Quantum Network Coding



Similar documents
Techniques algébriques en calcul quantique

0.1 Phase Estimation Technique

arxiv:quant-ph/ v1 11 Jul 1996

A Probabilistic Quantum Key Transfer Protocol

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

4. Continuous Random Variables, the Pareto and Normal Distributions

COMBINATIONAL CIRCUITS

Using Adversary Structures to Analyze Network Models,

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

Introduction to Quantum Computing

Triangle deletion. Ernie Croot. February 3, 2010

Codes for Network Switches

On Quantum Hamming Bound

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Quantum Computing Architectures

Markov random fields and Gibbs measures

PEER TO PEER FILE SHARING USING NETWORK CODING

Section 1.3 P 1 = 1 2. = P n = 1 P 3 = Continuing in this fashion, it should seem reasonable that, for any n = 1, 2, 3,..., =

Impedance Matching and Matching Networks. Valentin Todorow, December, 2009

Lecture 2: August 29. Linear Programming (part I)

Secure Network Coding via Filtered Secret Sharing

A Practical Scheme for Wireless Network Operation

Chapter 4. Probability and Probability Distributions

3-9 EPR and Bell s theorem. EPR Bohm s version. S x S y S z V H 45

A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries

Reading.. IMAGE COMPRESSION- I IMAGE COMPRESSION. Image compression. Data Redundancy. Lossy vs Lossless Compression. Chapter 8.

Network Design Performance Evaluation, and Simulation #6

Mathematical finance and linear programming (optimization)

The Goldberg Rao Algorithm for the Maximum Flow Problem

Brewer s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services

Econometrics Simple Linear Regression

BOX. The density operator or density matrix for the ensemble or mixture of states with probabilities is given by

10.2 Series and Convergence

Understanding the Impact of Weights Constraints in Portfolio Theory

No: Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS

THE BANACH CONTRACTION PRINCIPLE. Contents

PART III. OPS-based wide area networks

Midterm Practice Problems

Chapter 4: Chemical and Solution Stoichiometry

Weakly Secure Network Coding

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation

Lecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method

1 Sufficient statistics

FUNDAMENTALS of INFORMATION THEORY and CODING DESIGN

Secure Network Coding on a Wiretap Network

Galois representations with open image

Conductance, the Normalized Laplacian, and Cheeger s Inequality

Lecture 13: Factoring Integers

Jitter Measurements in Serial Data Signals

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

Numerical methods for American options

Network File Storage with Graceful Performance Degradation

A Labeling Algorithm for the Maximum-Flow Network Problem

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

IN THIS PAPER, we study the delay and capacity trade-offs

MATH 10: Elementary Statistics and Probability Chapter 5: Continuous Random Variables

MA 408 Computer Lab Two The Poincaré Disk Model of Hyperbolic Geometry. Figure 1: Lines in the Poincaré Disk Model

1 Norms and Vector Spaces

A Modest View of Bell s Theorem. Steve Boughn, Princeton University and Haverford College

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

CS263: Wireless Communications and Sensor Networks

Lecture 4 Online and streaming algorithms for clustering

Polarization codes and the rate of polarization

Lecture 22: November 10

Statistical Machine Translation: IBM Models 1 and 2

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

1 Solving LPs: The Simplex Algorithm of George Dantzig

Linear Static Analysis of a Cantilever Beam Using Beam Library (SI Units)

Is quantum mechanics compatible with a deterministic universe? Two interpretations of quantum probabilities *

Topology-based network security

24 th IEEE Annual Computer Communications Workshop (CCW)

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

9. Force Measurement with a Strain gage Bridge

WHERE DOES THE 10% CONDITION COME FROM?

Network Layer: Network Layer and IP Protocol

Online Adwords Allocation

Guessing Game: NP-Complete?

3. Mathematical Induction

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Computational Geometry Lab: FEM BASIS FUNCTIONS FOR A TETRAHEDRON

Transcription:

Salah A. Aly Department of Computer Science Texas A& M University Quantum Computing Seminar April 26, 2006

Network coding example In this butterfly network, there is a source S 1 and two receivers R 1 and R 2. The goal is to send X and Y from S 1 to both R 1 and R 2 simultaneously. The idea of network coding is that instead of routing the messages X and Y at node N 3, we rather encode and send them in one message.

Network coding example The receiver R 1 is able to decode the message X Y. There is a bottleneck edge (N 3, N 4 ). With traditional routing, we cannot achieve max capacity because of that edge, but with network coding, we can achieve the max capacity.

Why network coding Network coding rate (NCR) can be much larger than flow rate (FR) in some networks: i.e Butterfly and Wheatstone networks: NCR is 1 and FR is 1/2. Even we can do better in some networks 1/n FR to n NCR. With network coding, the max capacity can be achieved as the field size is bounded by certain value. Network coding offers robustness and adaptability for the network.

From classical to quantum networks Can we increase the throughput of a quantum network using network coding? Consider the butterfly quantum network. The goal is to send ψ 1 from s 1 to both t 1 and t 2, (similarly, send ψ 2 from s 2 to both t 1 and t 2 ). Exact transmission is impossible because Qubits are continuous information.

Quantum network coding So, we can not do quantum network coding without errors. The problem can not be the same as classical network due to nature of quantum information: No cloning principle Quantum information is continuous

Quantum network coding The main result in this paper is that quantum network coding is possible if approximation is allowed. It is natural to study approximate or probabilistic methods to deal with qubits. We will find a way to deal with no cloning principle, so we can copy the information locally. Theorem (Main Result) There exists a quantum protocol whose fidelities at nodes t 1 and t 2 are 1/2 + 200/19863 and 1/2 + 180/19863, respectively.

Definition ( Trace Distance ) Given two quantum states ρ and σ, the trace distance is defined as D(ρ, σ) = 1 2 i ρ i σ i. The trace distance can also be computed between density operators. If ρ = i r i i i and σ = i s i i i, Then D(ρ, σ) = 1 2 Tr i (r i s i ) i i. Example: ρ = 3 4 0 0 + 1 4 1 1 and σ = 2 3 0 0 + 1 3 1 1. D(ρ, σ) = 1 Tr (3/4 2/3) 0 0 + (1/4 1/3) 1 1 2 = 1/2(1/12 + 1/12) = 1/12

Definition ( Fidelity ) Given two quantum states ρ and σ, the fidelity is defined as F(ρ, σ) = Tr( ρ 1/2 σρ 1/2 ). For mixed states, the trace distance is a function of the fidelity as D(ρ, σ) 1 F( ρ, σ ) 2 and the inequality holds for pure quantum states.

We measure the quality of data at node t 1 by the fidelity between the original state ψ 1 at s 1 and the output state ρ at t 1, (similarly between t 2 and s 2 ). Our goal is to achieve a fidelity strictly > 1/2. For coherent states, the classical teleportation limit is F = 0.5, light polarization states F = 0.67. If we consider a mixed state, then the fidelity is 1/2. Quantum Teleportation has fidelity F = 1 theoretically perfect.

In order to show this Theorem, we can not directly copy qubits at s 1 and s 2, also we can not directly encode at s 0. Rather, we need some building blocks to deal with qubits (i.e XQQ protocol) (UC), 3D Measurement (MM 3 ), Approximated Group Operation (AG), 3D Bell Measurement (BM)

XQQ protocol

XQQ protocol description So, the goal is to send quantum information (states) via quantum channel and achieve a fidelity greater than 1/2. Universal cloning at node s 1 to get (Q 1, Q 2 ) = UC( ψ 1 ), also UC at s 2 to get (Q 3, Q 4 ) = UC( ψ 2 ). then make teleportation to Q 1, Q 2, Q 3, Q 4. At node s 0, apply 3DMM to Q 3 to obtain 3 classical bits r 1 r 2 r 3. Then choose one value of the group AG that has 8 elements (i.e. I,X,Y,Z, Inv, Inv X, Inv Y, Inv Z). At node t 1, apply the reverse operations of these 8 operation to decode the received q. state. At node t 2, recover the 3 bits r 1 r 2 r 3 as a key by comparing Q 1 and Q 6.

XQQ Protocol Overview XQQ Protocol steps. Input Q.States ψ 1 at s 1 and ψ 2 > at s 2 ; Output Q. States ρ 1 out at t 1 and ρ 2 out at t 2. Step 1. Apply universal cloning at the sources, (Q 1, Q 2 ) = UC( ψ 1 ) at S 1, and (Q 3, Q 4 ) = UC( ψ 2 >) at s 2. Step 2. Q 5 = AG(Q 2, MM 3 (Q 3 )) at s 0. Step 3. (Q 6, Q 7 ) = UC(Q 5 ) at t 0. Step 4. Finally decoding at nodes t 1 and t 2. ρ 1 out = AG(Q 7, MM 3 (Q 4 )), and ρ 2 out = BM(Q 1, Q 6 ).

(UC) Recall the approximated cloning by Buzek and Hillery known as universal (1,2) cloning (C (2) ). Let ψ = 1 2 ( 01 > + 10 >), Using trace-preserving completely positive map (TP-CP), C 2 ( 0 0 ) = 2 3 00 00 + 1 3 ψ ψ, 2 C 2 ( 0 1 ) = 3 ψ 11 + 2 3 00 ψ, C 2 ( 1 0 ) = 2 3 11 ψ + 2 3 ψ 00, C 2 ( 1 1 ) = 2 3 11 11 + 1 3 ψ ψ Now, let ρ 1 = Tr 2 C (2) ( ψ ) and ρ 2 = Tr 1 C (2) ( ψ ), then ρ 1 = ρ 2 = 2 3 ψ ψ + 1 3.I/2 that gives us F( ψ, ρ 1 ) = F( ψ, ρ 2 ) = 5/6 (UC) can be used instead of Universal (1,2) cloning.

Encoding and Decoding Operations Approximated ( ) Group Operation ( (AG):) Given a mixed state u1 v ρ = 1 v2 v, Invρ = 1 Now, we form the u 2 v 2 u 2 u 1 abelian group AG, as {I,X,Y,Z,Inv,Inv X, Inv Y, Inv Z}. The approximated group AG is a transformation to encode the quantum state ρ given by T 000 (ρ) = ρ, T 011 (ρ) = Zρ, T 101 (ρ) = Xρ, T 110 (ρ) = Yρ, T 111 (ρ) = Invρ, T 001 (ρ) = InvT 110 (ρ), T 010 (ρ) = InvT 101 (ρ), T 100 (ρ) = InvT 011 (ρ). At node t 1, apply the reverse operations of these 8 operations to decode the received quantum state. At node t 2, recover the 3 bits r 1 r 2 r 3 as a key by comparing Q 1 and Q 6.

XQQ protocol

Computing Fidelity F( ψ 1, ρ 1 out) 1 1 Let ρ be a quantum state, a map C is called p-shrinking, if C transforms ρ to p.ρ + (1 p) I 2 for some probability p. 2 The idea is to discretize one of the two quantum states into one classical bits, then encode the other quantum state. 3 Let ρ 2 = ψ 2 ψ 2, then compute the maps. C 1 : ψ 1 Q 2, C 2 [ρ 2 ] : Q 2 Q 5 C 3 : Q 5 Q 7, C 4 [ρ 2 ] : Q 7 ρ 1 out. 4 The universal copy is 2/3-shrinking. 5 If C is a p-shrinking and C is a p -shrinking, then C C is a pp -shrinking. 6 C 4 [ρ 2 ] C 2 [ρ 2 ] is a 100 2187 -shrinking.

Computing Fidelity F( ψ 1, ρ 1 out) (cont.) 7 If C is a p-shrinking, F(ρ, C(ρ)) 1/2 + p/2 for any state ρ. 8 The final result is given by C s1 t 1 = C 4 [ρ 2 ] C 3 C 2 [ρ 2 ] C 1, and its Fidelity shown in this Lemma. 9 The total probability of C s1 t 1 is (2/3)(2/3)(100/2187) = 400 19683 Lemma (F( ψ 1, ρ 1 out)) There exists a quantum protocol whose fidelity between s 1 and t 1 is 1/2 + 200/19683. For any ψ 1, F( ψ 1, C s1 t 1 ( ψ 1 )) 1/2 + 200/19683.

Computing Fidelity F( ψ 2, ρ 2 out) Similar to the previous computations. Lemma (F( ψ 2, ρ 2 out)) There exists a quantum protocol whose fidelity between s 2 and t 2 is 1/2 + 180/19683.

and Discussion of the Results on this paper: We can send any quantum state ψ 1 from s 1 to t 1. and ψ 2 from s 2 to t 2 with fidelity strictly greater than 1/2. If one of ψ 1 and ψ 2 is classical then the fidelity can be improved to 2/3. Similarly, improvements is also possible if ψ 1 and ψ 2 are restricted to only a finite number of states. Theorem (Main Result) There exists a quantum protocol whose fidelities at nodes t 1 and t 2 are 1/2 + 200/19863 and 1/2 + 180/19863, respectively.

and Discussion Is that the right approach to do quantum network coding? In this protocol, one of the two quantum states has to be measured, i.e. destroying value of the state. Which one to measure and which one to send exactly? What kind of application to use approximated quantum network coding?

and Discussion Open questions and discussion: Finding upper bounds on the Fidelity rather than 1. Comparing classical and quantum network coding. i.e sending classical and quantum information in the same network and measure the performance. Applying quantum network coding to different network topology. These are just natural questions arising from the paper of Hayashi, et. al. Some other questions arise: We can do Quantum-assisted network coding by sending classical information over quantum channels. We can study if this gives us a better results than we can do classically.

and Discussion Questions...