Professional Documents
Culture Documents
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
work of coding strategies based on using random linear about its corresponding source to the receiver. The first piece
codes. Decoding functions of sources or channel inputs ef- of information from both the sources needs to be recon-
ficiently require codes endowed with algebraic closure prop- structed individually at the receiver. Then, conditioned on this
erties. To emphasize, the conventional approach of deriving reconstruction, we let the receiver reconstruct the necessary
inner bounds/achievable rate region by analyzing expected function f of the second piece. At ith transmitter, the two
performance of IID random codes is incapable of yielding pieces are constructed on auxiliary variables Ui and Vi , and
performance limits - capacity or rate-distortion regions as the then fused to form the channel input Xi . We construct a
case may be in network communication scenarios. To improve 4−input CQ-MAC to model this transmission. This poses a
upon this, it is necessary to analyze the expected performance challenge concerning the number of messages being decoded.
of random codes endowed with algebraic closure properties. The decoder aims at decoding the triple (U1 , U2 , V1 ⊕q V2 ),
In a series of works [7], an information-theoretic study of the where ⊕q represents addition with respect to a prime finite
latter codes has been carried out yielding new inner bounds field Fq . For this, the decoder needs a CQ simultaneous
for multiple network communication scenarios. decoding technique. The ideas of joint typicality using tilting,
A careful observation of the above idea reveals that two smoothing, and augmentation introduced by Sen [12], [13]
MAC channel codes employed by the encoders do not ‘blow solved the problem of simultaneous decoding of individual
up’ when added, is crucial to the efficiency of the above messages on CQ-MAC, however, it is based on unstructured
scheme. A linear code being algebraically closed enables coding techniques. We develop a unified coding framework
this. However, the codewords of a random linear code are that combines unstructured and structured coding techniques
uniformly distributed and cannot achieve the capacity of an while using this jointly typicality approach that enables the
arbitrary classical P2P channel, let alone a CQ-P2P channel. decoder to reconstruct (U1 , U2 , V1 ⊕q V2 ) simultaneously.
We are therefore forced to enlarge a linear code to identify In light of this, the main contribution of the current
sufficiently many codewords of the desired empirical single- work is in providing a new set of sufficient conditions (see
letter distribution. We are thus led to a nested coset code Theorems 4 and 5 in Sec. III-D), while strictly subsuming
(NCC) [8]. the current known conditions, for the reconstruction of an
In this work, we embark on developing these ideas in the arbitrary function of sources over a generic CQ-MAC. We
CQ setup. After having provided the problem statement in provide these conditions in terms of single-letter quantum
Sec. II, we focus on a simplified CQ-MAC and illustrate the information quantities. Furthermore, we identify examples (see
core idea of our coding scheme. This relies on developing a Section III-E) where the gains provided by this framework
nested coset code (NCC) based communication scheme for a are demonstrated. We also discuss the potential applications
CQ-P2P channel and analyzing its performance (Sec. III-A). of computation over a CQ-MAC in Section III-F. This work
Leveraging this building block, we construct and analyze the opens up the opportunity to investigate a generic approach
asymptotic performance of an NCC-based coding scheme for encompassing both the conventional and algebraic structured
computing sum over a general CQ-MAC (Sec. III-B), and techniques for other multi-terminal problems in the classical-
provide sufficient conditions based on single-letter quantum quantum regime [14]–[16].
information quantities (see Theorem 2). We also extend the
results to the case of a generic QQ-MAC (see Theorem 3 in II. P RELIMINARIES AND P ROBLEM S TATEMENT
Sec. III-C). We supplement the notation in [17] with the following. For
∆
As our next main contribution, we generalize the above a positive integer n, [n] = {1, · · · , n}. For a Hilbert space
ideas for computing arbitrary functions over a general CQ- H, the spaces L(H), P(H) and D(H) denote the collection of
MAC. It has been demonstrated in the classical multi-terminal linear, positive and density operators acting on H, respectively.
setting, the coding techniques relying on the algebraic structure The von Neumann entropy of a density operator ρ ∈ D(H)
may show gains for only a certain class of problems and in is denoted by S(ρ). Given any ensemble {pi , ρi }i∈[1,m] , the
certain rate regimes [9]. Therefore, a unified technique that Holevo information [18] is denoted as χ {pi ; ρi } . A POVM
∆
captures the gains of both the traditional unstructured coding acting on H is a collection λ = {λx }x∈X P of positive operators
techniques and the techniques based on algebraic structured that form a resolution of the identity: x∈X λx = I, where X
codes is needed to approach the performance limits for the is a finite set. We employ an underline notation to aggregate
multi-terminal problems. Alhswede-Han [9] obtained the best objects of similar type. For example, s denotes (s1 , s2 ), xn
known inner bound for the problem of classical lossless denotes (xn1 , xn2 ), S denotes the Cartesian product S1 ×S2 . Let
distributed compression by combining the Slepian-Wolf [10] Fq denote a prime finite field of size q and ⊕ the corresponding
coding scheme with the coding scheme of Körner-Marton [4] addition operation.
based on algebraic structured codes. Consider a (generic) CQ-MAC N2 specified through (i)
Motivated by this, we provide a unified approach for the finite sets Xj : j ∈ [2], (ii) Hilbert space HZ , and (iii) a
problem of computing a bivariate function of two sources collection of density operator (ρx1 ,x2 ∈ D(HZ ) : (x1 , x2 ) ∈
over CQ-MAC, capitalizing on the gains of the algebraic X1 × X2 ). This CQ-MAC is employed to enable the receiver
structured techniques developed in [11], while making the reconstruct a bivariate function of the classical information
most of the standard approach based on unstructured codes streams observed by the senders. Let S1 , S2 be finite sets and
developed for this problem [3]. We propose an approach where (S1 , S2 ) ∈ S1 × S2 distributed with PMF WS1 S2 , which mod-
each transmitter intends to send two pieces of information els the pair of information sources observed at the encoders.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
1
Specifically, sender j observes the sequence Sjt ∈ Sj : t ≥ 1, rate of the code is n log |I|, and the average probability of
and the sequence (S1t , S2t ) : t ≥ 1 are IID with single- error is
letter PMF WS1 S2 . The receiver aims to recover the sequence ¯ N ) = 1 − |I|−1
X
Tr λm ρ⊗n
ξ(c, c,m .
f (S1t , S2t ) : t ≥ 1 losslessly, where f : S1 × S2 → R is a
m∈I
specified function.
Definition 4. An (n, k, l, gI , gO/I , bn , ẽ) NCC built over a
Definition 1. A CQ-MAC code cf = (n, e1 , e2 , λ) of block- finite field Fq comprises of (i) generator matrices gI ∈ Fk×n ,
q
length n for recovering f consists of two encoding maps ej : gO/I ∈ Fl×n (ii) a bias vector b n
, and (iii) an encoding
q
Sjn → Xjn : j ∈ [2], and a POVM λ = {λrn ∈ P(HZ ) : rn ∈
map ẽ : Flq → Fkq . We let v n (a, m) = agI ⊕ mgO/I ⊕
Rn }. The average error probability of cf for N2 is
bn for (a, m) ∈ Fkq × Flq denote elements in the coset of the
range space of the generator matrix [gIT gO/I T
]T .
X
ξ(cf , N2 ) = 1 − WnS1 S2 (sn1 , sn2 ) Tr λrn ρ⊗n
c,sn ,
sn :f (sn )=r n Remark 1. Note that in an NCC, the denser (outer) code
where ρ⊗n = ⊗ni=1 ρx1i (sn1 )x2i (sn2 ) , where ej (snj ) = is generated by the matrix [gIT gO/I
T
]T , whereas the sparser
c,sn
(xj1 (sj ), xj2 (sj ), · · · , xjn (snj )) for j ∈
n n
[2]. (inner) code is generated by the matrix gI . Both codes are
shifted by a common bias vector. Although this is a packing
Definition 2. A function f of the sources WS1 S2 is problem (over the denser code), we additionally perform cov-
said to be reconstructible over a CQ-MAC N2 if for all ering over the sparser code. This additional layer of covering
(n) (n) (n)
ϵ > 0, ∃ a sequence cf = (n, e1 , e2 , λ) such that is needed because we generate all codewords not from an
(n) arbitrary non-uniform distribution, but from a random coset
limn→∞ ξ(cf , N2 ) = 0. Restricting f to a sum, we say that
the sum of sources WS1 S2 over field Fq is reconstructible over code that induces a uniform single-letter distribution on the
a CQ-MAC if S1 = S2 = Fq and the function f (S1 , S2 ) = alphabet Fq .
S1 ⊕ S2 is reconstructible over the CQ-MAC. Definition 5. A CQ-P2P code (n, I, e, λ) is said to be based
We review the performance limit achievable using unstruc- on NCC if there exists an (n, k, gI , gO/I , bn , ẽ) NCC such that
tured code ensembles in the following. I = Flq , and e(m) = g n (v n (ẽ(m), m)), for some mapping
g : Fq → X .
Proposition 1. A function f of the sources WS1 S2 is recon-
structible over a CQ-MAC N2 if Theorem 1. Given a CQ-P2P N : (ρx ∈ D(HZ ) : x ∈ X ), a
PMF pV X on Fq × X , and an ϵ > 0, there exists a CQ-P2P
H(S1 , S2 ) < max I(X1 X2 ; Z)σ , (1) code c = (n, Flq , e, λ) based on NCC such that
pX1 pX2
where the mutual information is defined for the following ¯ N ) ≤ ϵ, (ii) k log q > log q − H(V ) and
(i) ξ(c, 2 2
classical-quantum state n
(k + l)
log2 q < log2 q − H(V ) + I(V ; Z)σ ,
∆
X
σ= pX1 (x1 )pX2 (x2 )ρx1 x2 ⊗ |x1 ⟩⟨x1 | ⊗ |x2 ⟩⟨x2 | . n
x1 x2
for all sufficiently large n, where the classical-quantum state
Proof. The technique involves using the Slepian-Wolf [10] σ is given as
source coding to compress the source to H(S1 , S2 ) bits, and ∆
X X
followed by the Winter’s channel coding over the CQ-MAC σ= pV X (v, x) |v⟩⟨v| ⊗ ρx .
N2 [3]. v∈Fq x∈X
l
The objective of our work is to characterize improved Thus the rate of the code satisfies: n log q < I(V ; Z)σ .
sufficient conditions under which a generic bivariate function Proof. The proof is provided in Section V.
of the sources is reconstructible over a CQ-MAC N2 by
developing a structured coding framework for this problem. Remark 2. We interpret the above result as follows. To
achieve the capacity, we need an NCC where the rate of the
sparser (covering) code is approximately equal to log2 q −
III. M AIN R ESULTS
H(V ) (from above), which is the relative entropy between the
A. Nested Coset Codes Achieve Capacity of CQ-P2P uniform distribution and pV . The rate of the denser (packing)
We begin by formalizing the notion of a CQ-P2P codes code is approximately equal to log2 q−H(V )+I(V ; Z)σ (from
for communicating uniform messages. In the results presented below), which is the capacity with the additional covering cost.
below, we characterize the asymptotic performance of NCCs
and demonstrate that it achieves the capacity of a CQ-P2P
channel. B. Decoding the Sum over CQ-MAC N2
Definition 3. A CQ-P2P code cm = (n, I, e, λ) for a CQ- As a pedagogical step, our next result is regarding the setup
P2P N : (ρx ∈ D(HZ ) : x ∈ X ) consists of (i) an index set where a centralized receiver of an arbitrary CQ-MAC N2
I, (ii) an encoding map e : I → X n , and (iii) a decoding intends to reconstruct the sum f (S1 , S2 ) = S1 ⊕ S2 of the
⊗n ∆
POVM λ = {λm ∈ P(HZ ) : m ∈ I}. For m ∈ I, we sources, where S = S1 = S2 = Fq . Toward this, we begin
⊗n ∆ n
let ρc,m = ⊗i=1 ρxi where e(m) = (x1 (m), · · · , xn (m)). The with the following definition.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
Definition 6. Let Fq be a finite field and (ρx1 x2 ∈ D(HZ ) : Remark 3. R(N2 , q) is the maximum achievable rate of the
(x1 , x2 ) ∈ X1 × X2 ) be a CQ-MAC N2 . A CQ-MAC code messages whose sum can be computed reliably at the receiver
cm⊕ = (n, Flq , e1 , e2 , λ) of block-length n for recovering of the CQ-MAC. H(S1 ⊕ S2 ) is the rate needed to compress
Fq −sum of messages consists of two encoders maps ej : Flq → the sources distributively such that their sum can be computed
⊗n
Xjn : j ∈ [2], and a POVM λ = {λm ∈ P(HZ ) : m ∈ Flq }. reliably. The term given by max{I(V1 ; V ), I(V2 ; V )} can
be interpreted as the overall informational cost of having
An Fq −message-sum rate R > 0 is achievable if
non-uniform input distributions pV1 and pV2 . If V1 and V2
given any sequence l(n) ∈ N, for n ∈ N, such that
(n) are uniform, then V becomes independent of V1 and V2
lim supn→∞ l(n)nlog q < R, any sequence pM1 M2 of PMFs individually, and thus this term becomes zero.
l(n) l(n) (n)
on Fq × Fq , there exists a CQ-MAC code cm⊕ =
l(n) (n) (n) Remark 4. For the special case where the density operators
(n, Fq , e1 , e2 , λ) of block-length n for recovering
{ρx1 ,x2 } commute, we see that the quantum mutual infor-
Fq −sum of messages such that
mation (which equals the Holevo information in the present
(n) ∆ CQ case) reduces to a classical mutual information as given
lim ξ(cm⊕ , N2 ) =
n→∞ below: I(V ; Z)σ = I(V ; Z), where I(V ; Z) is computed with
(n)
X
lim 1 − pM1 M2 (m1 , m2 ) Tr λm1 ⊕m2 ρ⊗n
c,m = 0, the following classical PMF
n→∞
(m1 ,m2 )∈Flq ×Flq
pV1 X1 pV2 X2 λZ|X1 X2 ,
∆
where ρ⊗n
c,m = ⊗ni=1 ρx1i (m1 )x2i (m2 )
and ej (mj ) = and λZ|X1 X2 (·|x1 , x2 ) are the eigenvalues of ρx1 ,x2 . In this
(xj1 (mj ), xj2 (mj ), · · · , xjn (mj )) for j ∈ [2]. The closure case, the asymptotic sufficient condition of the above theorem
of the set of all achievable Fq −message-sum rates is the reduces to that of the classical case as given in [8].
message-sum capacity of N2 .
We now provide a lower bound on the message-sum ca- C. Decoding the sum of classical sources over a Quantum-to-
pacity of a CQ-MAC. Following this, we leverage the above Quantum (QQ) MAC M2
argument in Theorem 2 to characterize sufficient conditions Our next result is regarding a QQ-MAC setup for trans-
for reconstructing sum of sources over an arbitrary CQ-MAC. mitting classical messages that is composed of a completely-
positive trace preserving (CPTP) map M2 . Consider a
Definition 7. Given a CQ-MAC N2 and a prime q, let
(generic) QQ-MAC specified through (i) Hilbert spaces HX1 ,
P(N2 , q) be defined as collection of PMFs
HX2 , and HZ and (ii) a CPTP map M2 : D(HX1 ) ⊗
V = Fq , D(HX2 ) → D(HZ ). In this setting, the centralized receiver
pV1 V2 X1 X2 : pV1 V2 X1 X2 is a PMF on V × X1 × V × X2 , . of an arbitrary QQ-MAC M2 intends to reconstruct the sum
(V1 , X1 ) is independent of (V2 , X2 ) f (S1 , S2 ) = S1 ⊕S2 of the classical correlated sources, where
∆
S= S1 = S2 = Fq . Toward this, we begin with the following
Let,
definition.
∆
R(N2 , q) =
sup [I(V ; Z)σ − max{I(V1 ; V ), I(V2 ; V )}] ,
pV1 X1 V2 X2 ∈P(N2 ,q)
× 1{v1 ⊕v2 =v} ρx1 x2 ⊗ |v⟩⟨v| . Definition 8. Let Fq be a finite field and M2 : D(HX1 ) ⊗
Using the above definitions, we provide the following propo- D(HX2 ) → D(HZ ) be a CPTP map. A QQ-MAC code
sition. cm⊕ = (n, Flq , e1 , e2 , λ) of block-length n for recovering
Fq −sum of messages consists of two encoder maps ej :
Proposition 2. Fq −message-sum rate R(N2 , q) is achievable Flq → D(HX ⊗n
) : j ∈ [2], and a POVM λ = {λm ∈
j
over any CQ-MAC N2 . ⊗n
P(HZ ) : m ∈ Flq }. An Fq −message-sum rate R > 0
Proof. The proof is provided in Section VI-A. is achievable if given any sequence l(n) ∈ N, for n ∈ N,
(n)
such that lim supn→∞ l(n)nlog q < R, any sequence pM1 M2
We now state the main contribution of this subsection. l(n) l(n)
of PMFs on Fq × Fq , there exists a QQ-MAC code
(n) l(n) (n) (n)
Theorem 2. The sum of a pair of sources distributed with cm⊕ = (n, Fq , e1 , e2 , λ) of block-length n for recov-
PMF WS1 S2 can be reconstructed on a CQ-MAC N2 if ering Fq −sum of messages such that
H(S1 ⊕ S2 ) < R(N2 , q). (n) ∆
X (n)
lim ξ(cm⊕ , M2 ) = lim 1 − pM1 M2 (m1 , m2 )
n→∞ n→∞
Proof. The proof is provided in Section VI-B. (m1 ,m2 )∈Flq ×Flq
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
D. Decoding arbitrary functions over CQ-MAC where Imax (V1 , V2 , V )σ = max{I(V1 ; V ), I(V2 ; V )}, V =
To address this problem, as a building block, we consider V1 ⊕ V2 , and the mutual information quantities are taken with
the problem of 4-to-3 decoding over a 4-user CQ-MAC, where respect to the classical-quantum state
X
the receiver aims to compute the sum of messages of user σ= ∆
pV U (v, u)1{v=v1 ⊕v2} |v⟩⟨v|V ⊗|v1 ⟩⟨v1 |V1⊗|v2 ⟩⟨v2 |V2
1 and 2, and the individual messages of users 3 and 4. We v,u,v
obtain a characterization of asymptotic performance limits for ⊗ |u1 ⟩⟨u1 |U1 ⊗ |u2 ⟩⟨u2 |U2 ⊗ ρvu .
this problem. Based on the result we obtain for this problem,
and using the result of Ahlswede and Han [9], we derive Let
sufficient conditions for reconstructing arbitrary function of ∆
[
R(N4 , q) = c.c. R(pV U , N4 , q),
sources over a 2 user CQ-MAC. The former problem may
pV U ∈P(N4 ,q)
also be of independent interest.
Consider a (generic) 4-user CQ-MAC N4 , which is specified where c.c stands for convex closure.
through (i) finite (input) sets Vj : j ∈ [2] and Uj : j ∈ [2], (ii)
Theorem 4. The rate triples (R, R1 , R2 ) ∈ R(N4 , q) are
a (output) Hilbert space HZ , and (iii) a collection of density
achievable for 4-to-3 decoding over a CQ-MAC N4 and prime
operators (ρv1 v2 u1 u2 ∈ D(HZ ) : (v1 , v2 , u1 , u2 ) ∈ V1 × V2 ×
q.
U1 × U2 ).
Proof. The proof is provided in Section VII-A.
Definition 10. A code c = (n, Fq , eVj : j ∈ [2], eUj : j ∈
[2], λ) of block-length n, for 4-to-3 decoding over CQ-MAC Remark 5. As in Theorem 2, if the density operators asso-
N4 consists of four encoding maps eVj : Flq → Vjn : j ∈ [2], ciated with the channel commute, then the quantum mutual
eUj : [q lj ] → Ujn : j ∈ [2], and a POVM λ = {λm⊕ ,m3 ,m4 ∈ information quantities reduce to the classical counterparts.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
Here we provide our main result characterizing the suffi- Example 1 Example 2
0.3 1
0.1
Definition 13. A function f : S → R of sources WS1 S2 0.85
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
ternary field. In other words, the encoders and decoder work H(S1 ⊕ S2 ) = 0.0376223, we obtain the sufficient conditions
toward reconstructing S1 ⊕3 S2 . The sufficient condition given for the function f to be reconstructible as
by the algebraic coding scheme turns out to be
0.0376223 < max min{H(X1 ), H(X2 )}
pX1 pX2
H(S1 ⊕3 S2 ) <
− H(X) + χ({pX (x), ρx }), (3)
max min{H(X1 ), H(X2 )} − H(X) + χ({pX (x), ρx }) ,
pX1 pX2 ∆ ∆
where X = X1 ⊕2 X2 and ρx = ρx1 x2 for any (x1 , x2 ) such
∆ ∆ that x = x1 ⊕ x2 . Figure 4 depicts the behaviour of the
where X = X1 ⊕3 X2 and ρx =
right hand side of the above inequality for different values
P
p
x1 x2 X1 X2 |X (x 1 , x2 |x)ρ x x
1 2
. This can be further simplified
as of η. In particular, the inequality fails for η > 0.11, and
as a result the function f cannot be reconstructed using the
(1 − p) + hb (p) < max min{hb (θ1 ), hb (θ2 )} approach of Theorem 2 for all η ∈ (0.11, 0.5). Now, we
θ1 ,θ2
consider the sufficient conditions obtained from Theorem 5.
− hb (θ1 + θ2 −θ1 θ2 )
Figure 5, found at the top of the following page, shows the
− (θ1 + θ2 −θ1 θ2 )hb (θ1 θ2 /(θ1 + θ2 −θ1 θ2 )) regions Rs (WS1 S2 , f, 2) and Rc (N2 , 2) for different values
+ S(ρ((θ1 + θ2 −θ1 θ2 ) ∗ η)) of η, which demonstrates a clear overlap between Rs and Rc
for η = 0.12 and η = 0.2, which implies that the function
− (1 − θ1 )(1 − θ2 )S(ρ(η)) − [θ1 + θ2 − θ1 θ2 ]S(ρ(1 − η)) .
remains reconstructible for these η values.
It can be shown that there exists p, η, σ0 and σ1 such that
the above condition is satisfied. For instance, Figure 3 (right)
F. Applications
depicts all the achievable pairs (p, η) for the σ0 and σ1 chosen
as in Example 1. The problem of reconstructing functions of sources over
a classical MAC, i.e. computation over a MAC, finds exten-
Finally, we provide the following example to compare the sive applications in several network problems [19]. Examples
sufficient conditions obtained in Theorem 2 and Theorem 5. include coding for many-to-one interference channels [7],
compute-and-forward (CAF) strategy for wireless networks
0.3 [20], network coding for cooperative wireless networks [21],
sensor network estimation [22], interference management for
0.25 cellular uplink channel [23], and wireless network coding [24].
As for the CQ setup, recent works have explored the compute-
0.2
and-forward (CAF) relaying technique in quantum one-hop
relay network and symmetric private information retrieval
0.15
(SPIR) over a quantum internet network [6]. In this subsection,
0.1
we discuss some additional applications of computation over
a CQ-MAC.
0.037
1) Many-to-one classical-to-quantum interference network
(CQIC): Interference is often seen as an impediment in
0
0 0.11 0.2 0.3 0.4 0.5 a communication network, and decoding messages at the
receivers in a multi-user interference channel setting is
a challenging problem. However, computing sum over a
Fig. 4. The variation of the right hand side of (3), and its intersection with CQ-MAC can be used to manage interference. Consider
H(S1 ⊕S2 ). This implies that the inequality in (3) is not satisfied for all η >
0.11, and hence the function f cannot be reconstructed using the approach a 3-to-1 CQIC with three inputs X1 , X2 and X3 and with
of Theorem 2. quantum outputs characterized using density operators
ρYX11 ⊕X2 ⊕X3 , ρYX22 , and ρYX33 . As illustrated in Figure 6,
Example 3. Let X1 = X2 = S1 = S2 = X = {0, 1}, HZ = users 2 and 3 enjoy interference-free CQ-P2P channels.
C2 , and ρx1 ,x2 = (1 − η)σx + ησx̄ , where x = x1 ⊕2 x2 However, receiver 1 suffers interference from users 2
and σ0 , σ1 ∈ D(HZ ) be as defined in (2). Furthermore, to and 3, and it needs to decode the message X1 . A
induce asymmetry in the rate region, we constrain one of the naive approach is to treat the pair (X2 , X3 ) as noise
inputs with a cost constraint: E(X1 ) ≤ c. We choose c = 0.1 and decode X1 . But this is highly sub-optimal because
for the illustration. Let S1 and S2 be two highly asymmetric X2 , X3 encode information corresponding to messages
correlated sources (as considered in [9, Example 4]) with the of users 2 and 3, respectively, and is not just a noise. A
following distribution: better strategy is to decode the message pair (X2 , X3 ) and
then use the successive cancellation technique to decode
WS1 ,S2 (0, 0) = 0.003920, WS1 ,S2 (0, 1) = 0.976080, X1 . It can be noted that the interference is in the form
WS1 ,S2 (1, 0) = 0.019920, WS1 ,S2 (1, 1) = 0.000080, of the sum X2 ⊕ X3 . Hence, an even better strategy is
to decode only this sum and then apply the successive
and P (S1 = 0) = 0.98, P (S2 = 0) = 0.023840. Let cancellation technique. This can be improved even further
f (S1 , S2 ) = S1 ⊕2 S2 . Using Theorem 2 and the fact that by simultaneous decoding of the sum X2 ⊕ X3 and the
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
Fig. 5. A depiction of the intersection of Rs (in red) and Rc (in blue) for η = 0.12 and η = 0.2, using the technique provided in Theorem 5.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
∆
generator matrix G ∈ Fl×nq and a POVM λ = {λml : ml ∈ pair is produced such that it is intended to be reconstructed
l
Fq } such that for any ϵ > 0 and sufficiently large n, we have individually, i.e., as a pair (W1 , W2 ) at the joint receiver.
X This is based on the unstructured random coding approach,
⊗n
1 − q −l
Tr λml σm lG ≤ ϵ, more akin to the conventional Berger-Tung [25] source coding
ml (lossy Slepian-Wolf coding). Then in the second layer, the
⊗ l n KM encoding of the sources is performed, and the resulting
where σm l G = σx1 ⊗· · ·⊗σxn where m G = x . We can then
information is sent conditioned on the fact that the receiver
use this linear CQ-P2P code as our desired CQ-MAC channel
has access to the coarse version of the sources (W1 , W2 ).
code. Indeed, observe that, suppose both senders employ this
In essence, this is a (classical) superposition of Berger-Tung
same linear CQ-P2P code, then sender j maps its KM index
source coding and KM source coding, which leads to a smooth
mlj = Hsnj to the channel codeword as xnj = mlj G. Observe
transition between KM coding based on structured codes and
that the structure of the CQ-MAC implies ρ⊗n xn
⊗n
n = σxn ⊕xn =
1 ,x2
⊗
1 2 Slepian-Wolf coding based on unstructured codes. We use this
σ(ml ⊕ml )G . If the receiver employs the POVM {λml : ml ∈ approach on the source coding side. How do we interface
1 2
Flq } designed for the CQ-P2P, it ends up decoding the sum of this scheme with the two-user CQ-MAC? Encoder i receives
the KM indices ml1 ⊕ ml2 , and consequently, recover the sum two messages (Mi1 , Mi2 ) at rates Ri and R, respectively.
of the sources. These four messages need to be encoded distributively such
A careful analysis of the above idea reveals that two that the joint receiver may be able to reconstruct the triple
MAC channel codes employed by the encoders do not ‘blow (M11 , M21 , M12 ⊕ M22 ). This necessitates using a classical
up’ when added, is crucial to the efficiency of the above superposition of both unstructured coding as well as structured
scheme. A linear code being algebraically closed enables coding schemes for the CQ-MAC. Noting that the receiver
this. However, the codewords of a random linear code are wishes to decode three independent messages simultaneously,
uniformly distributed and cannot achieve the capacity of an we therefore require a CQ simultaneous decoding technique.
arbitrary classical P2P channel, let alone a CQ-P2P channel. In Sec. VII, we adapt the technique of tilting, smoothing, and
We are therefore forced to enlarge a linear code to identify augmentation introduced by Sen [12], [13] to the setting of
sufficiently many codewords of the desired empirical single- a superposition of unstructured and structured code (NCC)
letter distribution. We are thus led to a nested coset code ensembles to enable this, and provide a proof of Theorem
(NCC) [8]. A NCC comprises of cosets of a coarse linear 4. This yields a new set of sufficient conditions, that strictly
code within a fine code. Within each coset, we can identify enlarges the one achievable using solely structured codes
a codeword of the desired empirical distribution. We choose (Theorem 2), and thus allows us to obtain a proof of the third
as many cosets as the number of messages. Analogous to our main result of our work (Theorem 5).
illustration above where we chose a linear code that achieves
the capacity of the CQ-P2P (X = Fq , σu : u ∈ X ), our
first step (Sec. V) is to design a NCC with its POVM that can V. P ROOF OF T HEOREM 1
achieve capacity of an arbitrary CQ-P2P. Our second step is to As discussed in Sec. IV we shall build and analyze a NCC
endow both senders with this same NCC and analyze decoding comprising of cosets of a linear code wherein each coset
the sum of the messages. This gets us to our next challenge - contains a codeword of the desired empirical distribution for
How do we analyze decoding their message sum, for a general communication over a CQ-P2P N .
CQ-MAC ρx : x ∈ X for which x1 ⊕ x2 = x̂1 ⊕ x̂2 does not
necessarily imply ρx1 x2 = ρx̂1 x̂2 . In Sec. III-B, we address Proof. In order to achieve a rate R = I(V ; Z)σ , the standard
this challenge, leverage our findings in Sec. V and generalize approach is to pick 2nR codewords uniformly and indepen-
the idea for any arbitrary CQ-MAC, and presents a proof of dently from Tδn (pV ), for some δ > 0 sufficiently small.
the second set of results (Theorem 2). However, the resulting code is not algebraically closed. On the
The next question we ask is, how can we reconstruct other hand, if we pick a random generator matrix G ∈ Fql×n ,
arbitrary functions of the sources? We use the concept of with l = log nR
, whose entries from Fq are IID uniform, then
2q
embedding of bivariate functions in finite fields to address its range space - the resulting collection of 2nR codewords
this (see Definition 13). Recall that in KM coding, each source - are uniformly distributed and pairwise independent but not
encoder produces bits at the rate given by H(S1 ⊕ S2 ). This pV −typical.
approach works fairly well when the sources are symmet-
To satisfy the dual requirements of algebraically closure and
ric and uniform. As the source distribution becomes more
pV −typicality, we observe the following. If a collection of
asymmetric and non-uniform, this approach may become less
q k codewords are uniformly distributed in Fnq and pairwise
efficient. For example, if H(S2 ) < H(S1 ⊕ S2 ), then the
independent, as we found the range space of G to be, then
second encoder may as well send S2 losslessly at the rate
the expected number of codewords pV −typical is
h that are i
H(S2 ) (while the first encoder still sends HS1n ) and let the qk n
k H(V )
decoder compute HS2n , and proceed as before. To address q n |Tδ (pV )| = exp{n log2 q n − 1 − log2 q }. This indi-
such asymmetry, in the source coding setting, Ahlswede and cates that if we pick a generator matrix GI ∈ Fk×n q with
k H(V )
Han proposed a two-layered coding scheme, where in the entries uniformly distributed and IID, such that n > 1− log q ,
2
first layer, the encoders produce a coarse quantized version then its range space will contain codewords that are pV -typical.
of their respective sources, say W1 and W2 , respectively. The The latter codewords can be used for communication.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
10
formal proof we provide below has two parts - error probability Denoting event E = {θ(m) > 1}, its complement E c and the
analysis for a generic fixed code followed by an upper bound associated indicator functions 1E , 1E c respectively, a generic
on the latter via code randomization. term in the RHS of the above sum satisfies
Upper bound on error probability for a generic fixed code : tr((I − λam ,m )ρ⊗n ⊗n
m )1E c + tr((I − λam ,m )ρm )1E
Define the following 3
X
X ≤ 1E c + T2i ,
∆
ρv = pX|V (x|v)ρx , i=1
x∈X
where
and let V = Fq . Consider a generic NCC ∆
2 Tr (I − γam ,m )ρ⊗n
T21 = m 1E ,
(n, k, l, gI , gO/I , bn , ẽ) with its range space v n (a, m) = X
∆
Tr γâ,m ρ⊗n
agI ⊕q mgO/I ⊕q bn : (a, m) ∈ V k × V l . We shall use this and T22 = 4 m 1E ,
define a CQ-P2P code (n, I = V l , P e, λI ) that is an NCC CQ- â̸=am
∆ X X
P2P. Towards that end, let θ(m) = a∈V k 1{v n (a,m)∈Tδn (pV )}
∆
Tr γã,m̂ ρ⊗n
T23 = 4 m 1E ,
and m̸̂=m ã
(
∆ {a ∈ V k : v n (a, m) ∈ Tδn (pV )} if θ(m) ≥ 1 where we have used Hayashi-Nagaoka inequality [26].
s(m) = Distribution of the Random Code : The objects gI ∈
{0k } if θ(m) = 0,
V k×n , gO/I ∈ V l×n , bn ∈ V n and the collection (am ∈ s(m) :
for each m ∈ V l . For m ∈ V l , a predetermined element m ∈ V l ) specify an NCC CQ-P2P code unambiguously. A
am = ẽ(m) ∈ s(m) is chosen. On receiving message m ∈ V l , distribution for a random code is therefore specified through a
the encoder prepares the quantum state ρ⊗n ∆ ⊗n ∆ distribution of these objects. We let upper case letters denote
m = ρv n (am ,m) =
n
⊗i=1 ρvi (am ,m) , and is communicated. The encoding map ẽ is the associated random objects, and obtain
therefore determined via the collection (am ∈ s(m) : m ∈ Flq ).
GI = gI , GO/I = gO/I
P = q −(k+l+1)n
PTowards specifying
the decoding POVM let ρv = B n = bn , Am = am : m ∈ S(m)
p
y∈Y Y |V (y|v) e y|v ey|v be a spectral decomposition for Y 1
∆
v ∈ V. We let pV Y = pV pY |V . For any v n ∈ V n , let πvn be × ,
l
Θ(m)
m∈V
the conditional typical projector as in [17, Defn. 15.2.4] with
respect to the ensemble {ρv : v ∈ V} and distribution pV . and analyze the expectation of E and the terms T2i ; i ∈ [1, 3]
let πρ be the (unconditional) typical projector of the
Similarly, P in regards to the above random code. We begin by EP [E ] =
∆
P
state ρ = v∈V pV (v)ρv as defined in [17, Defn. 15.1.3]. For
P( a∈V k 1{V n (a,m)∈Tδn (pV )} < 1). For this, we provide the
∆ following proposition.
(a, m) ∈ V k × V l , we let πa,m = πvn (a,m) 1{vn (a,m)∈Tδn (pV )} .
∆ P
We let λ = { a∈V k λa,m : m ∈ I = Flq , λ−1 }, where Proposition 4. For any ϵ ∈ (0, 1), and for all sufficiently
X X −1/2 X X −1/2 small δ > 0 and sufficiently large n, we have EP [E ] ≤ ϵ, if
∆ k
λa,m = γâ,m̂ γa,m γã,m̃ , (4) n ≥ log q − H(V ) + ϵ.
â∈V k m̂∈V l ã∈V k m̃∈V l
Proof. The proof follows from [7, Proof of Thm. 2.5] with
∆ P P
λ−1 = I − m∈V l a∈V k λa,m and γa,m = πρ πa,m πρ . ∆ the identification of S = ϕ.
Since 0 ≤ γa,m ≤ I, we have 0 ≤ λa,m ≤ I. The latter We now consider T21 . For each a, m, denote the events
lower bound implies λ ⊆ P(H). The same lower bound ∆ ∆
coupled V= {V n (a, m) = v n }, A= {Am = a}.
P withP the definition of the generalized inverse implies
I ≥ a∈V k m∈V l λa,m ≥ 0. We thus have 0 ≤ λ−1 ≤ I. We have
It can now be verified that λ is a POVM. In essence, the XX X
pM (m) Tr πvn πρ ρ⊗n
elements of this POVM is identical to the standard POVMs EP [T21 ] = 1 − v n πρ
except the POVM elements corresponding to a coset have been m a v n ∈Tδ (pV )
added together. Indeed, since each coset corresponds to one ×EP [1A 1V ] ≤ δ1 ,
message, there is no need to disambiguate within the coset.
where the last inequality follows from the pinching argu-
1 The reader is encouraged to relate to the bounds stated in theorem ment, also provided in Lemma 1 (see Appendix B), with the
statement and induced bounds on the rate of communication nl log2 q. identification A = B = V, pA = pV , B = A, and the
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
11
density operators correspondingly. With this choice, we obtain For mj ∈ V l , a predetermined Xjn (mj ) ∈ Xjn is chosen.
for any ϵ ∈ (0, 1), EP {T21 } ≤ ϵ, for all sufficiently large As we shall see later, the choice of Xjn (mj ) is based on
n and sufficiently small δ. Next, we provide the following Vjn (Aj,mj , mj ). We are thus led to the encoding rule.
proposition to bound the terms corresponding to T22 and T23
in an expected sense. Encoding Rule: On receiving message (m1 , m2 ) ∈ V l ×
∆ ∆
V l , the quantum state ρm1 m2 = ρX1n (m1 )X2n (m2 ) =
Proposition 5. For any ϵ ∈ (0, 1), and for all sufficiently small n
⊗t=1 ρX1t (m1 )X2t (m2 ) is (distributively) prepared.
δ > 0 and sufficiently large n, we have EP [T22 + T23 ] ≤ ϵ if
the following inequalities hold: Distribution of the Random Code: The distribution of the ran-
dom code is completely specified through the distribution P(·)
2k of GI , GO/I , B1n , B2n , (A1,m1 : m1 ∈ Flq ), (A2,m2 : m2 ∈ Flq )
log q ≤ 2 log q + I(V ; Z)σ − 2H(V ) − ϵ
n and (Xjn (mj ) : mj ∈ V l ). We let
(2k + l)
log q ≤ 2 log q + I(V ; Z)σ − 2H(V ) − ϵ.
(A1,m1 = a1,m1 : m1 ∈ V l ),
n
(A2,m2 = a2,m2 : m2 ∈ V l ),
Proof. The proof is provided in Appendix A-A
Bjn = bnj : j ∈ [2], 1
k H(pV ) P =
n > 1 − log2 q ,
We have therefore obtained three bounds G I = gI , G O/I = gO/I , q kn+ln+2n
2k
< σ −2H(pV )
2+ I(V ;Z)log , 2k+l < 2+ I(V ;Z)σ −2H(pV )
. A rate (X1 (m1 ) = xn1 (m1 ) : m1 ∈ V l ),
n 2q n log2 q
(X2 (m2 ) = xn2 (m2 ) : m2 ∈ V l )
of I(V ; Z)σ −ϵ is achievable by choosing nk = 1− H(p V) ϵ
log2 q + 2 ,
√
" #
l I(V ;Z)σ −ϵ log2 q Y 1{a1,m ∈s1 (m1 )}
n = log2 q thus completing the proof. × 1 n n n
pX1 |V1 (x1 (m1 )|v1 (a1,m1 , m1 ))
m1
Θ(m1 )
VI. D ECODING S UM OVER CQ-MAC
" #
Y 1{a2,m ∈s2 (m2 )}
∆
Throughout this section, the source alphabets S = S1 = × 2
pnX2 |V2 (xn2 (m2 )|v2n (a2,m2 , m2 ) .
m
Θ(m 2 )
2
S2 = Fq , and the receiver intends to reconstruct the sum
(6)
f (S1 , S2 ) = S1 ⊕q S2 of the sources.
Towards specifying a decoding POVM, we state the associated
density operators modeling the quantum systems, their spectral
A. Proof of Proposition 2
decompositions and projectors. Let
Let pV1 V2 X1 X2 ∈ P(N2 , q) with associated collection X
∆
(ρv1 v2 : (v1 , v2 ) ∈ V × V) of density operators where ρ= sY (y) |hy ⟩ ⟨hy | ,
∆
X y∈Y
ρ v1 v2 = pX1 |V1 (x1 |v1 )pX2 |V2 (x2 |v2 )ρx1 x2 and ∆
X
x1 ,x2
ρx1 x2 = pY |X1 X2 (y|x1 , x2 ) ey|x1 x2 ey|x1 x2 : x ∈ X ,
∆
X y∈Y
ρv = pV1 V2 |V (v1 , v2 |v)ρv1 v2 . ∆
X
v1 ,v2 ρ v1 v 2 = qY |V1 V2 (y|v1 , v2 ) fy|v1 v2 fy|v1 v2 : v ∈ V,
y∈Y
We now describe the coding scheme in terms of a specific ∆
X
code. It is instructive to revisit Sec. IV, wherein we specified ρv = rY |V (y|v) gy|v gy|v : v ∈ V.
y∈Y
the import of both encoders employing cosets of the the
same linear code. In order to choose codewords of a desired
empirical distribution pVj , we employ NCCs (as was done for Decoding POVM: Unlike a generic CQ-MAC decoder [3],
the same reason in Sec. V). Following the same notation as which aims at decoding both the classical messages from
in proof of Theorem 1, we now specify the random coding the quantum state received, the decoder here is designed to
scheme. decode only the sum of messages transmitted. For this, the de-
Let GI ∈ Fk×n , GO/I ∈ Fl×n , Bj ∈ Fnq : j ∈ [2] coder employs the nested coset code (n, k, l, GI , GO/I , B n ),
q q ∆
be mutually independent and uniformly distributed on their where B n = B1n ⊕ B2n . We define V n (a, m) = aGI +
∆
respective range spaces. Let Vjn (a, mj ) = ∆
aGI ⊕ mj GO/I ⊕ mGO/I +B n to represent a generic codeword. We let Πa,m =
n k+l
Bj : (a, mj ) ∈ Fq for j ∈ [2] and V (a, m) = n ∆
aGI ⊕ πV n (a,m) 1{V n (a,m)∈T (n) (pV )} , where pV is as defined in the
δ
n n k+l
mGO/I ⊕ B1 ⊕ B2 : (a, m) ∈ Fq . For j ∈ [2], let theorem statement. The decoder is provided with a sub-POVM
∆ ∆
Λa,m : m ∈ Flq } where
P
Λ= {Λm = a∈Fk
q
k n
{a ∈ V : Vj (a,X
mj ) ∈ Tδn (pVj )}, X X −1/2 X X −1/2
∆
1{V n (a,mj )∈T n (pV )} ≥ 1
if Λa,m = Γâ,m̂ Γa,m Γâ,m̂ ,
j δ j
∆ a∈V k â∈Fk l
q m̂∈Fq â∈Fk l
q m̂∈Fq
Sj (mj ) =
{0k } otherwise,
∆ P P ∆
i.e.
X
1{V n (a,mj )∈T n (pV )} = 0, Λ−1 = I− a∈Fk
q m∈Flq Λa,m and Γa,m = πρ Π(a,m) πρ . We
note that
j δ j
a∈V k
n
for each mj ∈ V l . For mj ∈ V l , a predetermined element ∆
X O
πρ = |hyt ⟩ ⟨hyt | and
∆
Aj,mj ∈ Sj (mj ) is chosen. We let Θj (mj ) = |Sj (mj )|. y n ∈Tδn (sY ) t=1
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
12
n
∆
πv n =
X O
gy
gyt |vt , thereby ensuring T1 ≤ 2 exp{−nδ}, if
t |vt
y n :(v n ,y n )∈Tδn (pV rY |V ) t=1 k log q
≥ max {log q − H(V1 ), log q − H(V2 )} + ϵ
denote the typical and conditional typical projectors (as stated n
∆ P
in Definition 15.2.4 [17]) with respect to ρ = = log q − min{H(V1 ), H(V2 )} + ϵ, (11)
v∈Fq pV (v)ρv
and (ρv : v ∈ V), respectively.
for sufficiently large n and sufficiently small δ. We now
Error Analysis: We derive upper bounds on EP {ξ(cm⊕ )}. Our analyze T2 . Applying the Hayashi-Nagaoka inequality, we
derivation will be similar to those adopted in proof of Thm. 1. have
Let us define event
T2 ≤ EP [T21 + T22 + T23 ], (12)
( V n (A , m ), X n (m ),
1 1.m1 1 1 1
∆
E = V2n (A2.m2 , m2 ), X2n (m2 ),
where
n n
V1 (A1.m1 , m1 ) ⊕ V2 (A2.m2 , m2 )
∆
XX
⊗n
o
∈ T8δ (pV1 X1 V2 X2 V ) . (7) T21 = 2 pM (m) Tr [I − ΓA⊕
m ,m ⊕ ]ρm1 m2 ] 1E ,
m
1 2 m
We have ∆
X X X
pM (m) Tr Γâ,m⊕ ρ⊗n
( ) T22 = 4 m1 m2 1E ,
X m1 m2 â̸=A⊕
m
⊗n
EP pM1 M2 (m1 , m2 ) Tr([I − Λm1 ⊕m2 ])ρm1 m2 ≤ ∆
XX X X
pM (m) Tr Γâ,m̂ ρ⊗n
m1 ,m2 T23 = 4 m1 m2 1E ,
( ) m1 m2 â̸=A⊕
m m̸̂=m
⊕
X
EP pM1 M2 (m1 , m2 )Tr([I − Λm1 ⊕m2 ])ρ⊗n
m1 m2 1E c (13)
m1 ,m2
∆ ⊕ ∆
| {z
T1
} and A⊕ k
m = A1,m1 ⊕ A2,m2 ∈ V , m = m1 ⊕ m2 ∈ V . Note
l
( ) that (12) follows from an argument analogous to the one in
(5). We now analyze T21 , T22 and T23 . We begin with T21 .
X
+ EP pM1 M2 (m1 , m2 )Tr([I − Λm1 ⊕m2 ])ρ⊗n
m1 m2 1E .
m1 ,m2 For each m1 and m2 , denote the events
| {z } n
T2 ∆
V1n (A1.m1 , m1 ), X1n (m1 ), V2n (A2.m2 , m2 ), X2n (m2 )
J=
(8) o
In regards to T1 , the sub-POVM nature of ΛI and the fact = (v1n , xn1 , v2 , x2 ) ∈ Tδ (pV1 X1 V2 X2 ) ,
that ρ⊗n
m1 ,m2 is a density operator enables us conclude T1 ≤ ∆
V= {Vjn (aj , mj ) = vjn : j ∈ [2]},
EP {1E c }. Furthermore, observe that Xj (mj ) is distributed ∆ ∆
with PMF pnXj |Vj conditionally on Vjn (Aj,mj ,mj ) (See (6)). V̂ = {V n (a⊕ , m1 ⊕ m2 ) = v n⊕ }, A = {Aj,mj = aj : j ∈ [2]},
In addition, pV1 X1 V2 X2 = pV1 X1 pV2 X2 implies that standard
abbreviating v n⊕ = v1n ⊕ v2n , a⊕ = a1 ⊕ a2 . We have
conditional typicality arguments yields
nX XX X
EP {1E c } ≤ EP pM1 (m1 )1{Θ1 (m1 )=0} + EP [T21 ] = 1 − pM (m) Tr πvn πρ ρ⊗n
xn x
1 2
n πρ
m1 m a1 ,a2 (v n ,x)∈
X o Tδ (pV X )
pM2 (m2 )1{Θ1 (m2 )=0} + exp{−nϵ}, (9)
×EP 1J 1A 1V 1V̂ ≤ ϵ
m2
for all sufficiently large n, and for all sufficiently small δ. In for all sufficiently large n and sufficiently small δ, where
the above inequality, the second term on the RHS is an upper the last inequality follows from the pinching argument, also
bound on the probability of the event (X1n (m1 ), X2n (m2 )) ∈ / provided in Lemma 1 (see Appendix B). Set A = V = Fq ,
Tδn (pV1 X1 V2 X2 V |v1n , v2n , v1n ⊕ v2n ) conditioned on B = X , pAB = pV1 ⊕V2 ,X and the density operators corre-
(V1n (A1.m1 , m1 ), V2n (A2.m2 , m2 ), V1n (A1.m1 , m1 ) ⊕ spondingly. The proposition below bounds the terms T22 and
V2n (A2.m2 , m2 )) = (v1n , v2n , v1n ⊕ v2n ) ∈ Tδn (pV1 V2 V ), and the T23 as follows.
first term provides an upper bound on the complement of
Proposition 6. For any ϵ ∈ (0, 1), and for all sufficiently small
the latter event. An upper bound on T1 therefore reduces to
δ > 0 and sufficiently large n, we have EP [T22 + T23 ] ≤ ϵ if
deriving an upper bound on the first term on the RHS of (9).
the following inequalities hold:
This task - deriving an upper bound on the first term on the
RHS of (9) - being a classical analysis, has been detailed in 3k
several earlier works, in particular [7, Proof of Thm. 2.5]. log q ≤ 3 log q +I(V ; Z)σ−H(V1 , V2 )− H(V )− ϵ,
n
Following this, we have (3k + l)
log q ≤ 3 log q +I(V ; Z)σ−H(V1 , V2 )− H(V )− ϵ.
n
nX o
EP pMj (mj )1{Θj (mj )=0} ≤
mj Proof. The proof is provided in Appendix A-B.
k log q
exp −n − [log q − H(Vj )] , (10) This completes the proof of the proposition.
n
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
13
∆ L
B. Proof of Theorem 2 by |W| = |WVj | = |WUj |, and denotes external direct sum
We provide a brief outline of a proof. As stated in Sec. IV, of Hilbert spaces, and (iii) a collection of density operators
we propose a ‘separation based approach’ with two modules {ρ′vuw ∈ D(HZ
′
) : (v, u, wV , wU ) ∈ V × U × W V × W U },
- source and channel. The source coding module employs a
(distributed) Körner Marton (KM) source code. Specifically, where w = (wV1 , wV2 , wU1 , wU2 ), wV =
[4] guarantees the existence of a parity check matrix h ∈ (wV1 , wV2 ), and W V = WV1 × WV2 . Similarly wU and W U
F l×n
= S l×n and a decoder map d : Flq → S n such that are defined. Note that the states in the Hilbert spaces WVj and
Pq n n WUj are used as quantum registers to store classical values.
sn ∈S n WS (s )1{d(hs1 ⊕q hs2 )̸=s1 ⊕q s2 } ≤ ϵ, for any ϵ > 0,
n n n n
∆ VU ∆ 2
l log2 q
and sufficiently large n, so long as n ≥ H(S1 ⊕q S2 ) + ϵ. Define ρ′vuw = Tw;τ (ρ̃vu ), where ρ̃vu = ρvu ⊗ |0⟩⟨0|C , and
VU ′
Both encoders of this KM source coding module employ Tw;τ is a tilting map [13, Section 4] from H̄Z to HZ defined
one such parity check matrix h ∈ Fl×n . The decoder of as:
q L2 L2
the KM source code employs the corresponding decoder map ∆
(|z⟩ i=1 τ |z, wVi ⟩ j=1 τ z, wUj
VU
d. KM source encoder j outputs Mjl = h(Sjn ). If the KM Tw;τ (|z⟩) = √ ,
1 + 4τ 2
source decoder is provided M1l ⊕q M2l , then it can reconstruct
S1n ⊕q S2n with reliability at least 1 − ϵ. The task of the and τ will be chosen appropriately in the sequel.
CQ-MAC channel coding module is to make M1l ⊕q M2l Encoding: Consider two NCCs (n, k, l, gI , gO/I , bnj , ej ) hav-
available to the KM source decoder. Specifically, this channel ing the same parameters except with different bias vectors bj s
coding module must communicate M1l ⊕q M2l ∈ Flq within and encoding maps ej s. For each j ∈ [2] and mj ∈ Flq , let
n channel uses. From the result of Proposition 6, we have
(
∆ {amj : vjn (amj , mj ) ∈ Tδn (pVj )} if θ(mj ) ≥ 1
a CQ-MAC receiver that can decode the sum of messages Aj (mj ) =
{0k } otherwise,
M1l ⊕q M2l ∈ Flq having an arbitrary distribution pM1 M2 ,
given the rate constraints provided hold. Concatenating the where θ(mj ) = ∆ P
1{vn (a,mj )∈T n (pV )} . For mj ∈
a∈Fk q
two source and channel coding schemes yields the desired l
j δ
Fq : j ∈ [2], a pre-determined element amj ∈ Aj (mj ) is
result. ∆
chosen and let vjn (amj , mj ) = amj gI ⊕ mj gO/I ⊕ bnj for
k+l
(amj , mj ) ∈ Fq for j ∈ [2]. Moreover, for each j ∈ [2] and
VII. D ECODING ARBITRARY FUNCTIONS OVER CQ-MAC
mj+2 ∈ [q lj ], construct a codeword unj (mj+2 ) ∈ Ujn . Simi-
A. Proof of Theorem 4 larly, for each j ∈ [2], mj ∈ Flq and mj+2 ∈ [qjl ], construct
Let pV1 V2 U1 U2 ∈ P(N4 , q) be a PMF on V1 ×V2 ×U1 ×U2 the codewords wVnj (mj ) ∈ WVnj and wU n
j
(mj+2 ) ∈ WUnj .
where V1 = V2 = Fq . We begin by describing the coding For later convenience, we define an additional identical map
scheme in terms of a specific class of codes. In order to wVn (m) = wVn1 (m) for all m ∈ Flq . On receiving the message
∆
choose codewords of a desired empirical distribution pVj , we m ∈ Flq × Flq × [q l1 ] × [q l2 ], the quantum state ρ′m⊗n =
again employ Nested Coset Codes (NCCs). Both the encoders
ρ′v1n (am n (m )v n (a
,m1 )wV n n n n n
m2 ,m2 )wV (m2 )(u1 ,wU )(m3 )(u2 ,wU )(m4 )
eVj : j ∈ [2] employ cosets of the same linear code. We then 1 1
1 2 2 1 2
consider a 4-to-3 decoding over a ‘perturbed’ variant of CQ- is (distributively) prepared. Towards specifying a decoding
MAC (as introduced by [13]), which we denote as N4′ . Note POVM’s, we define the following associated density operators.
that in the current problem, the decoder wishes to decode three ∆
X
messages simultaneously, and hence we use the framework ρ= pnV (v n )pnU (un )ρvn un ,
v n ,un
of CQ joint typicality developed using the ideas of tilting, X
∆
smoothing and augmentation [13]. This allows us to perform ρv n = pnV |V (v n |v n )pnU (un )ρvn un ,
intersection of non-commuting POVM elements to construct a v n ,un
set of POVMs for N4′ . Finally, towards bounding the average ∆
X
ρuni = pnUj (unj )ρvn un : i ̸= j, i, j ∈ [2],
error probability for N4 , we use an argument, similar to [13, v n un
j
Equation 5], which shows that the outputs of the channel N4′ ∆
X
and N4 are indistinguishable in trace norm. Thus, the POVMs ρvn uni = pnV |V (v n |v n )pnUj (unj )ρvn un : i ̸= j, i, j ∈ [2],
v n ,un
constructed for N4′ can be used for N4 with an additional X
j
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
14
∆
Define v n (a, m) = agI + mgO/I + bn , representing a generic ‘union’ of ‘complement’ of orthogonal projectors correspond-
codeword in a generic coset. ing to the sub-POVMs defined in (14):
∆ VU
M M U
V
POVM construction: We start by defining the sub-POVMs b vn un wn wn =
Ω V U
Ω̄ v n un Ω v n un w n w n
V U
Ωvnj un wn wn
V U
for channel N , subsequently we will construct the sub- j∈[2]
POVMs for the ‘perturbed’ CQ-MAC N4′ using the process VU U
M M
Ωvn ujn wn wn Ωvn un wn wn . (15)
V U V U
of tilting [13]. Let πρ be the typical projector for the state j∈[2]
ρ. Furthermore, for j ∈ [2] and for all jointly typical vectors
(n)
(v n , un ) ∈ Tδ (pV U ), let πvn , πunj , πvn unj , πun and πvn un be Consider a collection of orthogonal projectors Π b′ n n n n
v u wV wU
′ ⊗n
the conditional typical projector [17, Def. 15.2.4] with respect in HZ projecting onto Ω b vn un wn wn , and the orthogonal
V U
to the states ρvn , ρuni , ρvn uni , ρun and ρvn un , respectively. projector Πe ′ also in H′ ⊗n projecting onto H̄⊗n .
Z Z
Now, we define the following sub-POVMs in the Hilbert ′ ⊗n
⊗n
Subsequently, define the sub-POVMs in HZ for channel
space HZ : N4′ as follows:
∆ ∆ U
ΠV j
v n un = πρ πv n πv n un πv n πρ , Πv n un = πρ πun
j
πvn un πunj πρ , ∆
γvn un wVn wnU = I− Πb ′vn un wn wn Π e′ I − Π
b ′vn un wn wn .
V U V U
VU ∆ ∆ U
Πvn ujn = πρ πvn unj πvn un πvn unj πρ , Πvn un = πρ πun πvn un πun πρ , (16)
VU ∆
Πv n u n = πρ πvn un πρ : i ̸= j, i, j ∈ [2]. (14) The decoder now uses the sub-POVMs γvn un wVn wnU as
The following are well-known results regarding typical defined above to construct a square root measurement [17],
(n) [18] to decode the messages. We define following operators,
projectors and (v n , un ) ∈ T8δ (pV U ).
X X −1/2
∆
Proposition 7. For all ϵ > 0, and δ ∈ (0, 1) sufficiently small λ(a,m),m3 ,m4 = γ(â,m̂),m̂3 ,m̂4 γ(a,m),m3 ,m4
and n sufficiently large, and i, j ∈ [2] with i ̸= j the following â,m̂ m̂3 ,m̂4
inequality holds for the sub-POVMs defined in (14). X X −1/2
γ(â,m̂),m̂3 ,m̂4 ,
Tr ΠΦ n
v u n ρ v n un ≥ 1 − ϵ, â,m̂ m̂3 ,m̂4
(17)
for all Φ ∈ {V, Uj , VUj , U, VU},
VU
where γ(a,m),m3 ,m4 is an abbreviation for
Tr Πvn un ρ ≤ 2−n(I(V,U1 ,U2 ;Z)σ −ϵ) , γvn (a,m)un1 (m3 )un2 (m4 )wVn (m)wUn (m3 )wUn (m4 ) , and we let
1 2
the perturbation wV used by the decoder is identical to that
X
−n(I(U1 ,U2 ;Z|V )σ −ϵ)
pnU (un ) Tr ΠVv n un ρv n ≤ 2 ,
un of either user 1 or user 2, and without loss of generality
X
U
wV = wV1 , as mentioned earlier (in the discussion on
pnV (v n ) Tr Πvn un ρun ≤ 2−n(I(V ;Z|U1 ,U2 )σ −ϵ) , encoding).
vn
X
VU
Distribution of Random Code: The dis-
pnUi (uni ) Tr Πvn ujn ρvn unj ≤ 2−n(I(Ui ;Z|Uj ,V )σ −ϵ) ,
tribution of the random code is completely
un
i
specified through the distribution P(·) of
U
X
pnV (v n )pnUi (uni ) Tr Πvnj un ρunj ≤ 2−n(I(V,Ui ;Z|Uj )σ −ϵ) . GI , GO/I , Bjn , Amj , , WVnj (mj ), Ujn (mj+2 ), WUnj (mj+2 ) : j ∈
v n un
i [2]. We let
where the mutual information quantities are taken with respect
GI = gI , GO/I = gO/I , Bjn = bnj , Amj = amj ,
to the classical-quantum state σ same as in Definition 12.
Ujn (mj+2 ) = unj (mj+2 ),
After constructing the sub-POVMs, we now construct the P
WVn (mj ) = wvn (mj ), WUn (mj+2 ) = wun (mj+2 )
projectors. It is worth to observe that by the Gelfand- j j j j
Naimark theorem [18], there exists orthogonal projectors : j ∈ [2] , m ∈ Flq × Flq × [q l1 ] × [q l2 ]
Uj VUj U VU ⊗n Y 1{amj ∈Aj (mj )}
Π̄V
v n un , Π̄v n un , Π̄v n un , Π̄v n un and Π̄v n un in H̄Z that gives 1
= pn (un (mj+2 )) kn+ln+2n . (18)
the same measurements statistics on the states σ ⊗ θ(mj )|WVj ||WUj | Uj j q
2n ⊗n j∈[2]
|0⟩⟨0|C ∈ D(H̄Z ) that sub-POVMs defined in (14) give
⊗n ∆
on the states σ ∈ D(HZ ). To summarize upto this point, Also define A⊕ = Am1 ⊕ Am2 .
we have constructed the projectors in H̄Z ⊗n
for the channel Error Analysis: We derive an upper bound on ξ(c ¯ (n) , N ′ ), by
4
N4 using the sub-POVMs defined in (14), and we are now averaging over the above ensemble. Using the encoding and
equipped to construct the sub-POVMs for N4′ . Let us define decoding rule stated above, the average probability of error of
Ω̄V
v n un as the orthogonal complement of the support of Π̄v n un .
V
the code is given as,
Uj VUj U VU
Analogously, we define Ω̄vn un , Ω̄vn un , Ω̄vn un , and Ω̄vn un . X
(
X
)
Then we define the corresponding tilted subspace in HZ ′ ⊗n
as: ¯
ξ(c(n) ′
,N ) = pM (m)Tr I − λ(a,m⊕ ),m ,m ρ ′ ⊗n
4 3 4 m
V ∆ V V n n
Ωvn un wVn wnU = TwVn ;τ (Ω̄vn un ) , for all wV ∈ WV1 . Likewise, m
n
a
o
U VU U
X
define Ωvnj un wn wn , Ωvn ujn wn wn and Ωvn un wn wn . Also, let us I − λ(a⊕ ,m⊕ ),m3 ,m4 ρ′m⊗n ,
V U V U V U
≤ pM (m)Tr
define a new subspace Ω b vn un wn wn , which is analogous to the m
V U
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
15
∆ 2k+l1 +l2
where a⊕ = am1 ⊕ am2 , and ρ′m⊗n is as defined above (in the log q ≤ 2 log q+I(U1 ,U2 ;Z|V )σ −H(V1 ,V2)−ϵ,
discussion on encoding). Now consider the event, n
3k+l
n
V1 (Am1 , m1 ), V2n (Am2 , m2 ),
(n)
log q ≤ 3 log q+I(V ; Z|U1 , U2 )σ −HV1 ,V2 − ϵ,
E =∆
∈ T (p V UV ) , n
U1n (m3 ), U2n (m4 ), V n (A⊕ , m⊕ ) 8δ
3k+l+lj
log q ≤ 3 log q+I(V, Uj ; Z|Ui )σ −HV1 ,V2 − ϵ,
where we recall that V n (A⊕ , m⊕ ) = A⊕ GI ⊕ m⊕ GO/I ⊕ n
B n = V1n (Am1 , m1 ) ⊕ V2n (Am2 , m2 ). Then, 3k+l+l1 +l2
log q ≤ 3 log q+I(V, U1 , U2 ; Z)σ −HV1 ,V2 − ϵ,
n o n o n
EP ξ(c¯ (n) , N ′ ) = EP ξ(c¯ (n) , N ′ )1E c + ξ(c
¯ (n) , N ′ )1E
4 4 4 where i, j ∈ [2], i ̸= j, HV1 ,V2 = H(V1 , V2 ) + H(V ), and
the mutual information quantities are taken with respect to
n o
≤ EP {1E c } + EP ξ(c ¯ (n) ′
, N4 )1E .
| {z } | {z } the classical-quantum state σ same as in Definition 12.
T1
T2
Proof. The proof is provided in Appendix A-D.
As observed in the earlier section, for all ϵ > 0, and for all
sufficiently large n and sufficiently small δ > 0, we have Now, we need to bound average error probability for N4 .
1/4
T1 ≤ ϵ, if For any ϵ ∈
(0, 1), if we let τ
= ϵ , and use the following
′
argument,
ρvn un wn − ρ̃vn un
≤ 4τ (similar to the provided
k
log q ≥ log q − min{H(V1 ), H(V2 )} + δ. 1
in [13, Equation 5]) and the trace inequality Tr{∆ρ} ≤
n
To bound the error probability corresponding to T2 , we apply Tr{∆σ} + 21 ∥ρ − σ∥1 , where 0 ≤ ∆, ρ, σ ≤ I, then for all
¯ (n) , N4 ) ≤ ξ(c
sufficiently large n, we have ξ(c ¯ (n) , N ′ )+2ϵ1/4 .
the Hayashi-Nagaoka inequality and obtain 4
h In other words, the average decoding error for CQ-MAC N4
T2 ≤ EP 2 T20 + 4 is bounded from above by the average decoding error for CQ-
n X X oi MAC N4′ with an additional error of 2ϵ1/4 for the same rate
× T2V + T2Uj + T2V Uj + T2U + T2V U , constraints and decoding strategy used for N4′ . This concludes
j∈[2] j∈[2] the proof of Theorem 4.
| {z }
T21
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
16
P
quantum information-theoretic quantities. We also identified follows from the operator inequality xn ∈Tδ (pV ) πρ ρxn πρ ≤
examples, establishing the efficacy of our approach. 2n(H(pV )+δ1 (δ) πρ ρ⊗n πρ ≤ 2n(H(pV )+δ1 (δ)−S(ρ)) πρ found in
Our work opens further directions for exploration such [17, Eqn. 20.34, 15.20], (b) follows from Eqn. 19, (c) follows
developing an outer bound to the performance limit, and from pairwise independence of the distinct codewords, and (d)
formulating the problem and characterizing a performance follows from πρ ≤ I and [17, Eqn. 15.77] and δ1 (δ) ↘ 0 as
limit in the one-shot case. One may extend the proposed δ ↘ 0. We now derive an upper bound on EP [T23 ]. We have
method to the case with entanglement assistance. Another X X X h i
questions with potential wide-reaching implications is how EP [T23 ] = E tr(πρ Πâ,m̂ πρ ρ⊗n )1
Am ,m J
to extend the results to a fully quantum-quantum (QQ) setup d,â∈V k m̸̂=m xn ,x̂n ∈
Tδn (pV )
with quantum sources. In section III-C, we have been able to X X X
show sufficient conditions required for reconstructing sum of = tr(πx̂n πρ ρ⊗n
xn πρ )P(J )
classical sources over a QQ-MAC. It is of interest to develop d,â∈V k m̸̂=m xn ,x̂n ∈Tδn (pV )
the codes for reconstructing a CPTP map of quantum sources
X X X
≤ tr(πx̂n πρ )P(J )2−n[S(ρ)−H(pV )+δ1 ]
over a QQ-MAC. d,â∈V k m̸̂=m x̂ n
∈Tδn (pV )
Acknowledgement: We thank the anonymous reviewers X X X
for their comments that greatly helped in preparing a better ≤ tr(πx̂n πρ )P(K)2−n[S(ρ)−H(pV )+δ1 ]
n
manuscript. d,â∈V k m̸̂=m x̂ ∈Tδn (pV )
X X X 1 −n[S(ρ)−H(pV )+δ1 ]
= tr(πx̂n πρ ) 2
A PPENDIX A q 2n
d,â∈V k m̸̂=m x̂n ∈Tδn (pV )
P ROOF OF P ROPOSITIONS 2k+l
We begin by denoting the event where the inequalities above use similar reasoning as in
bounding the above term corresponding to T22 .
Θ(m) ≥ 1,V n (â, m̂) = x̂n
∆
J =
Am = d, V n (d, m) = xn
n
V (â, m̂) = x̂n
B. Proof of Proposition 6
∆
⊆K = . (19)
V n (d, m) = xn We begin by defining the following events:
n
Considering EP [T22 ], we perform the following steps. ∆
V1n (A1.m1 , m1 ), X1n (m1 ), V2n (A2.m2 , m2 ), X2n (m2 )
J=
X
EP [tr(Γâ,m ρ⊗n
o
EP [T22 ] = m )1{θ(m)≥1} 1{â̸=Am } ] = (v1n , xn1 , v2 , x2 ) ∈ T8δ (pV1 X1 V2 X2 ) ,
â∈V k
∆
V= {Vjn (aj , mj ) = vjn : j ∈ [2]},
m )1{â̸=d} 1J
X X X X
E tr(Γâ,m ρ⊗n
=
∆ ∆
d∈V k â∈V k xn ∈Tδn (pV ) x̂n ∈V n V̂ = {V n (â, m1 ⊕ m2 ) = v̂ n }, A = {Aj,mj = aj : j ∈ [2]},
m ) 1J ,
X X X X
E tr(Γâ,m ρ⊗n
= This gives,
d∈V k â̸=d xn ∈Tδn (pV ) x̂n ∈V n "
XX X X
where the restriction of the summation xn to Tδn (pV ) is valid EP [T22 ] = EP 4 pM (m)
since |S(m)| > 1 forces the choice Am ∈ S(m) such that m a1 ,a2 â̸=a⊕ (v n ,x)∈
T8δ (pV X )
V n (Am , m) ∈ Tδn (pV ). Going further, we have #
xn )1J
X X X
E tr(πρ πx̂n πρ ρ⊗n Γâ,m⊕ ρ⊗n
EP [T22 ] = × Tr m1 m2 1J 1A ,
n n
d,â∈V k xn ∈Tδ (pV ) x̂n ∈Tδ (pV )
â̸=d (a) XX X X X
X X X = 4 pM (m) Tr πv̂n πρ ρ⊗n
xn xn πρ
= tr(πρ πx̂n πρ ρ⊗n
xn )P(J ) m a1 ,a2 â̸=a⊕ (v n ,x)∈ v̂ n ∈V n
1 2
× EP 1J 1A 1V̂ ,
(a) X X
−n[S(ρ)−H(pV )+δ1 ]
≤ tr(πx̂n πρ )P(J )2 (b) XX X X X X
d,â:â̸=d x̂n ∈Tδn (pV ) ≤4 pM (m)P(V, A, V̂)
(b) X X m a1 ,a2 â̸=a⊕ (v n )∈ xn ∈X n v̂ n ∈V n
≤ tr(πx̂n πρ )P(K)2−n[S(ρ)−H(pV )+δ1 ] T8δ (pV )
d,â:â̸=d x̂n ∈Tδn (pV ) 2
Y
(c) X X 1 −n[S(ρ)−H(pV )+δ1 ] × pXj |Vj (xnj |vjn ) Tr πv̂n πρ ρ⊗n
xn x n πρ ,
= tr(πx̂n πρ ) 2 1 2
q 2n j=1
d,â:â̸=d x̂n ∈Tδn (pV )
(c) XX X X X
(d)
−n[I(V ;Z)σ +δ1 −2H(pV )− 2k
=4 pM (m)P(V, A, V̂)
≤ 2 n log q+2 log q ] , (20) m a1 ,a2 â̸=a⊕ (v n )∈ v̂ n ∈V n
T8δ (pV )
where the restriction of the summation x̂n to Tδn (pV ) follows
from the fact that πx̂n is the zero projector if x̂n ∈
/ Tδn (pV ), (a) × Tr πv̂n πρ ρ⊗nn n
v 1 v2 πρ ,
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
17
(d)
X X X X
≤4 pM (m)P(V, V̂)
XX X X X
≤ 4 pM (m)P(V, V̂)
n n n
m a1 ,a2 â̸=a⊕ (v n )∈ v̂ n ∈V n m∈V 2l a∈V 2k (v )∈ v̂ ∈V
T8δ (pV ) m̸̂=m1 ⊕m2 â∈V k T8δ (pV )
× Tr πv̂n πρ ρ⊗n
× Tr πv̂n πρ ρ⊗n
n
v1 v2 n π ρ v1n v2n πρ
X pM (m) X X X X pM (m)
Tr πv̂n πρ ρ⊗n
≤4
XX X X
v1n v2n πρ
⊗n
≤4 Tr π v̂ n πρ ρ n n πρ
v1 v2 q 3n
m a1 ,a2 â̸=a⊕ (v n )∈ v̂ ∈V n n
q 3n m∈V 2l
n
a∈V 2k (v )∈ v̂ ∈V
n n
(e) X pM (m)
1
X X
≤4
XX X
≤4 pM (m) Tr(πv̂n πρ ) Tr(πv̂n πρ )
q 3n n n
q 3n
m, â v̂ n ∈T8δ (V ) m∈V 2l a∈V 2k v̂ ∈V
a1 ,a2 m̸̂=m1 ⊕m2 â∈V k
× 2−n(S(ρ)−H(V1 ,V2 )−δ1 ) × 2−n(S(ρ)−H(V1 ,V2 )−δ1 )
(f ) X X pM (m)
≤ 4 2 −n[S(ρ)−H(V1,V2 )−δ1 − v pV (v)S(ρv )−H(V)]
P XX X pM (m)
q 3n =4 Tr(πv̂n πρ )
m, â q 3n
a1 ,a2 m,m̂ â, v̂ n ∈Tδ (V1 ⊕V2 )
h a1 ,a2
(g) −n 3 log q−H(V1 , V2 )− 3k log q − δ1 × 2−n(S(ρ)−H(V1 ,V2 )−δ1 )
n
≤ 4 · exp P i , X X pM (m)
− p (v)S(ρ ) + H(V ) − S(ρ) −n[S(ρ)−H(V1,V2 )−δ1 − v pV (v)S(ρv )−H(V)]
P
v V v
≤4 2
(21) q 3n
m,m̂ â,
a1 ,a2
h
−n 3 log q−H(V1 , V2 )− (3k+l) log q − δ1
and (a) follows from a summing over possible choices for n
≤ 4 · exp i .
V n (â, m1 ⊕ m2 ), (b) follows from evaluating the expectation, − P pV (v)S(ρv ) + H(V ) − S(ρ)
v
enlarging the summation range of xn1 , xn2 and substituting the
distribution of the random code, (c) follows from the defini- The above sequence of steps are analogous to those used in
tions of ρv1 v2 : v ∈ V, (d) follows as an upper bound since one deriving an upper bound on T22 and follow from the same
of the events has been enlarged, (e) follows from [27, Lemma set of arguments as provided for the bounds in (21). This
completes the proof of the claimed statement.
P
N.0.21c] and the operator inequality xn ∈Tδ (pV ) πρ ρxn πρ ≤
2n(H(pV )+δ1 (δ)) πρ ρ⊗n πρ ≤ 2n(H(pV )+δ1 (δ)−S(ρ)) πρ found in
[17, Eqn. 20.34, 15.20], and from the definition of πv̂n which C. Proof of Proposition 8
is the 0 projector if v̂ n is not typical with respect to pV , (f )
follows from πρ ≤ I and [17, Eqn. 15.77], and finally (g) For m, am1 and am2 , define the following events:
follows by collating all the bounds.
V ≜ {Vjn (amj , mj ) = vjn : j ∈ [2]},
We now analyze T23 .
U ≜ {Ujn (mj+2 ) = unj : j ∈ [2]},
X X X
EP [T23 ] = EP 4 pM (m) W ≜ {W n (m) = wn }, A ≜ {Amj = aj : j ∈ [2]}.
m∈V 2l
a∈V 2k (v n ,x)∈
m̸̂=m1 ⊕m2 â∈V k T8δ (pV X )
Additionally, for m⊕ and a⊕ , define the following events:
× Tr Γâ,m⊕ ρ⊗n
∆ ∆
m1 m2 1J 1A V̂ = {V n (a⊕ , m⊕ ) = v n }, Ŵ = {WVn (m⊕ ) = wVn }.
X X X X
=4 pM (m) hX X
m∈V 2l
a∈V 2k (v n ,x)∈ v̂ n ∈V n EP [T20 ] = EP pM (m)1V 1V̂ 1U 1W 1Ŵ 1A 1E
m̸̂=m1 ⊕m2 â∈V k T8δ (pV X ) m v n un v n
a
wn wV n
× Tr πv̂n πρ ρ⊗n
n n
x1 x2 π ρ EP 1J 1A 1V̂ n oi
I − Γvn un wVn wnU ρ′un vn wn ,
X X X X X × Tr
≤4 pM (m)P(V, A, V̂)
(a) X X
n n n n n
m∈V 2l a∈V 2k (v )∈ x ∈X v̂ ∈V ≤ 2τ + pM (m)P(V, V̂, A)P (U) P(W, Ŵ)
m̸̂=m1 ⊕m2 â∈V k T8δ (pV )
m n n (n)
a (v u )∈T8δ
2
Y n n n
v w wV
× pXj |Vj (xnj |vjn ) Tr πv̂n πρ ρ⊗n
n n
x1 x2 π ρ × Tr
I − Γvn un wVn wnU ρ̃un vn ,
j=1
(b) X X h n o
e ′ )ρ̃un vn
X X X X
=4 pM (m)P(V, A, V̂) ≤ 2τ + 4 pM (m) Tr (I − Π
n n n m n n (n)
m∈V 2l a∈V 2k (v )∈ v̂ ∈V a (v u )∈T8δ
m̸̂=m1 ⊕m2 â∈V k T8δ (pV ) v n wn wV
n
n oi
× Tr πv̂n πρ ρ⊗n
n n
v1 v2 π ρ + Tr Πb ′ n n n n ρ̃un vn P(V, V̂, A)P (U) P(W, Ŵ),
v u wV wU
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
18
wn
|W|
∆
where U = {V, Uj , VUj , U, VU},
and δ2 (δ) ↘ 0 as
δ ↘ 0, 1 + τ 2 V1
and (a) follows from the argument
ρ′vn un wn − ρ̃vn un
≤ 4τ
= T n (ρ̃vn un ) + NŵVn1 ;τ (ρ̃vn un ),
1 1 + 4τ 2 ŵV ;τ V
(similar to the [13, Equation 5]) and the trace inequality
Tr{∆ρ} ≤ Tr{∆σ} + 12 ∥ρ − σ∥1 , where 0 ≤ ∆, ρ, σ ≤ (e) follows from the typicality property that for
n (n)
I , (b) follows from Non-Commutative union bound [28], vP ∈ T8δ (pV1 V2 ) and sufficiently large n, we have
(c) follows from the fact that Π e ′ is a projection operator n n n n n
v n pV (v )pV |V (v |v ) ≤ 2−n(H(V1 ,V2 )+δ1 ) , and the
′ ⊗n ⊗n ⊗n following observations found in [13, Section 4]:
HZ projecting onto H̄Z , and ρ̃vn un ∈ D(H̄Z ). Thus,
Tr{(I − Π ′
e )ρ̃vn un } = 0, (d) follows from [13, Corollary 1],
√ p
1/4 (i)
Nτ (ρ̃vn un )
∞ ≤ 4 2τ / |W|n ,
and (e) follows from Proposition 7. Letting τ = δ2 , we √
√
p
obtain EP [T20 ] ≤ 504 δ2 + 2δ2 .
1/4 (ii) ||NŵVn1 ;τ (ρ̃vn un )||∞ ≤ 4 2τ / |W|n ,
V
This concludes the proof of the Proposition 8. (iii) ||Γv̂n ûn ŵVn ŵnU ||1 ≤ 2|HZ |n ,
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
19
" #
h i n o
pM (m)Tr Γv̂n ûn ŵVn ŵnU ρ′vn un wn 1V 1V̂ 1U 1Û 1W 1Ŵ 1A 1E ,
X X X X
EP T2V U = E
m un ûn v n v̂ n â m̸̂=m⊕
a
wn ŵVn n
ŵU m̂3 ̸=m3
m̂4 ̸=m4
(a) X X X X n o
≤ pM (m)Tr Γv̂n ûn ŵVn ŵnU ρ′vn un wn P(V, V̂)P(U)P(Û)P(W, Ŵ),
m n n (n) â m̸̂=m⊕
a (u ,v )∈T8δ
v̂ n ûn m̂3 ̸=m3
wn ŵV n n
ŵU m̂4 ̸=m4
(b) X X X X pM (m) n X o
= P(Û)P(Ŵ)Tr Γv̂n ûn ŵVn ŵnU P(U)P(W|Ŵ)ρ′vn un wn ,
m n n ⊕
q 3n
v̂ û â m̸̂=m (un ,v n )∈T8δ
(n)
a n n
ŵV ŵU m̂3 ̸=m3 wn
m̂4 ̸=m4
(c) X X X X pM (m) n X
= P(Û)P(Ŵ)Tr Γv̂n ûn ŵVn ŵnU P(U)
m n n ⊕
q 3n
v̂ û â m̸̂=m (un ,v n )∈T8δ
(n)
a n n
ŵV ŵU m̂3 ̸=m3
m̂4 ̸=m4
1
h 1 io
1{m̸̂=m1 }
VU
1 1 VU
X X
× T n (ρ̃ n
v u n ) + {m̂=m1 } n n
{wV =ŵV } T n (ρ̃ n
v un ) ,
wn
|W|4n w ;τ wn
1 |W|3n w ;τ
(d) X X X X p (m) n
M
X
≤ 3n
P(Û)P(Ŵ)Tr Γv̂n ûn ŵVn ŵnU P(U)
m n n ⊕
q
v̂ û â m̸̂=m n n (n)
(u ,v )∈T8δ
a n n
ŵV ŵU m̂3 ̸=m3
m̂4 ̸=m4
h 1 1 + τ2 io
× 2
ρ̃vn un + Nτ (ρ̃vn un ) + 1{m̂=m1 }
1{m̸̂=m1 } 2
TŵVn1;τ (ρ̃vn un ) + NŵVn1 ;τ (ρ̃vn un ) ,
1 + 4τ 1 + 4τ V V
(e) X X X X p (m)
n
M
X
n(H(V1 ,V2 )+δ1 ) n n
≤ P( Û)P(Ŵ)2 p V (v ) Tr Γv̂n ûn ŵVn ŵnU
m n n ⊕
q 3n vn
v̂ û â m̸̂=m
a n n
ŵV ŵU m̂3 ̸=m3
m̂4 ̸=m4
h
1{m̸̂=m1 } pnV |V (v n |v n )1{vn =v1n ⊕v2n } ρ̃vn un +
X X
× P(U)
n (n)
u v n :(un ,v n )∈T8δ
io 16√2τ |H |n
+1 (v |v )1{vn =v1n ⊕v2n } ρ̃vn un ) + p
Z
X
V1
( {m̂=m1 } Tŵn ;τ pnV |V n
n
n
,
n n n (n)
V
|W|
v :(u ,v )∈T8δ
n
(f ) X X X X pM (m) n(H(V1 ,V2 )+δ1 )
= P( Û)P(Ŵ)2 Tr Γv̂n ûn ŵVn ŵnU
m n n ⊕
q 3n
v̂ û â m̸̂=m
a n n
ŵV ŵU m̂3 ̸=m3
m̂4 ̸=m4
h io 16√2τ |H |n
pnV (v n )P(U) 1{m̸̂=m1 } ρ̃vn un + 1{m̂=m1 } TŵVn1;τ (ρ̃vn un ) + p
Z
X
× n ,
v n un
V
|W|
(g) X X X X p (m)
n o 16√2τ |H |n
M n(H(V1 ,V2 )+δ1 ) VU Z
≤ 3n
P(Û)P(Ŵ)2 Tr Πv̂n ûn ρ + p n ,
m v̂ n ûn â m̸̂=m⊕ q |W|
a n n
ŵV ŵU m̂3 ̸=m3
m̂4 ̸=m4
√
16 2τ |HZ |n
(h)
X X X X pM (m)
n(H(V1 ,V2 )+δ1 ) −n(I(V U1 U2 ;Z)−δ1 )
≤ P(Û)P(Ŵ)2 2 + p n ,
m v̂ n ûn â m̸̂=m⊕ q 3n |W|
a n n
ŵV ŵU m̂3 ̸=m3
m̂4 ̸=m4
n h io
(i) 3k+l+l1 +l2
n n log q−3 log q+H(V )+H(V1 ,V2 )+3δ1 −I(V,U1 ,U2 ;Z)σ
≤2 ,
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
20
" #
n o
pM (m)Tr Γvn ûn wVn ŵnU ρ′vn un wn 1V 1V̂ 1U 1Û 1W 1Ŵ 1A 1E ,
X X X
EP T2U = E
m v n ,ûn ,v n ,un m̂3 ̸=m3
a n
wV ,wn ,ŵn U
m̂4 ≠ m4
(a) X X X n o
≤ pM (m)Tr Γvn ûn wVn ŵnU ρ′vn un wn P(V, V̂)P(U)P(Û)P(W, Ŵ),
m n n n (n) m̂ ̸=m3
a v (u ,v )∈T8δ m̂3 =
4 ̸ m4
ûn wn wV
n n
ŵU
(b) X X X pM (m) n X o
= P(Û)P(Ŵ)Tr Γvn ûn wVn ŵnU P(U)P(W|Ŵ)ρ′vn un wn ,
m v n v n ûn m̂ ̸=m q 2n (n)
a n n
3 3 un :(un ,v n )∈T8δ
wV ŵU m̂4 = ̸ m4 wn
(c) X X X pM (m) n X
= P(Û)P(Ŵ)Tr Γvn ûn wVn ŵnU P(U)
m v n v n ûn m̂ ̸=m q 2n (n)
a n n
3 3 n
u :(un ,v n )∈T8δ
wV ŵU m̂4 = ̸ m4
h 1 1 io
1{m⊕ ̸=m1 } VU
n ;τ (ρ̃v n un ) + 1{m⊕ =m } 1 VU
X X
× T w {w n =w n } T w n ;τ (ρ̃v n un ) ,
wn
|W|4n 1
wn
V1 V
|W|3n
(d) X X X pM (m) n X
≤ P( Û)P( Ŵ)Tr Γ v n ûn w n ŵ n P(U)
m v n v n ûn m̂3 ̸=m3 q 2n V U
n n n (n)
a n n m̂ =
u :(u ,v )∈T8δ
wV ŵU 4 ̸ m4
h 1 + τ2 io
× 1{m⊕ ̸=m1 } ρ̃vn un + Nτ (ρ̃vn un ) + 1{m⊕ =m1 } T V1
n (ρ̃ v
V1
n un ) + N n (ρ̃ v n un ) ,
1 + 4τ 2" wV ;τ wV ;τ
(e) X X X pM (m) X n X
n(H(V1 ,V2 )+δ1 ) n n
≤ 2n
P( Û)P(Ŵ)2 p V (v ) Tr Γvn ûn wVn ŵnU P(U)
m q
ûn m̂3 ̸=m3 vn n
u
a n n m̂ =
wV ŵU 4 ̸ m4
h
× 1{m⊕ ̸=m1 } pnV |V (vn |vn )1{vn =v1n ⊕v2n } ρ̃vn un
io 16√2τ |H |n
#
+1 (v |v )1{vn =v1n ⊕v2n } ρ̃vn un ) + p
Z
X
V1
( {m⊕ =m1 } TwV
n ;τ pnV |V n n
n ,
n n n (n) |W|
v :(u ,v )∈T8δ
"
(f ) X X X pM (m) X n
n(H(V1 ,V2 )+δ1 ) n n
= P(Û)P( Ŵ)2 pV (v ) Tr Γvn ûn wVn ŵnU
m n q 2n vn
û m̂3 ̸=m3
a n n m̂ =
wV ŵU 4 ̸ m4
io 16√2τ |H |n
#
h
1{m⊕ ̸=m1 } P(U)ρ̃vn un + 1
Z
X X
V1
× {m⊕ =m1 } TŵV
n ;τ ( P(U)ρ̃vn un ) + p n ,
un un
|W|
(g) X X X pM (m) X
≤ 2n
P(Ŵ)2n(H(V1 ,V2 )+δ1 ) pnV (v n )
m wn ŵn m̂3 ̸=m3 q vn
a V U
m̂4 ≠ m4
o 16√2τ |H |n
" #
n
Z
X
× P(Û)Tr ΠV v n ûn ρv n + p n ,
ûn |W|
√
(h) X X X pM (m) h
n(H(V1 ,V2 )+δ1 ) −n(I(U1 U2 ;Z|V )−δ1 ) 16 2τ |HZ |n i
≤ P(Ŵ)2 2 + p n ,
m wn ŵn m̂3 ̸=m3 q 2n |W|
a V U
m̂4 ̸=m4
(i) 2k+l1 +l2
≤ 2{n[( n ) log q−2 log q+H(V1 ,V2 )+3δ1 −I(U1 ,U2 ;Z|V )σ ]} .
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
21
typical projectors. We adopt strong (frequency) typicality. All
n n
statements hold for most of the variants of notion of typicality.
X O
O
= Tr ey |v ey |v ρ
x
t t t t
j
For concreteness, the reader may refer to [7, App. A].
yn :
t=1
j=1
(n)
Lemma 1. Suppose (i) A, B are finite sets, (ii) pAB is a PMF (v n ,y n )∈T4δ (pV qY |V )
on A × B, (iii) (ρb ∈ P D(H) : b ∈ B) is a collection of n
∆
density operators, ρ = b∈B pB|A (b|a)ρb for a ∈ A and ρ =
X O
a = Tr
ey eyt |vt ρxt
X X t |vt
pA (a)ρa = pB (b)ρb . There exists a strictly positive y n :(v n ,y n )∈T4δ (pV qY |V ) t=1
(n)
a∈A b∈B n
µ > 0, whose value depends only on pAB , such that for every X Y
δ > 0, there exists a N (δ) ∈ N such that for all n ≥ N (δ), = eyt |vt |ρxt |eyt |vt eyt |vt |ρxt |eyt |vt
yn : t=1
we have (n)
(v n ,y n )∈T4δ (pV qY |V )
Tr Πδρ Πδan Πδρ ρbn ≥ 1 − exp{−nλδ 2 },
X n
Y
≥ pY |XV (yt |xt , vt )
(n)
whenever (an , bn ) ∈ Tδ (pAB ) where Πδan is the conditional y n ∈T4δ (pXV pY |XV |xn ,v n )) t=1
(n)
Proof. We rename A = V, B = X , pAB = pV X , a as v and where we used (23) in the last equality, and (x∗ , v ∗ , y ∗ ) is the
b as x. We have triple which attains the minimum non-zero probability.
1
We next provide the upper bound. Note from the Gentle
Tr Πδρ Πδvn Πδρ ρxn ≥ Tr Πδvn ρxn −
ρxn − Πδρ ρxn Πδρ
.
2 measurements lemma √ [17, Lemma 9.4.2], we have ∥ρxn −
(22) Πδρ ρxn Πδρ || ≤ 3 ϵ if Tr Πδρ ρxn ≥ 1 −ϵ. In the following
we provide aN lower bound on Tr Πδρ ρxn . Recall that Πδρ =
In the following we derive a lower bound on Tr
Πδvn ρxn P n
y n ∈T n (sY ) t=1 |gyt ⟩ ⟨gyt |, where
and derive an upper bound on
ρxn − Πδρ ρxn Πδρ
. Toward δ
pY |XV (y|x, v) = ey|v |ρx |ey|v ey|v |ρx |ey|v , P
is the spectral decomposition of ρ, and ρ = x∈X pX (x)ρx .
∆
for all (x, v, y) ∈ X × V P × Y. Clearly, we have Let p̂Y |X (y|x) = ⟨gy |ρx |gy |gy |ρx |gy ⟩, for all (x, y) ∈ X × Y.
pY |XV (y|x,
v) ≥ 0, and y∈Y pY |XV (y|x, v) = Note that p̂Y |X is not related to pY |XPdefined previously.
P
y∈Y e y|v |ρ x |e y|v
ey|v |ρx |ey|v = Tr(ρx ) = 1. Hence, we We note that p̂Y |X (y|x) ≥ 0, and
P y∈Y p̂Y |X (y|x) =
see that pY |XV is a stochastic matrix. Next we note that y∈Y ⟨gy |ρ x |gy |gy |ρ x |gy ⟩ = Tr(ρ x ) = 1 for all x ∈ X . Thus
X we see that p̂Y |X is a stochastic matrix. It can also be noted
pY |XV (y|x, v)pXV (x, v) that
x∈X
X X
p̂Y |X (y|x)pX (x)
= pXV (x, v) ey|v |ρx |ey|v ey|v |ρx |ey|v
x∈X x∈X
* +
= pV (v) X X
= gy | pX (x)ρx |gy gy | pX (x)ρx |gy
* +
X X
x∈X x∈X
× ey|v | pX|V (x|v)ρx |ey|v ey|v | pX|V (x|v)ρx |ey|v
x∈X
x∈X
= ⟨gy |ρ|gy |gy |ρ|gy ⟩ = sY (y),
= pV (v) ey|v |ρv |ey|v ey|v |ρv |ey|v = pV (v)qY |V (y|v), for all y ∈ Y. This implies that the condition y n ∈ Tδn (sY ) is
(23) equivalent to the condition y n ∈ Tδn (p̂Y ), where p̂Y (y) =
n n
P
where we have used the spectral decomposition of ρv . x∈X p̂Y |X (y|x)pX (x). Moreover, if x ∈ Tδ/2 (pX ),
Observe that if (xn , v n ) ∈ Tδ/4 n
(pXV ), and y n ∈ n n n
and y ∈ Tδ (pX p̂Y |X |x ), then we have (x , y ) ∈ n n
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
22
n
[14] O. Fawzi, P. Hayden, I. Savov, P. Sen, and M. M. Wilde, “Classical com-
X Y
= p̂Y |X (yt |xt ) munication over a quantum interference channel,” IEEE Transactions on
y n ∈T δ (sY ) t=1 Information Theory, vol. 58, no. 6, pp. 3670–3691, 2012.
X n
Y [15] I. Savov, “Network information theory for classical-quantum channels,”
≥ p̂Y |X (yt |xt ) arXiv preprint arXiv:1208.4188, 2012.
[16] T. A. Atif, A. Padakandla, and S. S. Pradhan, “Achievable rate-region for
y n ∈Tδ (p̂Y |X pX |xn ) t=1 3—user classical-quantum interference channel using structured codes,”
2nδ 2 p2X (x∗ )p̂2Y |X (y|x) in 2021 IEEE International Symposium on Information Theory (ISIT),
( )
≥ 1 − 2|X ||Y| exp − . 2021, pp. 760–765.
4(log(|X ||Y|))2 [17] M. M. Wilde, Quantum Information Theory, 1st ed. USA: Cambridge
University Press, 2013.
(25) [18] A. S. Holevo, Quantum systems, channels, information: a mathematical
∗ introduction. Walter de Gruyter, 2012, vol. 16.
where x is the value which attains the minimum non-zero [19] M. Gastpar and B. Nazer, “Algebraic structure in network information
probability. We therefore have theory,” IEEE ISIT Tutorial, 2011.
[20] B. Nazer and M. Gastpar, “Compute-and-forward: Harnessing inter-
2nδ 2 p2X (x∗ )p̂2Y |X (y|x)
( )
δ δ ference through structured codes,” IEEE Transactions on Information
∥ρxn −Πρ ρxn Πρ ∥ ≤ 6|X ||Y| exp − , Theory, vol. 57, no. 10, pp. 6463–6486, 2011.
4(log(|X ||Y|))2 [21] M. V. Pedersen, F. H. Fitzek, and T. Larsen, “Implementation and
performance evaluation of network coding for cooperative mobile
and devices,” in ICC Workshops-2008 IEEE International Conference on
2nδ 2 p2X (x∗ )p̂2Y |X (y|x) Communications Workshops. IEEE, 2008, pp. 91–96.
Tr(Πvn ρxn ) ≥ 1 − 2|X ||Y|||V| , [22] A. Giridhar and P. R. Kumar, “Computing and communicating func-
4(log(|X ||Y|))2 tions over sensor networks,” IEEE Journal on selected areas in
communications, vol. 23, no. 4, pp. 755–764, 2005.
thereby permitting us to conclude that [23] B. Nazer, A. Sanderovich, M. Gastpar, and S. Shamai, “Structured
1 superposition for backhaul constrained cellular uplink,” in 2009 IEEE
Tr Πδρ Πδvn Πδρ ρxn ≥ Tr Πδvn ρxn − ∥ρxn − Πδρ ρxn Πδρ ∥
International Symposium on Information Theory, 2009, pp. 1530–1534.
2 [24] B. Nazer and M. Gastpar, “Computing over multiple-access chan-
2nδ 2 p2X (x∗ )p̂2Y |X (y|x) nels with connections to wireless network coding,” in 2006 IEEE
≥1− , International Symposium on Information Theory, 2006, pp. 1354–1358.
4(log(|X ||Y|))2 [25] T. Berger, “Multiterminal source coding,” The Inform. Theory Approach
to Communications, G. Longo, Ed., New York: Springer-Verlag, 1977.
if (xn , v n ) ∈ Tδ/2
n
(pXV ). [26] M. Hayashi and H. Nagaoka, “General formulas for capacity of classical-
quantum channels,” IEEE Transactions on Information Theory, vol. 49,
R EFERENCES no. 7, pp. 1753–1768, 2003.
[27] A. Padakandla, “An Algebraic Framework for Multi-terminal Commu-
[1] B. Schumacher and M. D. Westmoreland, “Sending classical information nication,” Ph.D. dissertation, Univ. of Michigan, Ann Arbor, USA, May.
via noisy quantum channels,” Phys. Rev. A, vol. 56, pp. 131–138, Jul 2014, available at http://deepblue.lib.umich.edu/handle/2027.42/107264.
1997. [Online]. Available: https://link.aps.org/doi/10.1103/PhysRevA. [28] P. Sen, “Achieving the han-kobayashi inner bound for the quantum inter-
56.131 ference channel,” in 2012 IEEE International Symposium on Information
[2] A. S. Holevo, “The capacity of the quantum channel with general signal Theory Proceedings. IEEE, 2012, pp. 736–740.
states,” IEEE Transactions on Information Theory, vol. 44, no. 1, pp.
269–273, 1998.
[3] A. Winter, “The capacity of the quantum multiple-access channel,” IEEE
Transactions on Information Theory, vol. 47, no. 7, pp. 3059–3065,
2001.
Mohammad Aamir Sohail is pursuing a Ph.D. degree in the Department
[4] J. Korner and K. Marton, “How to encode the modulo-two sum of binary
of Electrical and Computer Engineering at the University of Michigan, Ann
sources (corresp.),” IEEE Transactions on Information Theory, vol. 25,
Arbor. His research interests include quantum error correction, quantum
no. 2, pp. 219–221, 1979.
algorithms, and quantum information theory. He graduated from the Indian
[5] B. Nazer and M. Gastpar, “Computation over multiple-access channels,”
Institute of Technology (IIT) Hyderabad with a Bachelor of Technology degree
IEEE Trans. on Info. Th., vol. 53, no. 10, pp. 3498 –3516, oct. 2007.
in Electrical Engineering and was awarded the President of India Gold Medal.
[6] M. Hayashi and Á. Vázquez-Castro, “Computation-aided classical-
quantum multiple access to boost network communication speeds,”
Physical Review Applied, vol. 16, no. 5, p. 054021, 2021.
[7] S. S. Pradhan, A. Padakandla, and F. Shirani, “An algebraic and
probabilistic framework for network information theory,” Foundations
and Trends® in Communications and Information Theory, vol. 18, Touheed Anwar Atif received a B.Tech. degree from the Department of
no. 2, pp. 173–379, 2020. [Online]. Available: http://dx.doi.org/10. Electrical Engineering, Indian Institute of Technology Hyderabad in 2017 and
1561/0100000083 an M.Sc. degree in Electrical Engineering from the University of Michigan,
[8] A. Padakandla and S. Sandeep Pradhan, “Computing sum of sources Ann Arbor in 2019. He is currently pursuing a Ph.D. degree in Electrical
over an arbitrary multiple access channel,” in 2013 IEEE International Engineering and Computer Science with the University of Michigan, Ann
Symposium on Information Theory, 2013, pp. 2144–2148. Arbor. His research interests include quantum information theory and quantum
[9] R. Ahlswede and T. Han, “On source coding with side information via a algorithms.
multiple-access channel and related problems in multi-user information
theory,” IEEE Transactions on Information Theory, vol. 29, no. 3, pp.
396–412, 1983.
[10] D. Slepian and J. Wolf, “Noiseless coding of correlated information
sources,” IEEE Transactions on information Theory, vol. 19, no. 4, pp. Arun Padakandla received an MSc degree in Electrical Communication
471–480, 1973. Engg. from the Indian Institute of Science, Bangalore. He went on to receive
[11] T. A. Atif, A. Padakandla, and S. S. Pradhan, “Computing sum of an MSc degree in Mathematics and a Doctorate in Electrical Engg., both
sources over a classical-quantum mac,” in 2021 IEEE International from the University of Michigan at Ann Arbor. Following a brief stint as a
Symposium on Information Theory (ISIT), 2021, pp. 414–419. research engineer at Ericsson Research, San Jose, he joined the NSF Center
[12] P. Sen, “A one-shot quantum joint typicality lemma. arxiv e-prints, page,” for Science of Information as a postdoctoral research fellow in 2015. Since
arXiv preprint arXiv:1806.07278, 2018. 2018, he has been on the faculty of the Dept. of EECS, Univ. of Tennessee
[13] ——, “Unions, intersections and a one-shot quantum joint typicality at Knoxville. His research interests lie in quantum and classical information
lemma,” Sādhanā, vol. 46, no. 1, pp. 1–44, 2021. science.
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in IEEE Transactions on Information Theory. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TIT.2022.3192876
23
© 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: UNIVERSITY OF TENNESSEE LIBRARIES. Downloaded on July 23,2022 at 22:47:54 UTC from IEEE Xplore. Restrictions apply.