Literature DB >> 29233989

Round complexity in the local transformations of quantum and classical states.

Eric Chitambar1, Min-Hsiu Hsieh2.   

Abstract

In distributed quantum and classical information processing, spatially separated parties operate locally on their respective subsystems, but coordinate their actions through multiple exchanges of public communication. With interaction, the parties can perform more tasks. But how the exact number and order of exchanges enhances their operational capabilities is not well understood. Here we consider the minimum number of communication rounds needed to perform the locality-constrained tasks of entanglement transformation and its classical analog of secrecy manipulation. We provide an explicit construction of both quantum and classical state transformations which, for any given r, can be achieved using r rounds of classical communication exchanges, but no fewer. To show this, we build on the common structure underlying both resource theories of quantum entanglement and classical secret key. Our results reveal that highly complex communication protocols are indeed necessary to fully harness the information-theoretic resources contained in general quantum and classical states.

Entities:  

Year:  2017        PMID: 29233989      PMCID: PMC5727054          DOI: 10.1038/s41467-017-01887-5

Source DB:  PubMed          Journal:  Nat Commun        ISSN: 2041-1723            Impact factor:   14.919


Introduction

One of the most fascinating aspects of quantum information is how classical communication can enhance quantum information processing. For instance, “mixed” entanglement shared between two or more parties can be “purified” when the parties are allowed to perform Local quantum Operations on their subsystems and Communicate Classically with one another[1], a process known as LOCC. An analog of this purification procedure can be found in the classical theory of secret correlations. Rather surprisingly, secret correlations shared between two or more parties can be strengthened by the parties performing Local stochastic Operations and “leaking” information partially through Public Communication[2-4], a process known as LOPC. In all LOCC/LOPC protocols, the parties take turns exchanging information with one another, information that is extracted locally from their respective subsystems and earlier rounds of communication. In both settings, the principle is the same: resource manipulation (whether it be entanglement or secrecy) becomes more powerful when public classical communication is allowed. For a distributed information-theoretic task, its communication complexity quantifies the minimum amount of messages that must be exchanged in order to perform the task[5-8]. A more fine-grained notion of communication complexity emerges by considering communication exchanges within a certain number of rounds. The r-round communication complexity of a task is the minimum amount of communication needed to perform the task in a protocol, lasting no more than r-rounds. The subject of r-round communication complexity has received notable attention on both the classical and quantum sides[9-14]. One of the most well-known examples is the so-called “pointer jumping” problem, which is known to demonstrate an exponential gap between the r − 1 and r-round communication complexity when computing the r th pointer value[15-17]. Even stronger, such a gap exists if quantum communication is allowed[12] (i.e., the parties can exchange qubits with one another each round, something prohibited in the LOCC model). The complexity of a distributed information-processing task can also be measured in terms of its round complexity, which quantifies the minimum number of communication rounds needed to perform the task, regardless of the total communication cost. Round complexity becomes an important question in distributed tasks where the parties do not want to share with one another all their local information, such as in secure function computation[18] and interactive prover scenarios[19]. Round complexity is also a meaningful measure of complexity when constraints are placed on the allowed types of communication, particularly in the LOPC/LOCC frameworks where private/quantum communication is not allowed. Without such constraints, one round of communication is always sufficient to perform any distributed information processing task since one party can just transmit all of his/her local information to the other. In contrast, certain tasks such as generating secret correlations/quantum entanglement are impossible in the LOPC/LOCC settings, even when the parties can exchange an unbounded amount of public communication. LOPC/LOCC round complexity is thus a fundamental property of multi-party tasks that captures the necessity of interaction for optimal resource manipulation. An important practical motivation for studying this property follows from relativistic constraints that place a limitation on how quickly messages can be sent between spatially separated parties. Round complexity thereby places a lower bound on the time needed to perform a given task. As a result, with more round complexity, there is a greater reliance on classical or quantum memories, something generally undesirable due to the fragility of quantum systems. A comprehensive understanding of LOCC/LOPC round complexity is still lacking. It is known that two-round protocols can be strictly superior to one-way schemes for distilling classical key from wire-tapped sources[3]. On the quantum side, clear separations between one-round and two-round protocols have been demonstrated for various quantum information-processing tasks such as asymptotic entanglement distillation[1], tripartite entanglement transformations[20], quantum state discrimination[21-25], and recently, the simulation of nonlocal gates using shared entanglement[26]. However, none of these results have been able to establish an operational separation between each of the finite-round LOCC classes in terms of the most basic LOCC tasks: manipulating a quantum state from one form to another. It has been previously unknown whether or not every LOCC transformation ρ → σ can be completed using a constant number of communication rounds, even if an unbounded amount of classical communication is allowed. Here we construct, for any integer r ≥ 1 families of quantum (resp. classical) states for which a minimum of r communication rounds is both necessary and sufficient to obtain pure-state entanglement (resp. secret shared randomness). Such a phenomenon might be unexpected given that every bipartite pure-state transformation |ψ〉 → |ϕ〉 can be accomplished in just one round of LOCC, regardless of the dimensions[27]. Our findings imply that there exists no universal upper bound on the number of LOCC/LOPC rounds needed to perform such tasks, universal in the sense that it holds for states of all dimensions/alphabet size. Rigorously proving that this claim is a delicate matter since the general structure of LOCC and LOPC protocols is quite complex, allowing for arbitrary local operations and arbitrary interactive communication schemes[28]. With this complexity, it is difficult to definitively rule out the possibility of some clever round-compression technique that could always reduce the number of communication exchanges below some finite threshold, regardless of the system sizes. In fact, such a clever round-compression strategy is precisely what allows for the restriction to just one-way protocols for all bipartite pure-state transformations |ψ〉 → |ϕ〉[29]. Our work makes use of an analogous structure underlying both LOCC and LOPC protocols, and it conducts an analysis that applies to both the quantum and classical problems.

Results

The LOCC and LOPC frameworks

The problems studied in this paper involve two trustworthy parties (Alice and Bob) and one unwanted third party (Eve). When Alice, Bob, and Eve are holding quantum systems, we denote their joint state by ρ . In contrast when Alice, Bob, and Eve are holding random variables X, Y, and Z, we denote their joint probability distribution by p . These variables range over sets , , and , respectively, and the probability of event (x, y, z) will be denoted by . When the underlying random variables are clear, we will simply write the probabilities by p . Conditional probabilities are denoted, for example, by . In an LOCC protocol, Alice and Bob take turns performing a local quantum instrument, which is a collection of completely positive (CP) maps such that is trace-preserving[28]. The index λ represents the “measurement outcome” of the instrument, which is communicated to the other party, thereby correlating the choice of future local instruments to previous measurement outcomes. For the problem considered in this paper, we will be considering instruments in which each local CP maps has the form , where the {K } form a complete set of Kraus operators; i.e., . In an LOPC protocol, Alice and Bob share random variables X and Y, respectively. They proceed with multiple iterations of public communication where the i th message M is the stochastic output of a channel performed to (P, M <), where P ∈ {X, Y} is the variable of the announcing party in the i th round and denotes the sequence of messages generated in the previous i − 1 rounds. At the end of the protocol, Alice and Bob generate output variables and that are obtained by processing (X, M) and (Y, M), respectively, where M represents all communication variables generated throughout the protocol. For both LOCC and LOPC, an r-round protocol consists of r classical communication exchanges between the parties. One conceptual difference between the LOCC and LOPC settings is that in the latter, the presence of an unwanted eavesdropping party is always taken into account. Thus, a copy of the public communication M is shared by Eve, and a general LOPC protocol generates a transformation of probability distributionsThe fundamental resource unit in entanglement theory is the entangled bit (ebit), which has the form . In classical secrecy theory, the basic resource unit is the secret bit (sbit). This is any distribution over the sets of the form , where p is an arbitrary distribution for Eve. Alice and Bob’s main concern is how much Eve is correlated with their variables, rather than the specific distribution over her variable. Hence, we will adopt the notation that Φ denotes a sbit, with Eve’s uncorrelated distribution being unspecified. For partially entangled two-qubit states and for non-uniform secret-shared bits, we will write Here δ , for example, is the distribution over that has x = 0 with unit probability. The entropy of Φ is h(λ), where .

Transformations with high round complexity

Our results are based on a family of tripartite distributions, which we call the origami distributions. The family is given by the set , with b ( being a tripartite probability distribution taking on values for each fixed pair of values (i,λ); i.e., event (x, y, z) occurs with probability and . The structure of these distributions is described recursively with b (1, having the form: The 8 events of (x, y, z) having nonzero probability in b (1, are those in which z lies in row y and column x, as shown in this grid. The probabilities of these events are for even values of x, for odd values of x, and . In other words, b (1, consists of four blocks of uniform probability, each corresponding to a different value of z. Within each block, X and Y are perfectly correlated, but with a nonuniform distribution (λ, 1 − λ). For example, the event (X = 1, Y = 2, Z = 3) occurs with probability 1/8 according to distribution b (1,, while the event (X = 1, Y = 2, Z = 2) occurs with probability zero. Before describing the full set of distributions , let us note the crucial structural properties of b (1, that we will want to generalize. The distribution b (1, decomposes into two parts —the first with Y ∈ {0, 1} and the second with Y ∈ {2, 3}—such that within each of these sub-parts Alice can determine both the value of Y and Z from her value of X (see Fig. 1). A simple one-round protocol allowing Alice to “unlock” this information involves Bob announcing message M where M = 0 if Y ∈ {0, 1} and M = 1 if Y ∈ {2, 3}. This message will not leak any information to Eve, since by the structure of b (1,, M is also a function of Z; i.e., Eve learns no more information about XY from M than what she already knows from Z. Secret correlations Φ are then obtained by Alice and Bob applying the local functions:Even in this relatively simple case, it is not immediately obvious that the described LOPC protocol is essentially the only one-round protocol allowing Alice and Bob to establish secret key. However, the structure of b (1, ensures that Eve will have side information of any common function computed locally by Alice and Bob unless at least one of the parties can determine the value of Z (see Supplementary Note 1). The only way to achieve this in one-round of communication is by Bob revealing whether Y ∈ {0, 1} of Y ∈ {2, 3}.
Fig. 1

A One-Round LOPC for Obtaining Secret Correlations from b (1,. Bob announces whether the value of Y belongs to either {0, 1} or {2, 3}. Using this information, Alice can determine the values of both Y and Z from her value of X. Relabeling then brings Alice and Bob’s distribution into standard form Φ, independent of Z

A One-Round LOPC for Obtaining Secret Correlations from b (1,. Bob announces whether the value of Y belongs to either {0, 1} or {2, 3}. Using this information, Alice can determine the values of both Y and Z from her value of X. Relabeling then brings Alice and Bob’s distribution into standard form Φ, independent of Z To build larger-round distributions, the idea will be to “copy and shift” b (1, into a multi-layered structure so that going from one layer to the next requires performing the one-round protocol just described. More precisely, for each fixed value of λ the i th distribution in the family is built according to the following prescription: where is obtained from b ( by interchanging the row (resp. column) i with row (resp. column) for all odd i whenever n is odd (resp. even), and Eve’s values are increased by 2 from the original values in b (. In each grid, all of Eve’s values are still equiprobable, and for each value of z, Alice and Bob have shared randomness with for even values of x. The distribution b ( thus ranges over sets , , and with respective cardinalities , , and . We call these origami distributions, due to the “unfolding” appearance of the construction. For example, We now use the origami distributions to construct bipartite quantum states. This is accomplished by first embedding each distribution b ( into a tripartite quantum state according towhere . Notice that the von Neumann entropy of the reduced-state of is h(λ) for every z and i. Alice and Bob’s reduced state is then given by . The main results of this paper are stated in the following theorem.

Theorem 1

For any pair (r, λ) and any 0 < λ′ ≤ 1/2, the LOPC transformation and the LOCC transformation are both impossible using r − 1 rounds of communication exchanges, nor are they possible in r rounds if Alice (resp. Bob) is the first to announce when r is odd (resp. even). Conversely, for λ′ ≤ λ ≤ 1/2 the transformations are possible in r rounds if Bob (resp. Alice) is the first to announce when r is odd (resp. even).

The classical secrecy rank

A key tool in proving the classical part of Theorem 1 is, what we will call, the secrecy rank of a tripartite distribution. Its construction is based on the so-called secret key cost of a tripartite distribution[30], a quantity whose single-letter characterization[31,32] has close connections to Wyner’s classic notion of common information[33]. A detailed exploration of the relationship between all these quantities is beyond the scope of this paper and will be saved for future work. In what follows, for a distribution p over the set , we let |p | denote the number of events in with a nonzero probability.

Definition 1

The secrecy rank of tripartite distribution p is defined aswhere the minimization is taken over all auxiliary random variables W such that I(X:Y|ZW) = 0. Let us describe how this quantity is analogous to the quantum Schmidt rank. First consider the case when Z is trivial; i.e., |p | = 1. The Schmidt decomposition of a bipartite pure state has the form , where the and form orthonormal bases for Alice and Bob’s systems, respectively. Suppose that Alice and Bob both measure |φ〉 by projecting in their Schmidt basis. If X (resp. Y) is the random variable describing Alice’s (resp. Bob’s) outcomes, then their measurement statistics can be described as the marginal of the tripartite distribution p where ; i.e., X − W − Y. Clearly . In the case that Z is not trivial, the definition of Eq. (12) most closely resembles the definition of Schmidt rank for bipartite mixed states, as proposed in ref. [34]. Namely, for a density matrix ρ , one minimizes the quantity Srk() over all pure-state ensembles  =  generating ρ , where Srk() is the maximum Schmidt rank of all the states in . For classical distributions p , one can think of p as defining an ensemble of bipartite classical states  = . There is no minimization over ensembles as in the quantum case and therefore, one obtains the secrecy rank of p by just taking the maximum secrecy rank of all the states in . This is precisely what Eq. (12) gives. Another similarity between the secrecy rank and the Schmidt rank concerns their monotonicity.

Theorem 2

The secrecy rank is a stochastic LOPC (SLOPC) monotone. Being an SLOPC monotone means that if the secrecy rank decreases at any point along any branch in an LOPC protocol, then it cannot be increased again along that branch. As described above, this property of the secrecy rank is the key ingredient in proving Theorem 1. The proof of Theorem 2 is given in the Supplementary Note 4.

Discussion

The operational tasks explored in this paper involve extracting pure-state entanglement from some mixed quantum state using LOCC and the classical analog of extracting secret shared randomness from an unsecure classically correlated state using LOPC. These are two very important questions since pure-state entanglement is the fundamental building block for quantum information processing[35], and likewise, secret key states provide the essential ingredient for information-theoretic secure communication[36,37]. The tasks studied here can be seen as single-copy versions of the well-studied secret key[3,4] and entanglement distillation[38] problems. Understanding the relationship between quantum entanglement and classical secrecy offers an intriguing research directions with many interesting connections already found[39-48]. We have shown another similarity between the two in terms of LOCC/LOPC round complexity. Specifically, our results imply that no universal upper bound exists on the minimum number of rounds needed to optimally transform bipartite entanglement or extract secret shared randomness from unsecure correlations. We close this paper with some additional observations and open questions. First, it should be emphasized that the LOCC impossibiltiy result of Theorem 1 holds for any 0 < λ′ ≤ λ. In particular, the target state |Φ〉 can be entangled by an arbitrarily small amount and the transformation still requires r rounds. This demonstrates a type of discontinuity in the trade-off between entanglement and LOCC round number since can be trivially obtained in zero rounds of LOCC. Such a phenomenon is reminiscent of the entanglement/round number trade-off demonstrated in ref. [20]. It is also noteworthy that the classical notion of common information played an essential role in our line of argumentation. Being able to unify the classical and quantum problems in this manner required the origami distributions to have special structure. Ozols et al. have previously used distributions of this sort to relate the tasks of classical and quantum key distillation[47], and it appears that distributions with this structure provide a useful starting point for investigating the similarities and differences between quantum entanglement and classical secrecy theories. In addition, we remark that that the bipartite quantum states constructed in this paper exhibit entanglement reversibility in the asymptotic sense[35,49-51]. That is, the entanglement cost of generating by LOCC is equal to the amount of entanglement that can be distilled from , which is h(λ). A very simple protocol for generating at entanglement rate h(λ) involves Alice and Bob converting Nh(λ) copies of |Φ1/2〉 into N copies of |Φ〉. On each of these copies Alice and Bob then choose a random joint permutation consistent with the block structure of b (: . Averaging over these permutation generates the state . Our results show that the general structure of states possessing entanglement reversibility can be highly complex. Whether the entanglement distillation rate of h(λ) can still be achieved for in the asymptotic sense using fewer than r rounds of LOCC is an interesting question. We strongly conjecture that this is not possible, but we offer no definitive proof. Another natural question to consider is the greatest success probability for achieving the transformations and b ( → Φ using r − 1 rounds of LOCC and LOPC, respectively. The structure of the b ( suggests that in both cases the success probability of any (r − 1)-round protocol should be no greater than 1/2. In fact, it is not difficult to construct an (r − 1)-round protocol that exactly attains the success probability 1/2. We can prove that this indeed is optimal for the classical case, but we are no longer able to easily map this bound to the quantum setting like we have done in this paper. The main reason is that monotonicity of the Schmidt/secrecy rank is no longer required in the transformation. Therefore, the unified analysis of the quantum and classical scenarios pursued in this paper no longer holds. We suspect that an LOCC/LOPC equivalence can still be established by using tools other than the Schmidt/secrecy rank. This is left for future work.

Methods

Properties of the origami distributions in both classical and quantum settings

The origami distributions belong to the more general class of “unambiguous distributions” introduced in ref. [47] since the value of one variable can always be determined from the values of the other two. The structures of unambiguous distributions lend themselves nicely to unifying LOPC and LOCC protocols via the embedding of Eq. (9). In fact, the full proof of Theorem 1, as carried out in the Supplementary Note 2, makes use of this unified structure and involves an argument that applies to both the quantum and classical problems. To compactly represent and analyze the structure of the origami distributions, we invoke in Supplmentary Note 1 the notion of common information between random variables, as proposed by Gács and Körner[52]. A slight strengthening of Theorem 1 is also presented in the Supplementary Note 3, where we relax the requirement of perfect transformation and consider ε-approximate transformations. Our argument involves deriving an upper bound on the r-round communication complexity for a general LOPC transformation of variables, a result which may be of independent interest elsewhere.

Theorem 1 proof sketch

The connection between the LOPC and LOCC frameworks can be seen in the basic transformation depicted by Fig. 1. The LOPC transformation b (1, →  is made coherent by replacing Bob’s announcement M (where M = 0 if Y ∈ {0, 1} and M = 1 if Y ∈ {2, 3}) with the projective measurement {P 0, P 1} (where P 0 = |0〉 〈0| + |1〉 〈1| and P 1 = |2〉 〈2| + |3〉 〈3|) and an announcement of the measurement outcome. The result of this LOCC protocol is the transformation . It is then relatively easy to see that the transformations of Theorem 1 are achievable in r rounds by repeating these basic LOPC/LOCC protocols to r “layers” of b (1, with Alice and Bob alternating in the communication. The difficulty comes in showing that no fewer than r rounds will succeed in accomplishing the transformations. Proving the round-number lower bound of Theorem 1 is based on the theory of operational monotones. An LOPC/LOCC monotone is any function that cannot be increased under LOPC/LOCC processing[44,53]. While the use of LOCC monotones is a standard technique for proving impossibility results in entanglement theory, the analogous theory of LOPC monotones has received far less development and application. One of the most basic LOCC monotones is the Schmidt rank of a quantum pure state. Recall that the Schmidt rank of a bipartite pure state , denoted by , is equivalent to the ranks of the reduced density matrices and . Unlike most LOCC monotones, the Schmidt rank has an even stronger property that it cannot be increased under LOCC even with some nonzero probability, regardless of how small this probability may be[29]. Such a monotone is called a stochastic LOCC (SLOCC) monotone. Since is a mixture of bipartite pure states , the transformation requires that protocols transform into for every z. The origami distributions and their embeddings are designed in such a way that obtaining from in r − 1 rounds will necessarily cause the Schmidt of rank to decrease for some other . Since and both have a Schmidt rank of 2, a decrease in the rank of the former will make it impossible to obtain the latter. Hence the transformation is impossible in r − 1 rounds as there will always be at least one failure branch. The Schmidt rank can only be preserved along all branches if the protocol is carried out for r total rounds. One can see the general idea of this argument in greater detail by examining b (4, (see Eq. (8)). Suppose it is Bob who is making the first measurement and let this be described by Kraus operators {B }. Up to renormalization, the k th post-measurement state of each will have the form . In order for this state to ultimately reach , we must have that for every z either has Schmidt rank two or . Inspection of b (4, shows that if for some z (meaning that two rows of b (4, have been eliminated in Eq. (8)), then for all z. The reason is that if a value of z lies in a row being eliminated, then the Schmidt rank of cannot be two, and therefore it must be that . Therefore, if Bob is the first measuring party on , each nonzero post-measurement state is SLOCC equivalent to , meaning it is related to by an invertible SLOCC transformation[54]. If Alice is the first measure, a similar argument shows that her actions are also sharply limited. However, unlike Bob, she can eliminate either the right or left sub-block of b (4, without violating the Schmidt rank constraint. In the latter case, what remains is some state SLOCC equivalent to . Thus, any LOCC protocol transforming must generate a mixture σ that is SLOCC equivalent to along every branch in the protocol, and it will require at least one round to do so with Alice being the measuring party. A careful inductive argument then allows one to establish the following general result: Any LOCC protocol transforming must generate a state σ that is SLOCC equivalent to along every branch in the protocol, and it will require at least r − 1 rounds to do so. From this, it follows that the transformation is possible in r − 1 rounds only if there exists a state σ that is SLOCC equivalent to and which can be transformed into via local completely positive trace-preserving (CPTP) maps by Alice and Bob. The last condition holds because after r − 1 rounds, Alice and Bob cannot communicate further and thus they must perform local CPTP maps on σ in order to obtain . It is not difficult to show that no such σ exists and consequently the transformation is not possible in r − 1 rounds. The crucial piece in this argument is that the Schmidt rank is an SLOCC monotone, and therefore every local action must either eliminate or leave Schmidt rank unchanged. We introduce below a classical analog of the Schmidt rank called the secrecy rank that is similarly a stochastic LOPC (SLOPC) monotone; i.e., it cannot be increased even probabilistically under LOPC operations. With this monotonicity, it follows analogously to the quantum case that b ( → Φ is not possible in fewer than r rounds of communication.

Data availability

The authors declare that all the data supporting the findings of this study are available within the paper and its Supplementary Information Files.
  8 in total

1.  Purification of noisy entanglement and faithful teleportation via noisy channels.

Authors: 
Journal:  Phys Rev Lett       Date:  1996-01-29       Impact factor: 9.161

2.  Equivalence between two-qubit entanglement and secure key distribution.

Authors:  Antonio Acín; Lluis Masanes; Nicolas Gisin
Journal:  Phys Rev Lett       Date:  2003-10-13       Impact factor: 9.161

3.  Local quantum transformations requiring infinite rounds of classical communication.

Authors:  Eric Chitambar
Journal:  Phys Rev Lett       Date:  2011-11-04       Impact factor: 9.161

4.  Classical Analog to Entanglement Reversibility.

Authors:  Eric Chitambar; Ben Fortescue; Min-Hsiu Hsieh
Journal:  Phys Rev Lett       Date:  2015-08-27       Impact factor: 9.161

5.  Quantum correlations and secret bits.

Authors:  Antonio Acín; Nicolas Gisin
Journal:  Phys Rev Lett       Date:  2005-01-18       Impact factor: 9.161

6.  Mixed-state entanglement and quantum error correction.

Authors: 
Journal:  Phys Rev A       Date:  1996-11       Impact factor: 3.140

7.  Entanglement irreversibility from quantum discord and quantum deficit.

Authors:  Marcio F Cornelio; Marcos C de Oliveira; Felipe F Fanchini
Journal:  Phys Rev Lett       Date:  2011-07-05       Impact factor: 9.161

8.  Bound entangled states with a private key and their classical counterpart.

Authors:  Maris Ozols; Graeme Smith; John A Smolin
Journal:  Phys Rev Lett       Date:  2014-03-18       Impact factor: 9.161

  8 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.