Stability theorem of depolarizing channels for the minimal output quantum Rényi entropies

We show that the stability theorem of the depolarizing channel holds for the output quantum $p$-R\'enyi entropy for $p \ge 2$ or $p=1$, which is an extension of the well known case $p=2$. As an application, we present a protocol in which Bob determines whether Alice prepares a pure quantum state close to a product state. In the protocol, Alice transmits to Bob multiple copies of a pure state through a depolarizing channel, and Bob estimates its output quantum $p$-R\'enyi entropy. By using our stability theorem, we show that Bob can determine whether her preparation is appropriate.

Comments: 9 pages, no figure

Similar Publications

Quantum walks, in virtue of the coherent superposition and quantum interference, possess the exponential superiority over its classical counterpart in applications of quantum searching and quantum simulation. A straitforward physical implementation involving merely photonic source, linear evolution network and detection make it very appealing, in light of the stringent requirements of universal quantum computing. The quantum enhanced power is highly related to the state space of quantum walks, which can be expanded by enlarging the dimension of evolution network and/or photon number. Read More


Proposed near-future upgrades of the current advanced interferometric gravitational wave detectors include the usage of frequency dependent squeezed light to reduce the current sensitivity-limiting quantum noise. We quantify and describe the downgrading effects that spatial mode mismatches have on the squeezed field. We also show that squeezing the second-order Hermite-Gaussian modes $\mathrm{HG}_{02}$ and $\mathrm{HG}_{20}$, in addition to the fundamental mode, has the potential to increase the robustness to spatial mode mismatches. Read More


A communication game consists of distributed parties attempting to jointly complete a task with restricted communication. Such games are useful tools for studying limitations of physical theories. A theory exhibits preparation contextuality whenever its predictions cannot be explained by a preparation noncontextual model. Read More


A semiclassical model supporting the destructive interference interpretation of zero-width resonances (ZWR) is extended to wavelengths inducing c_minus-type curve crossing situations in Na2 strong field dissociation. This opens the possibility to get critical couples of wavelengths lambda and field intensities I to reach ZWRs associated with the ground vibrationless level v = 0, that, contrary to other vibrational states (v > 0), is not attainable for the commonly referred c+-type crossings. The morphology of such ZWRs in the laser (I; lambda) parameter plane and their usefulness in filtration strategies aiming at molecular cooling down to the ground v = 0 state are examined within the frame of an adiabatic transport scheme. Read More


Schr\"odinger equation with potential $-g/r^2$ exhibits a limit cycle, described in the literature in a broad range of contexts using various regularizations of the singularity at $r=0$. Instead, we use the renormalization group transformation based on Gaussian elimination from the Hamiltonian eigenvalue problem of high momentum modes above a finite, floating cutoff scale. The procedure identifies a richer structure than the one we found in the literature. Read More


The Generalized Uncertainty Principle (GUP) is a modification of Heisenberg's Principle predicted by several theories of Quantum Gravity. It consists of a modified commutator between position and momentum. In this work we compute potentially observable effects that GUP implies for the harmonic oscillator, coherent and squeezed states in Quantum Mechanics. Read More


At Crypto 2011, some of us had proposed a family of cryptographic protocols for key establishment capable of protecting quantum and classical legitimate parties unconditionally against a quantum eavesdropper in the query complexity model. Unfortunately, our security proofs were unsatisfactory from a cryptographically meaningful perspective because they were sound only in a worst-case scenario. Here, we extend our results and prove that for any e > 0, there is a classical protocol that allows the legitimate parties to establish a common key after O(N) expected queries to a random oracle, yet any quantum eavesdropper will have a vanishing probability of learning their key after O(N^{1. Read More


We study entanglement generated between a qubit and a super-ohmic bosonic bath due to their joint evolution which leads to pure dephasing of the qubit. We tune the parameters of the interaction, so that the decoherence is quantitatively independent of the number of bosonic modes taken into account (and corresponds to realistic decoherence seen in small excitonic quantum dots coupled to an environment of phonons) and investigate, how the entanglement generated depends on the size of the environment. A second parameter of interest is the mixedness of the initial state of the environment which is controlled by temperature. Read More


In 2001, Zurek derived the generic minimum scale $a_{Z}$ for the area of structures of Wigner's quantum phase distribution. Here we show by construction, using superoscillatory functions, that the Wigner distribution can locally show regular spotty structures on scales much below Zurek's scale $a_{Z}$. The price to pay for the presence of such structures is their exponential smallness. Read More


We use the noisy entanglement-assisted classical capacity formula [arXiv:1609.0859] to create a coherent-attack security framework for Gaussian two-way quantum key distribution protocols in the asymptotic region. Read More