4 views

Uploaded by gejikeiji

save

- Entanglement Under Symmetry
- transformation fluency
- Solutions_for_SA_Two_Paper_1
- Talk 1793
- God and Quantum Mechanics (EPUB): Is the Material World Truly Real? Is the Entire Universe Just a “Simulation” in a Supercomputer?
- Quantum Teleportation
- AE51-AC51-AT51
- f02q2sol (1).pdf
- M. J. Davis et al- Quantum noise and entanglement in Bose-Einstein condensates
- Eugene Butkov PDF
- Quantum computing notes
- OSE522.HW01.2011
- 1409
- HW3-p151-Q33
- articol dinamica
- w20160801191655653_7000002383_10-05-2016_133158_pm_w20160801191655857_7000841954_09-11-2016_075749_am_Maximos_minimos
- Chapter 5 French
- Modeling 2
- 0009191
- HW6
- HW5
- About CMS _ Critical Management
- Quantum Teleportation Science Fiction NOPE!
- 124994 Midterm Exam Fall 2009
- 2315ijcsitce02
- Integration
- chapter12.2
- Lecture 6
- 02 Force Systems
- Air Fuel Ratio sistem injeksi.docx
- ppt-suratno-pembel-humaniora.pptx
- escape.pptx
- Feijao.pdf
- zasdfrtyu
- Expo
- 132-515-1-PB.pdf
- Accidentes y Sus Factores
- Pembahasan_Lengkap_Mesin_Anaestesi.pdf
- hapticppt-120802031214-phpapp01 (1).pdf
- SOAL UJIAN SEKOLAH 2014-2015 .doc
- 01a Kontrak Belajar
- Istituto di Filosofia di Napoli apre l'anno con una lezione su Losurdo - Pesarourbinonotizie.com, 27 novembre 2018
- R2516K SERVICE MANUAL.pdf
- Asd
- 1a Reunião Comitê RenovaBio
- Tugas farmakoterapi kls 2A.docx
- HABILIDADES SOCIALES
- pics25
- Bam Marny 2017
- المحاضره الاولى دوائر منطقيةزينب عثمان.pdf
- Oficio Jovenes de Conquista
- Bursa Taruhan Hertha BSC vs Bayern Munchen 29 September 2018
- Bach Adagio Oboe
- PROGRAMA-APRA para Lima.pdf
- Daa r13 2016 Nov
- J OMK E S E K OL AH.docx
- ABLASIO.pptx
- Bralettes.txt
- situs
- A Domain Theoretic Model of Qubit Channels
- A Partial Order on Classical and Quantum States
- 0603254
- An Extension of Gleason's Theorem for Quantum Computation
- 0603254
- Quantum Control
- A Limit Relation for Entropy and Channel Capacity Per Unit Cost
- Permutation Matrices Whose Convex Combinations Are Orthostochastic
- 2-prover
- 1 Round 070907
- Pure Est
- hw12
- Optimal State Discrimination in General Probabilistic Theories
- A partial ordering for binary channels.pdf
- qcmip
- Diagonal
- e of of Symmetric Gaussian State
- Capacity de Polarizing
- Hiroshima
- ConjChan1b-1
- Equi Valle Nce of Add i Tivity
- Calc
- ConjChan1b-1
- Chris Winter
- General Entanglement Breaking Channel
- Multi Qu Bit
- Capacity de Polarizing
- Strong Super Add
- Fukuda Equivalence

You are on page 1of 4

**Adaptive Entanglement Puriﬁcation Protocols with Two-way Classical Communication
**

Alan W. Leung∗ and Peter W. Shor†

Department of Mathematics, Massachusetts Institute of Technology, Cambridge, MA 02139, USA (Dated: February 1, 2008) We present a family of entanglement puriﬁcation protocols that generalize four previous methods, namely the recurrence method, the modiﬁed recurrence method, and the two methods proposed by Maneva-Smolin and Leung-Shor. We will show that this family of protocols have improved yields over a wide range of initial ﬁdelities F, and hence imply new lower bounds on the quantum capacity assisted by two-way classical communication of the quantum depolarizing channel. In particular, the yields of these protocols are higher than the yield of universal hashing for F less than 0.993 and as F goes to 1.

PACS numbers: 03.67.Hk

arXiv:quant-ph/0702156v3 28 Feb 2007

I.

INTRODUCTION

This work concerns the puriﬁcation of the generalized Werner state[10], 1−F 3

Quantum information theory studies the information processing power one can achieve by harnessing quantum mechanical principles. Many important results such as quantum teleportation, superdense coding, factoring and search algorithms make use of quantum entanglements as fundamental resources[2, 3, 4, 5]. Pure-state entanglements are therefore useful; however, when they are exposed to noise, they become mixed entangled states. It is thus important to study the procedures by which we can extract pure-state entanglements from mixed entangled states, and we call these procedures entanglement puriﬁcation protocols(EPP). The present work in particular studies the scenario where the two parties - whom we call Alice and Bob throughout - are allowed to communicate classically. We will follow the framework of [6, 7, 8] and generalize these results to obtain a family of protocols with improved yields.

ρF =

F |Φ+

Φ+ | +

|Φ− Φ− |

+ |Ψ+ Ψ+ | + |Ψ− Ψ− | . At the beginning of these entanglement puriﬁcation protocols, two persons, Alice and Bob, share a large number of quantum states ρF , say ρ⊗N , and they are allowed to F communicate classically, apply unitary transformations and perform projective measurements. We place no restriction on the size of their ancilla systems so that we lost no generality in restricting their local operations to unitaries and projective measurements. In the end, the quantum states Υ shared by Alice and Bob are to be a close approximation of the maximally entangled states (|Φ+ Φ+ |)⊗M , or more precisely we require the ﬁdelity between Υ and (|Φ+ Φ+ |)⊗M approaches zero as N goes to inﬁnity. We deﬁne the yield of such protocols to be M/N . We will often use the BXOR operation by which we mean the bilateral application of the two-bit quantum XOR (or controlled-NOT). We only consider the scenario in which Alice and Bob share two (or more) bipartite quantum states that are Bell diagonal and they apply BXOR to two pairs of quantum states such that one pair is the “source” and one pair is the “target”. Using the two classical bit notations, we write BXOR(i, j) : {0, 1}N (ai , bi ) (aj , bj ) (ak , bk ) {0, 1}N (ai ⊕ aj , bi ) (aj , bi ⊕ bj ) (ak , bk ) if k = i, j

II. ADAPTIVE ENTANGLEMENT PURIFICATION PROTOCOLS (AEPP) A. Notations

We denote von Neumann entropy by S(ρ), Shannon entropy by H(p0 , p1 , . . .) and label the four Bell states with two classical bits (a, b) as follows: 00 : |Φ+ = 01 : |Ψ+ = 10 : |Φ− = 11 : |Ψ

− 1 √ (|↑↑ 2 1 √ (|↑↓ 2 1 √ (|↑↑ 2 1 √ (|↑↓ 2

+ |↓↓ ) + |↓↑ ) − |↓↓ ) − |↓↑ ). → → → →

=

∗ Electronic

address: leung@math.mit.edu † Electronic address: shor@math.mit.edu

when Alice and Bob share N pairs of bipartite quantum states and they apply BXOR to the ith pair as source and the jth pair as target.

. b4 ). sixth and seventh pairs because b1 ⊕ b2 ⊕ b3 ⊕ b4 = 1 and b1 ⊕ . . ⊕ b8 = 1 together imply b5 ⊕ b6 ⊕ b7 ⊕ b8 = 0. then Alice and Bob want to catch this amplitude error and they do that by applying BXOR(2. . a4 . Note that the second.2 B. 1) and taking projective measurements on the ﬁrst pair along the z-axis. AEPP(a. a2 . a2 . Alice and Bob perform universal hashing on the third pair and throw away the second pair.4) FIG. b4 . b3 ) are no longer entangled.2) 3. Note that the amplitude error could have been on the fourth pair but this protocol works well even if that is the case. then an amplitude error is not likely and they perform universal hashing on the ﬁrst seven pairs together. AEPP(a. . . On the other hand. a7 ⊕ a8 . We give a graphical representation of this protocol in ﬁg. apply BXOR(1. b3 .1) (a1 ⊕ a4 . 1) → (a1 ⊕ a8 . . If the measurement results agree(b1 ⊕ b2 ⊕ b3 ⊕ b4 = 0). ⊕ b8 ) and take projective measurements on the eighth pair along the z-axis.4) (a1 . . a8 . BXOR(7. . a8 . . a2 . BXOR(3. b7 . BXOR(3. If the results disagree(b1 ⊕ b2 = 1). 3 universal hashing 4 a 3 1 universal hashing a 1 throw away 2 a 1 throw away FIG. a3 ⊕ a4 . b7 . . BXOR(4. b4 ) → (a1 ⊕ a4 . b1 ⊕ b2 ⊕ b3 ⊕ b4 ) and take projective measurements on the fourth pair along the z-axis.8). b7 .8). 2: AEPP(a. a1 ⊕ a2 . On the other hand. AEPP(a. b1 ⊕ b2 . then the amplitude error is more likely to be on the ﬁrst two pairs. if the measurement results disagree(b1 ⊕ . a8 . b2 . b1 . . b2 . . then it is likely that there has been no amplitude error and Alice and Bob will perform universal hashing on the ﬁrst three pairs together. b3 . . b2 ) → (a1 ⊕ a2 . a1 ⊕ a4 .1). b2 . b3 . a1 ⊕ a3 . sixth and seventh pairs. If the results agree(b1 ⊕ . b1 . a6 ⊕ a8 . a3 . . F BXOR(2. apply BXOR(1. b2 ) and the third pair(a3 ⊕ a4 . a7 ⊕ a8 . a4 . They do so by applying BXOR(2. If the results agree(b1 ⊕ b2 = 0). . Note that the second pair(a1 ⊕ a2 . a2 ⊕ a4 . Therefore Alice and Bob perform universal hashing on the second pair and throw away the third pair. . b8 ) → (a1 ⊕ a8 . a1 ⊕ a2 . 1) (1) and taking projective measurements on the ﬁrst pair along the z-axis. they can compare their measurement results.4). if the results disagree(b1 ⊕ b2 ⊕ b3 ⊕ b4 = 1).4). After Alice and Bob compare their results with classical communication channel and if the results disagree (b1 ⊕ b2 ⊕ b3 ⊕ b4 = 1). ⊕ b8 = 0). a1 ⊕ a3 . ⊕ b8 = 1). b2 . 1) → (a1 ⊕ a4 . b1 . .8) (a1 . b1 . b3 . a2 . 1. they can compare their measurement results. BXOR(3. a2 ⊕ a8 . b3 .1. We represent this protocol graphically in ﬁg. then it is likely that there has been no amplitude error and Alice and Bob will perform universal hashing on the ﬁrst pair. a5 ⊕ a8 . Using two-way classical communication channel. third and fourth pairs are not entangled with the ﬁfth. a7 ⊕ a8 . Using classical communication channel. a3 ⊕ a4 . The ﬁrst four pairs are now represented by (a1 ⊕ a8 .2): Alice and Bob put the bipartite quantum states ρ⊗N into groups of two. b1 . a7 . . . b7 . b1 . b6 . . a4 . . 1: AEPP(a.2. Description of AEPP 1. b2 .4): Alice and Bob put the bipartite quantum states ρ⊗N into groups of four. b1 ⊕ b2 ) and take projective measurements on the second pair along the z-axis. b2 . they throw away the ﬁrst pair because it is likely that an amplitude error has occurred. 1 universal hashing then the amplitude error detected by the ﬁrst measurements is more likely to be on either the third or the fourth pair than on the ﬁrst two. If the measurement results agree(b1 ⊕ b2 = 0). 2. a3 ⊕ a4 . b2 . and also that with this procedure we always end up with one pair on which Alice and Bob can perform universal hashing when the ﬁrst measurement results disagree. a1 ⊕ a2 . a2 ⊕ a8 . . apply BXOR(1. they perform universal hashing on the ﬁfth. if the results disagree(b1 ⊕ b2 = 1).1). Alice and Bob then use classical communication channel to compare their results. b5 .2) F (a1 .1) (a1 ⊕ a8 . b1 ⊕ . a1 ⊕ a4 .8). it is likely that there is one amplitude error and Alice and Bob want to locate this amplitude error.8): Alice and Bob put the bipartite quantum states ρ⊗N into groups of eight. a8 . F BXOR(2. . a2 ⊕ a4 . b2 . a4 . b1 . . Using two-way classical communication channel. . b1 ⊕ b2 ⊕ b3 ⊕ b4 . In this case. Alice and Bob compare their measurement results. b3 . b1 . b2 .

N=2n ) and AEPP(p. This is illustrated in ﬁg. 5. and we present the yields of AEPP(a.2) until it is more beneﬁcial to switch to hashing. . If we instead try to detect phase error by switching the source pairs and target pairs in all the BXOR operations and measuring along the x-axis rather than the zaxis.N=2n).N=2n ): Clearly.4). The modiﬁed recurrence method: The modiﬁed recurrence method[6] is the repeat.II B. The Maneva-Smolin method: The Maneva-Smolin method[7] is to apply the ﬁrst step of AEPP(a.we discussed so far focus on amplitude error. 2k − 1. After Alice and Bob apply AEPP(a. this method fails to utilize all entanglements by throwing away the 3 pairs if the ﬁrst measurement results disagree. Therefore Alice and Bob can apply the same procedure as equation (1) and end up with one pair that they will perform universal hashing on. 5: Comparison of AEPP and previous methods: The lightly colored line is the yield of the four methods discussed in sec. 7 universal hashing 8 a 7 3 universal hashing a 3 1 universal hashing a 1 throw away FIG.2).N=2n) .N=2n ) C. which is denoted by AEPP*(a. 4: AEPP(p. 1. the above procedures generalize to AEPP(a.5.4)(see sec.2) and so forth until it becomes more beneﬁcial to switch to universal hashing.7. they repeatedly and alternately apply AEPP(p. The Recurrence Method: The recurrence method[6] is the repeat applications of AEPP(a. 2n − 1 2n p universal hashing and Bob have identical measurement results. the dashed line represents the optimized AEPP(a. rather than applying universal hashing right away. we might end up with either 2n −1 pairs or n-1 groups of pairs (2n−1 −1. however.N=2n) graphically in ﬁg. rather than applying universal hashing right away.3 and it can be easily seen that we are in the same situation as the left hand side of equation (1): Alice and Bob know that b1 ⊕b2 ⊕b3 ⊕b4 = 1 and the pair on which they measured to ﬁnd out this information has its phase error added to the other three pairs. 2. 4. 6. the solid line represents the yields of AEPP(a. N-1 2n−1 − 1 2n − 1 p universal hashing 2n−2 − 1 2n−1 − 1 universal hashing universal hashing p 1 universal hashing N a N-1 throw away p 1 throw away FIG.4).3. When Alice After we apply AEPP(a.8) 4.all belong to the family AEPP(a/p. 2n−2 − 1.N=2n ) can be deﬁned analogously.N=2n) and can be proved inductively. AEPP(a. We represent the protocols AEPP(p.2).N). .4. AEPP(a. 3 and 1) pairs depending on the results of .AEPP(a. D. 6: The Maneva-Smolin method[7] FIG.2). Perform universal hashing on the N-1 pairs if the measurement results agree but throw away all the N-1 pairs if they do not. Now if the results actually agree (b1 ⊕ b2 ⊕ b3 ⊕ b4 = 0). The procedures . Generalization of previous methods 4.N = 2n ).4) and AEPP(p. they repeatedly apply AEPP(a. We represent this protocol graphically in ﬁg. . 4. AEPP(p. . 3: AEPP(a. . . 6 in ﬁg.N = 2n ) where n = 2. 5. Optimization In this section. This is illustrated in ﬁg. 3. alternate applications of AEPP(a.2) and obtain identical measurement results. the same procedure still applies but we need to switch the roles played by the ﬁrst four pairs and by the last four pair. the modiﬁed recurrence method and the two methods proposed by Maneva-Smolin and Leung-Shor . 3. we show that four previous protocols the recurrence method.2) and AEPP(p. The Leung-Shor method: The Leung-Shor method[8] is a combination of the ﬁrst step AEPP(a.II C and [9] for details) FIG.6.N = 2n ) for n = 2. 3.

Comput. Brassard. a2 ⊕aK . 3824-3851 (1996).W. Quantum states with Einstein-PodolskyRosen correlations admitting a hidden-variable model. the yields of AEPP(a. We can either perform universal hashing(as in the Maneva-Smolin method) or apply AEPP(p. J. . Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer.N) on the Werner state ρF .W. It is possible to treat these n-1 groups diﬀerently because they are not entangled to each other. 70. . Entanglement Puriﬁcation with Two-way Classical Communication. 722-725 (1996) [12] K. 2 As we can see from ﬁg.74 [9]. Phys. Shor. aK−1 ⊕aK . Lett. SIAM J. Moor. 1484-1509 (1997) [5] L. G) = Yield of universal hashing on ρF where p∗ = lim p = n→∞ 4 1 (1 + e− 3 ). quant-ph/0404111 [13] E. Phys. [1] M. Werner. Leung and P. 76. bN = 0) and SK−1 = H(a1 ⊕ aK .N = 2n ) exceed the yield of universal hashing for F < 0.L. 1895-1899 (1993) [3] C. .. 7: The Leung-Shor method[8] n→∞ lim YAEP P ≥ 1 − H(F. we showed the following theorem: Theorem 1 Let N = 2n where n is a positive integer. Rev. Brassard. G) + H(p∗ ) − p∗ N the ﬁrst measurements. Phys. pp. Bennett and S. Bennett.H. G. We perform optimization for AEPP(a.4 2 universal hashing 3 4 a 3 throw away p 2 throw away where p = prob(b1 ⊕ b2 ⊕ . quant-ph/0003099 [8] A.. In [9]. G.. 5. b1 . Then YAEP P = 1 − III. pp. Rev. pp.K. Mixed State Entanglement and Quantum Error Correction. Phys. Cr´peau. submitted [9] A. 8. Schumacher. pp.⊕bK = 0) n for K = 2. Wootters. Rev. it came to our at1−p (n + 1 + S N −1 + S N −1 + . Interpolation of recurrence and hashing entanglement distillation protocols. Wiesner.D. Furthermore.W. Proceedings of the 28th Annual ACM Symposium on Theory of Computing.F. we will end up with two groups of quantum states of diﬀerent sizes because we started with N = 2k − 1 rather than N = 2k . + S3 + S1 ) tention similar works have been carried out in [12.N. Maneva and J. Then 3 FIG. 54. Lett. .A. Smolin and W. in preparation [10] R. quant-ph/9604024 [7] E.2k −1). J. Grover. B. D. let F = 2 2−1 and n G = 1−F . Puriﬁcation of Noisy Entanglement and Faithful Teleportation via Noisy Channels. G. pp. DiVincenzo.H.A. Wooters.K. Teleporting an unknown quantum state via dual classical and EPR channels. Shor. Asymptotic adaptive bipartite entanglement distillation protocol. 2n . Hostens. Adaptive Entanglement Puriﬁcation Protocols with Two-way Classical Communication. Rev. 4277-4281 (1989) [11] C. Jozsa.A. A fast quantum mechanical algorithm for database search. 26. quant-ph/0602205 . b2 . Rev.P. Lett. E.A. 13]. Denote by YAEP P the yields of AEPP(a. Shor. Chuang.993 (shown numerically) and as F goes to 1 (shown analytically in [9]). G. e Peres and W. S. . Phys. Moreover.H. Higher yield than universal hashing > 1 − H(F. 4.N) with improved yields over previous two-way entanglement puriﬁcation protocols. A.4) and achieve improved yields for F > 0. pp. 212-219 (1996) [6] C. Quantum computation and quantum information. Communication via oneand two-particale operators on Einstein-Podolsky-Rsen states. Leung and P. − 2 4 N We presented a family of entanglement puriﬁcation protocols AEPP(a. 40.H. bK−1 |b1 ⊕. CONCLUSION p (1 + SN −1 ) N After the completion of this work. If we do apply AEPP(p.G. 69. . C. Cambridge University Press (2000) [2] C. G. A. Smolin.2k − 1)(as in the Leung-Shor method).W. the yields of these protocols are higher than the yield of universal hashing for F < 0. Popescu. . 2881-2884 (1992) [4] P. Wootters. pp. . J. Volbrecht and Frank Verstraete. . Nielsen and I. . A. Dehaene and B. Bennett. Improved two-party and multi-party puriﬁcation protocols. Smolin and W. .J. . . .. G.W.H.993. R. Bennett.

- Entanglement Under SymmetryUploaded bygejikeiji
- transformation fluencyUploaded byapi-167924086
- Solutions_for_SA_Two_Paper_1Uploaded byMatthew Shia
- Talk 1793Uploaded byWilliam Algoner
- God and Quantum Mechanics (EPUB): Is the Material World Truly Real? Is the Entire Universe Just a “Simulation” in a Supercomputer?Uploaded byBogdan-John Vasiliu
- Quantum TeleportationUploaded byWaseem Khan
- AE51-AC51-AT51Uploaded byMahadev
- f02q2sol (1).pdfUploaded bySam Mi
- M. J. Davis et al- Quantum noise and entanglement in Bose-Einstein condensatesUploaded byQMDhidnw
- Eugene Butkov PDFUploaded byBrian
- Quantum computing notesUploaded byjelena_luzija9197
- OSE522.HW01.2011Uploaded bysam
- 1409Uploaded byKaushik Nandi
- HW3-p151-Q33Uploaded byKawin Manachitta
- articol dinamicaUploaded byJason Hewitt
- w20160801191655653_7000002383_10-05-2016_133158_pm_w20160801191655857_7000841954_09-11-2016_075749_am_Maximos_minimosUploaded byVj E
- Chapter 5 FrenchUploaded byNemish Kanwar
- Modeling 2Uploaded byThien Le
- 0009191Uploaded bymlmilleratmit
- HW6Uploaded bymiguelitolin
- HW5Uploaded bySantosh Kumar
- About CMS _ Critical ManagementUploaded byMonica Grau Sarabia
- Quantum Teleportation Science Fiction NOPE!Uploaded byquantumrealm
- 124994 Midterm Exam Fall 2009Uploaded byEn-Min Shih
- 2315ijcsitce02Uploaded byijcsitcejournal
- IntegrationUploaded byhyd arnes
- chapter12.2Uploaded byYus Nordin
- Lecture 6Uploaded byRyan Gilbert
- 02 Force SystemsUploaded byAndy Bayu Suseno

- A Domain Theoretic Model of Qubit ChannelsUploaded bygejikeiji
- A Partial Order on Classical and Quantum StatesUploaded bygejikeiji
- 0603254Uploaded bygejikeiji
- An Extension of Gleason's Theorem for Quantum ComputationUploaded bygejikeiji
- 0603254Uploaded bygejikeiji
- Quantum ControlUploaded bygejikeiji
- A Limit Relation for Entropy and Channel Capacity Per Unit CostUploaded bygejikeiji
- Permutation Matrices Whose Convex Combinations Are OrthostochasticUploaded bygejikeiji
- 2-proverUploaded bygejikeiji
- 1 Round 070907Uploaded bygejikeiji
- Pure EstUploaded bygejikeiji
- hw12Uploaded bygejikeiji
- Optimal State Discrimination in General Probabilistic TheoriesUploaded bygejikeiji
- A partial ordering for binary channels.pdfUploaded bygejikeiji
- qcmipUploaded bygejikeiji
- DiagonalUploaded bygejikeiji
- e of of Symmetric Gaussian StateUploaded bygejikeiji
- Capacity de PolarizingUploaded bygejikeiji
- HiroshimaUploaded bygejikeiji
- ConjChan1b-1Uploaded bygejikeiji
- Equi Valle Nce of Add i TivityUploaded bygejikeiji
- CalcUploaded bygejikeiji
- ConjChan1b-1Uploaded bygejikeiji
- Chris WinterUploaded bygejikeiji
- General Entanglement Breaking ChannelUploaded bygejikeiji
- Multi Qu BitUploaded bygejikeiji
- Capacity de PolarizingUploaded bygejikeiji
- Strong Super AddUploaded bygejikeiji
- Fukuda EquivalenceUploaded bygejikeiji