Professional Documents
Culture Documents
be delocalized through quantum error correction and teleportation, it need not follow well-defined trajectories.
Instead, replication of the information in any configuration of spacetime regions not leading to violations of
causality or the no-cloning principle is allowed. To demonstrate this, we answer the operational question of
exactly when the information can be summoned to a set of spacetime points, showing how to do so efficiently
using a combination of teleportation and codeword-stabilized quantum codes. This provides a simple and com-
plete description of where and when a qubit can be located in spacetime, revealing a remarkable variety of
possibilities.
Keywords: causality, cloning, quantum information, summoning, teleportation, error correction, relativity
Typeset by REVTEX
2
z0 z3 Se operators.
D0 D1
This code has precisely the desired properties if the share
for each edge e ∈ E of the original graph G is identified
z1 z2 with the pair of edges replacing e in G0 as we demonstrate
D3 D2 below. The construction therefore yields a method for solving
y3 y2 b)
the summoning task using exactly n(n − 1) physical qubits
y0 y1 D0 D1 per summoned qubit.
Analysis of the CWS code— The CWS formalism con-
structs a quantum error correcting code from an undirected
s D3 D2 graph H and a classical error correcting code, associating a
a) c) physical qubit with each vertex of H [12]. Since we require
a share for each edge of G, we will choose H to be the line
graph of the undirected graph G0 . The classical error correct-
FIG. 5: General Strategy. a) This configuration of four call-reveal ing code will simply be a length 2 n2 binary repetition code.
spacetime points satisfies the conditions of Theorem 1 and requires a
These choices uniquely specify the code described above. Be-
combination of error correction and teleportation for successful sum-
moning. Each reveal point is again lightlike to its call point and zj is cause the binary repetition code forms a group, this CWS code
causal to the call point yj−1 mod 4 . In addition, z0 is lightlike to y2 is also a stabilizer code [12].
and z3 is lightlike to y1 . b) The graph G of causal relationships used The conditions for quantum error correction in a CWS code
to construct the summoning protocol. The subproblem involving the can easily be re-expressed in terms of the graph G0 . CWS
cycle D0 → D2 → D3 → D0 is structurally equivalent to the ex- codes map all Pauli errors into patterns of Z errors. In partic-
ample illustrated in Figure 3, although the recursive protocol replaces
direct quantum communication by teleportation. c) The code used in Q the error Xe on any edge e is mapped into the product
ular,
the efficient construction has one physical qubit for each edge of this f ∈Ne Zf of Z errors on all the edges adjacent to e. Up to an
graph, G0 . The arcs label the four sets of doubled edges sufficient to irrelevant sign, therefore, any Pauli error P induces a product
reconstruct the state. In the protocol, if there is a request at y0 , for of Z errors err(P ).
example, the qubits on the solid edges are sent to z0 . As explained earlier, it must be possible to correct against
the erasure of any shares leaving any vertex u of G = (V, E)
untouched. That is equivalent to being able to correct any set
ceding teleportation, so we will show how to achieve the same of Pauli errors located on edges of G0 not associated with u.
functionality directly. To begin, it will be helpful to charac- Since the edges E 0 of G0 are of the form (v, (v, w)) for v ∈ V
terize that functionality. The recursive encoding produces a and (v, w) ∈ E, that amounts to being able to correct errors
quantum error correcting code with shares associated to the on any (v, (v, w)) such that u 6∈ (v, w). Let E be the set of
edges of the graph G. Should the call arrive at yj , teleporta- such errors for any fixed u. Since our construction is invariant
tion is used to ensure that all shares associated to the edges with respect to permutations of the vertices of V , the choice
incident to Dj arrive at the reveal point zj . The functional- of u doesn’t matter.
ity required of the code is therefore clear: it must be possible The error correction conditions specialized to our case [12]
to recover the encoded quantum state using only those shares are that, for each P ∈ E,
received at zj . That is, the erasure of shares for any combi- Q
nation of edges leaving at least one vertex untouched must be • err(P ) 6= e Ze and
recoverable, as illustrated in Figure 5c. Q
• either err(P ) 6= I or [ e Ze , P ] = 0.
That describes an unusual quantum error correcting code.
Ignoring directionality, G is the complete graph, so each ver- The first condition is easy to verify. Let P ∈ err(P ) be a
tex is incident to exactly n − 1 edges. The total number single-qubit error acting on edge (v, (v, w)). By assumption,
of edges is n2 , however, so the quantum state must be re- u 6∈ (v, w). The only edge adjacent to (v, (v, w)) containing
coverable from a vanishing fraction 2/n of the total num- u is (v, (v, u)). In particular, there are no edges of the form
ber of shares, albeit a specially chosen vanishing fraction that (u, (u, x)) adjacent to (v, (v, w)) so P cannot induce an error
prevents violations of the no-cloning principle. A particular on any such edge, and neither canQany product of single-qubit
codeword-stabilized (CWS) quantum code [12] will do the job errors in E. Therefore err(P ) 6= e Ze for all P ∈ E.
very efficiently. Let G0 = (V 0 , E 0 ) be an undirected version of For the second condition, begin by considering a single-
G with a new vertex placed on each edge, so that V 0 = V ∪ E qubit X error P ∈ E, again acting on edge (v, (v, w)).
and E 0 = {(v, (v, w)) : (v, w) ∈ E or (w, v) ∈ E}. The (v, (v, u)) is the only edge adjacent to (v, (v, w)) containing
code will consist of a single qubit for each of the edges of u, so err(P ) will contain exactly one Z operator acting on
G0 . For each such edge e, let Ne = {f ∈ E 0 : f ∩ e 6= edges containing u. Using that Z 2 = I, it follows that any
∅ and f 6=Qe} be the set of edges adjacent to e and define multiqubit X error P ∈ E for which err(P ) = I must con-
Se = Xe f ∈Ne Zf , where Xe and Ze are Pauli operators an even number of single-qubit errors. But XZ = −ZX
tain Q
acting on edge e. The encoded qubit is simply the span of the so [ e Ze , P ] = 0 for any such error P . A general multi-
simultaneous +1 and simultaneous −1 eigenstates of all the qubit error will contain arbitrary products of X and Z errors,
5
Q
but since Z errors commute with e Ze and don’t propagate [5] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres,
along edges, the second condition holds for them as well. and W. K. Wootters. Teleporting an unknown quantum state
Discussion— Our analysis of summoning information pro- via dual classical and Einstein-Podolsky-Rosen channels. Phys.
Rev. Lett., 70:1895–1899, 1993.
vides a detailed characterization of all the ways in which [6] A. Kent. A no-summoning theorem in relativistic quantum the-
quantum information can be replicated in spacetime. It is re- ory. Quant. Inf. Proc., pages 1–10, 2011.
markable that the sets of causal diamonds that can all hold [7] A. Kent. Quantum tasks in Minkowski space. Class. Quantum
the same quantum information can be so cleanly character- Grav., 29:224013, 2012.
ized: the conditions of Theorem 1 are simple constraints aris- [8] A. Kent. Unconditionally secure bit commitment with flying
ing from causality and no-cloning, but they prove to be suffi- qudits. New J. Phys., 13(11):113015, 2011.
cient. Thus, the most basic restrictions imposed by quantum [9] D. Mayers. Unconditionally secure quantum bit commitment is
impossible. Phys. Rev. Lett., 78:3414–3417, 1997.
mechanics and special relativity turn out to be the only restric-
[10] H.-K. Lo and H. F. Chau. Is quantum bit commitment really
tions. possible? Phys. Rev. Lett., 78:3410–3413, 1997.
These conclusions should extend to more general space- [11] R. Cleve, D. Gottesman, and H.-K. Lo. How to share a quantum
times since our arguments have only depended on causal secret. Phys. Rev. Lett., 83:648–651, 1999.
structure. Ultimately, however, the reasoning will likely to [12] A. Cross, G. Smith, J.A. Smolin, and B. Zeng. Codeword sta-
break down in a full theory of quantum gravity, for which it bilized quantum codes. In IEEE International Symposium on
Information Theory, 2008. ISIT 2008., pages 364–368. IEEE,
has been argued that the interplay between cloning and causal-
2008.
ity should be much more subtle [13, 14]. Most importantly, [13] L. Susskind, L. Thorlacius, and J. Uglum. The stretched hori-
the use of no-cloning to rule out summoning for a pair of zon and black hole complementarity. Phys. Rev. D, 48(8):3743,
spacelike separated causal diamonds likely fails in some sit- 1993.
uations in which the structure of spacetime prevents the two [14] P. Hayden and J. Preskill. Black holes as mirrors: quantum
clones from ever being compared. information in random subsystems. JHEP, 09:120, 2007.
A question closely related to the problem studied here is [15] A. Kent, W. J. Munro, and T. P. Spiller. Quantum tagging: Au-
thenticating location via quantum information and relativistic
whether quantum mechanics and relativity can be combined signalling constraints. Phys. Rev. A, 84(1):012326, 2011.
to build a “position-based” cryptography, which was recently [16] Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles,
answered largely in the negative [15–17]. In both that work Vipul Goyal, Rafail Ostrovsky, and Christian Schaffner.
and ours, novel combinations of entanglement and teleporta- Position-based quantum cryptography: Impossibility and con-
tion make it possible to transmit quantum information in ways structions. In Advances in Cryptology: CRYPTO 2011, volume
that initially seem to defy causality. Nonetheless, both scenar- 6841 of Lecture Notes in Computer Science, pages 429–446.
ios prove to be quite amenable to analysis, and can be seen Springer, 2011.
[17] Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles,
as building blocks [7, 18–21] for a larger theory of distributed Vipul Goyal, Rafail Ostrovsky, and Christian Schaffner.
computation in relativistic spacetime. Position-based quantum cryptography: Impossibility and con-
Note added in proof: Since this paper first appeared on structions. SIAM Journal on Computing, 43(1):150–178, 2014.
arXiv.org in 2012, there has been further development of sum- [18] D. Beckman, D. Gottesman, M. A. Nielsen, and J. Preskill.
moning [22, 23] and a surge of exciting work in relativistic Causal and localizable quantum operations. Phys. Rev. A,
quantum information theory more generally. (See e.g. [24– 64(5):052309, 2001.
[19] D. Beckman, D. Gottesman, A. Kitaev, and J. Preskill. Measur-
29].) ability of Wilson loop operators. Phys. Rev. D, 65(6):065022,
Acknowledgments We are indebted to Raphael Bousso, 2002.
Adrian Kent, Fang Xi Lin, Rob Myers and Prakash Panan- [20] M. Pawlowski, T. Paterek, D. Kaszlikowski, V. Scarani, A. Win-
gaden for helpful discussions. This work was supported by the ter, and M. Zukowski. Information causality as a physical prin-
Canada Research Chairs program, FQXi, the Perimeter Insti- ciple. Nature, 461(7267):1101–1104, 2009.
tute, CIFAR, NSERC, ONR through grant N000140811249, [21] S. Beigi and R. König. Simplified instantaneous non-local
quantum computation with applications to position-based cryp-
and the Simons Foundation. The Perimeter Institute is sup-
tography. New J. Phys., 13(9):093036, 2011.
ported by Industry Canada and Ontario’s Ministry of Eco- [22] Emily Adlam and Adrian Kent. A quantum paradox of choice:
nomic Development & Innovation. More freedom makes summoning a quantum state harder. arXiv
preprint arXiv:1509.04226, 2015.
[23] Patrick Hayden, Sepehr Nezami, Grant Salton, and Barry C
Sanders. Spacetime replication of continuous variable quantum
information. arXiv preprint arXiv:1601.02544, 2016.
[1] R. Bousso. The holographic principle. Rev. Mod. Phys., [24] TG Downes, TC Ralph, and N Walk. Quantum communication
74:825–874, 2002. with an accelerated partner. Physical Review A, 87(1):012327,
[2] W.K. Wootters and W.H. Zurek. A single quantum cannot be 2013.
cloned. Nature, 299(5886):802–803, 1982. [25] Nicolai Friis, Antony R Lee, Kevin Truong, Carlos Sabı́n, En-
[3] A. Y. Kitaev. Fault-tolerant quantum computation by anyons. rique Solano, Göran Johansson, and Ivette Fuentes. Relativistic
Ann. Phys., 303:2–30, 2003. quantum teleportation with superconducting circuits. Physical
[4] D. Gottesman. Stabilizer codes and quantum error correction. Review Letters, 110(11):113602, 2013.
PhD thesis, California Institute of Technology, 1997. [26] Eduardo Martin-Martinez, David Aasen, and Achim Kempf.
6
Processing quantum information with relativistic motion of features of the dynamics beyond causal structure and quantum
atoms. Physical Review Letters, 110(16):160501, 2013. mechanics could prevent the summons from succeeding. The
[27] Eduardo Martı́n-Martı́nez, Eric G Brown, William Donnelly, quantum state of planet Earth exactly one day ago, for exam-
and Achim Kempf. Sustainable entanglement production from ple, is localized within a spatial sphere one light-day in radius,
a quantum field. Physical Review A, 88(5):052310, 2013.
[28] Mehdi Ahmadi, David Edward Bruschi, and Ivette Fuentes. but it is doubtful that the state could really be reassembled
Quantum metrology for relativistic quantum fields. Physical here on Earth one day hence.
Review D, 89(6):065028, 2014.
[29] Robert H Jonsson, Eduardo Martı́n-Martı́nez, and Achim Summoning with a separation between the call and reveal
Kempf. Information transmission without energy exchange. point as we’ve defined it in this article is actually a version
Physical Review Letters, 114(11):110505, 2015. of “non-ideal summoning” in Kent’s terminology, which he
analyzed for a case in which all the call points are on one
spacelike hyperplane and all the reveal points on another. Kent
Appendix A - On definitions and assumptions introduced the separation in order to allow time to process
information between the receipt of the request and the need
There are a number of assumptions implicit in the definition to reveal the state. Because our emphasis has been on the
of summoning supplied in the main text. Kent does an excel- ways quantum information can be localized in principle, our
lent job of clearly identifying them in his article, to which we interpretation of the separations has been slightly different,
refer the reader for a more thorough discussion [6]. Most im- but nothing prevents using them for Kent’s original purpose.
portantly, we assume that information at any spacetime point
can be transmitted without errors to any other point in its fu- A final point requiring comment is that localizing even a
ture light cone, and that quantum computations at any point single qubit to a point or even a causal diamond with lightlike
can be performed instantaneously. separated call and reveal points would violate the holographic
Those assumptions are necessary in order to be able to as- bound [1]. For the purposes of this article, therefore, a point
sert that a qubit is localized to the causal diamond Dj if and should just be regarded as a volume of space small with re-
only if it can be summoned to zj . In a realistic physical theory, spect to the other length scales being discussed.