xk+1,,x2k, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+1},{x}_{2k+2},$$\end{document}x2k+1,x2k+2, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+3},\cdots ,{x}_{3k+2}$$\end{document}x2k+3,,x3k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${P}_{{X}_{2k+2}}$$\end{document}PX2k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${v}_{2k+3}$$\end{document}v2k+3 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{k+1},\cdots ,{x}_{2k},{x}_{2k+1},$$\end{document}xk+1,,x2k,x2k+1, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+2}+{x}_{k+2}+\cdots +{x}_{2k},$$\end{document}x2k+2+xk+2++x2k, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+4},\cdots ,{x}_{3k+2}$$\end{document}x2k+4,,x3k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$({C}_{k+1}){x}_{2k+1}+{x}_{2k+3}+\cdots +{x}_{3k+2}=0$$\end{document}(Ck+1)x2k+1+x2k+3++x3k+2=0
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{k+1},\cdots ,{x}_{2k},{x}_{2k+1},$$\end{document}xk+1,,x2k,x2k+1, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+2}+{x}_{k+2}+\cdots +{x}_{2k},$$\end{document}x2k+2+xk+2++x2k, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+4},\cdots ,{x}_{3k+2}$$\end{document}x2k+4,,x3k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${P}_{{X}_{2k+1}}$$\end{document}PX2k+1 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${v}_{2k+3}$$\end{document}v2k+3 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{k+1},\cdots ,{x}_{2k},$$\end{document}xk+1,,x2k, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+1}+{x}_{2k+4}+\cdots +{x}_{3k+2},$$\end{document}x2k+1+x2k+4++x3k+2, \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{2k+4},\cdots ,{x}_{3k+2}$$\end{document}x2k+4,,x3k+2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$({C}_{k+2}){x}_{k+1}+{x}_{2k+2}+{x}_{k+2}+\cdots +{x}_{2k}=0$$\end{document}(Ck+2)xk+1+x2k+2+xk+2++x2k=0
The new graph after measure node with -basis. Node and all edges connected to it is disconnected denoted by dotted lines and the transformed neighborhoods denote by bold lines. Transformation of subscript after each measurement. After the measurement on with , and selected neighbor node , the initial is transformed to with constraints ( ), until the final measurement on with , and selected neighbor node , is transformed to with constraints ( ). After all rounds of measurement, will be deleted as long as the conditions are not met. From the remaining, the exact fidelity associated with these constraints will be given. Denote as the subscripts satisfying these constraint conditions, the final fidelity is represented as Specially, fidelity for bit-flip channel noise is with ; for phase-flip channel noise is with ; for bit-phase-flip channel noise is ; and for depolarizing white-noise channel noise is with .

Imperfectly local operations: the evolution of measurement in stabilizer basis

Another noise resource we consider is the imperfectly local measurement. Here, noisy measurements can be described by a two-step process, a perfect measurement is applied after noise acts on all particles that are subjected to the measurement, that is, . Therefore, in the presence of imperfect operation, the Eq. (35) still holds. For the case of both these two noises, an important property is that multiple noises on the same qubit are equal to the linear superposition of multiple error parameters[49], that is, , where is a linear function of the channel noise and imperfectively operation noise . Therefore, one can summarize the effect of all noises by a single noisy channel , acting on all the network nodes(except the input nodes) should be understood as representing all kinds of imperfections in noisy resource state and noisy measurements. The final fidelity is represented as

Performance Comparision

Compared with GB-QNC in Satoh et al.’s scheme[44], the MB-QNC has significant advantage in the final fidelity which can be shown in the task of sharing EPR pairs in -pair network. We assume the same error that each single subsystem suffers. Consider network instance for . Firstly, by the Eq. (34), we get the constraint condition Thus we have all meet Eq. (37) in Table 2. When errors exist with , we have and . The fidelity can be calculated byFor random errors, and . The fidelity can be calculated by
Table 2

All meet the constraint conditions in Eq. (37).

\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\bar{{\boldsymbol{x}}}=({x}_{3},{x}_{5},{x}_{7},{x}_{1},{x}_{2},{x}_{4},{x}_{6},{x}_{8})$$\end{document}x¯=(x3,x5,x7,x1,x2,x4,x6,x8)
00000000000011100001010100011011
01100000011011100111010101111011
10100000101011101011010110111011
11000000110011101101010111011011
All meet the constraint conditions in Eq. (37). In fact, for some and , , will be deleted as the cancellation coefficient and the remaining can be seen in Table 3. Consequently, we get Eqs (38) and (39).
Table 3

The parameters and keep , . In Eqs (38) and (39), constant coefficients equal to 0 as the cancellation coefficient leading some , cancelled. Take and for example which are belong and not belong to Table 3. and .

\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\boldsymbol{e}}$$\end{document}e \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\boldsymbol{f}}$$\end{document}f
0000000000100000010000000110000000000000
1000000010100000110000001110000000000111
0000010000100100010001000110010011100000
1000010010100100110001001110010011100111
The parameters and keep , . In Eqs (38) and (39), constant coefficients equal to 0 as the cancellation coefficient leading some , cancelled. Take and for example which are belong and not belong to Table 3. and . By comparing with the GB-QNC in Satoh et al.’s scheme, as shown in Fig. 5, MB-QNC allows higher error threshold. For X error, the error threshold is about 30% in MB-QNC is significantly better than in GB-QNC 10%. And the threshold for Z error, it is slightly better than it.
Figure 5

Compared with the GB-QNC in Satoh et al.’s scheme. For X error, the error threshold is about 30% in MB-QNC is significantly better than in GB-QNC 10%. And the threshold for Z error, it is slightly better.

Compared with the GB-QNC in Satoh et al.’s scheme. For X error, the error threshold is about 30% in MB-QNC is significantly better than in GB-QNC 10%. And the threshold for Z error, it is slightly better.

Discussion

In this paper, we firstly present sufficient conditions for the solvability of general quantum k-pair network with MB-QNC. It solve the central question in quantum communication whether a given network usually with capacity constraints can handle a specific joint communication task. With the correlation between quantum k-pair networks and a highly entangled graph states, the sufficient conditions is constructed by 2 k eigenvalue Equations (15) and (16). Thus a quantifiable relationship between solvability and network structure is built. Further, for the question how to construct coding scheme and what conditions the coding operations should exactly satisfies? We present another sufficient condition given by the stabilizer matrix and adjacency matrix. It would helpful in designing specific coding scheme for quantum communication tasks to attain high capacity. We find that it would be also helpful in constructively analyze the feasibility to sharing k EPR pairs over arbitrary networks. Finally, we show that in the same initial error parameter, MB-QNC allows higher error threshold compared with the existing GB-QNC. Thus, we optimize transmission schemes to better defend the effects of noisy resource states and noisy measurement caused by channel errors and imperfect local operations. Take an instance network , the analysis shows that for X error, the error threshold about 30% in MB-QNC is significantly better than in GB-QNC 10%. And the threshold for Z error is slightly better. This conclusion can be extended to any quantum k-pair network who has a classical linear network code since it is in effect a measurement-based procedure which performs only X-eigenbasis measurements, on a graph state with similar structure to the coding network. In experimental implementations, despite the fact that projective measurement involved in measurement-based way can nowadays be implemented, the hardest task from experimental point of view is the distribution of graph states in large scale quantum network. In general, the fidelity drops exponentially with the growth of network size. At present, entanglement purification[50] and entanglement distillation[51] are two main techniques to improve the initial fidelity of the prepared entanglement states. For arbitrary (complex) network, the schemes for graph states distribution in the presence of noise have been implemented efficiently[47]. So, our scheme would be implemented in experiment with the current quantum techniques. This also makes MB-QNC schemes very attractive from an experimental perspective.

Method

Proof of Corollary 2

In order to prove Corollary 2, we construct stabilizer equations with row vectors of matrix as follow:where denotes the total numbers of performing pauli operation on with is the th column of and. Since the former and the late columns of and have the form and by condition (1), the stabilizer equations can be rewrite as Now we construct measurement basis from and . First, define as “” denote the column vector of a matrix. It is obviously that for all , . We claim that is the desired measurement pattern. It can be verified by performing on all stabilizer equations. By condition (2), or , thus we havewhich implies the Eqs (15 and 16). Therefore, -pair network is solvable by Theorem 1.

Proof of Theorem 2

In order to study the transformation of the subscript after measurement, we will discuss each component of the Eq. (32). First, it is easy to verified that the component since is a bigraph. Thus, Eq. (32) can be reduced to Also by the bigraph property, we haveAnd for , we haveHere, is divided into two disjoint set,As mentioned above, the measurement on transforms to where node and edges connected to it will be deleted. Meanwhile, with these changes, some edges will be set up. Specially,will be deleted andwill be set up. Next, we will compute the subscript changes in the . Note that the change of adjacency relation is only shown between the nodes and , and other nodes do not change. Therefore, we only consider the transformation from Eqs (49) to (50). We have, for any , ,andSimilarly, we havesince . Note that by , . Thus Eq. (51) is transformed to Although here Hadamard operator is introduced, it does not affect the final fidelity value, which can be seen from the expression of fidelity. Therefore, we the Eq. (33) holds.
  6 in total

1.  Dense coding in experimental quantum communication.

Authors: 
Journal:  Phys Rev Lett       Date:  1996-06-17       Impact factor: 9.161

2.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.

Authors: 
Journal:  Phys Rev Lett       Date:  1993-03-29       Impact factor: 9.161

3.  Field test of wavelength-saving quantum key distribution network.

Authors:  Shuang Wang; Wei Chen; Zhen-Qiang Yin; Yang Zhang; Tao Zhang; Hong-Wei Li; Fang-Xing Xu; Zheng Zhou; Yang Yang; Da-Jun Huang; Li-Jun Zhang; Fang-Yi Li; Dong Liu; Yong-Gang Wang; Guang-Can Guo; Zheng-Fu Han
Journal:  Opt Lett       Date:  2010-07-15       Impact factor: 3.776

4.  The quantum internet.

Authors:  H J Kimble
Journal:  Nature       Date:  2008-06-19       Impact factor: 49.962

5.  Deterministic entanglement distillation for secure double-server blind quantum computation.

Authors:  Yu-Bo Sheng; Lan Zhou
Journal:  Sci Rep       Date:  2015-01-15       Impact factor: 4.379

6.  Purification of Logic-Qubit Entanglement.

Authors:  Lan Zhou; Yu-Bo Sheng
Journal:  Sci Rep       Date:  2016-07-05       Impact factor: 4.379

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.