-
Information Content of Systems as a Physical Principle
Authors:
L. Czekaj,
M. Horodecki,
P. Horodecki,
R. Horodecki
Abstract:
To explain conceptual gap between classical/quantum and other, hypothetical descriptions of world, several principles has been proposed. So far, all these principles have not explicitly included the uncertainty relation. Here we introduce an information content principle (ICP) which represents the new - constrained uncertainty principle. The principle, by taking into account the encoding/decoding…
▽ More
To explain conceptual gap between classical/quantum and other, hypothetical descriptions of world, several principles has been proposed. So far, all these principles have not explicitly included the uncertainty relation. Here we introduce an information content principle (ICP) which represents the new - constrained uncertainty principle. The principle, by taking into account the encoding/decoding properties of single physical system, is capable of separation both classicality and quanta from a number of potential physical theories including hidden variable theories. The ICP, which is satisfied by both classical and quantum theory, states that the amount of non-redundant information which may be extracted from a given system is bounded by a perfectly decodable information content of the system. We show that ICP allows to discriminate theories which do not allow for correlations stronger than Tsirelson's bound. We show also how to apply the principle to composite systems, ruling out some theories despite their elementary constituents behave quantumly.
△ Less
Submitted 30 January, 2017; v1 submitted 18 March, 2014;
originally announced March 2014.
-
The second laws of quantum thermodynamics
Authors:
Fernando G. S. L. Brandao,
Michał Horodecki,
Nelly Huei Ying Ng,
Jonathan Oppenheim,
Stephanie Wehner
Abstract:
The second law of thermodynamics tells us which state transformations are so statistically unlikely that they are effectively forbidden. Its original formulation, due to Clausius, states that "Heat can never pass from a colder to a warmer body without some other change, connected therewith, occurring at the same time". The second law applies to systems composed of many particles interacting; howev…
▽ More
The second law of thermodynamics tells us which state transformations are so statistically unlikely that they are effectively forbidden. Its original formulation, due to Clausius, states that "Heat can never pass from a colder to a warmer body without some other change, connected therewith, occurring at the same time". The second law applies to systems composed of many particles interacting; however, we are seeing that one can make sense of thermodynamics in the regime where we only have a small number of particles interacting with a heat bath. Is there a second law of thermodynamics in this regime? Here, we find that for processes which are cyclic or very close to cyclic, the second law for microscopic systems takes on a very different form than it does at the macroscopic scale, imposing not just one constraint on what state transformations are possible, but an entire family of constraints. In particular, we find a family of free energies which generalise the traditional one, and show that they can never increase. We further find that there are three regimes which determine which family of second laws govern state transitions, depending on how cyclic the process is. In one regime one can cause an apparent violation of the usual second law, through a process of embezzling work from a large system which remains arbitrarily close to its original state. These second laws are not only relevant for small systems, but also apply to individual macroscopic systems interacting via long-range interactions, which only satisfy the ordinary second law on average. By making precise the definition of thermal operations, the laws of thermodynamics take on a simple form with the first law defining the class of thermal operations, the zeroeth law emerging as a unique condition ensuring the theory is nontrivial, and the remaining laws being a monotonicity property of our generalised free energies.
△ Less
Submitted 25 September, 2014; v1 submitted 22 May, 2013;
originally announced May 2013.
-
A decoupling approach to the quantum capacity
Authors:
Patrick Hayden,
Michal Horodecki,
Andreas Winter,
Jon Yard
Abstract:
We give a short proof that the coherent information is an achievable rate for the transmission of quantum information through a noisy quantum channel. Our method is to produce random codes by performing a unitarily covariant projective measurement on a typical subspace of a tensor power state. We show that, provided the rank of each measurement operator is sufficiently small, the transmitted data…
▽ More
We give a short proof that the coherent information is an achievable rate for the transmission of quantum information through a noisy quantum channel. Our method is to produce random codes by performing a unitarily covariant projective measurement on a typical subspace of a tensor power state. We show that, provided the rank of each measurement operator is sufficiently small, the transmitted data will with high probability be decoupled from the channel's environment. We also show that our construction leads to random codes whose average input is close to a product state and outline a modification yielding unitarily invariant ensembles of maximally entangled codes.
△ Less
Submitted 16 November, 2016; v1 submitted 1 February, 2007;
originally announced February 2007.
-
How to reuse a one-time pad and other notes on authentication, encryption and protection of quantum information
Authors:
Jonathan Oppenheim,
Michal Horodecki
Abstract:
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases. The situation is dramatically different from the classical case: we prove that one can recycle the one-time pad without compromising security. The protocol for recycling relies on detecting whether e…
▽ More
Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases. The situation is dramatically different from the classical case: we prove that one can recycle the one-time pad without compromising security. The protocol for recycling relies on detecting whether eavesdropping has occurred, and further relies on the fact that information contained in the encrypted quantum state cannot be fully accessed. We prove the security of recycling rates when authentication of quantum states is accepted, and when it is rejected. We note that recycling schemes respect a general law of cryptography which we prove relating the size of private keys, sent qubits, and encrypted messages. We discuss applications for encryption of quantum information in light of the resources needed for teleportation. Potential uses include the protection of resources such as entanglement and the memory of quantum computers. We also introduce another application: encrypted secret sharing and find that one can even reuse the private key that is used to encrypt a classical message. In a number of cases, one finds that the amount of private key needed for authentication or protection is smaller than in the general case.
△ Less
Submitted 16 May, 2005; v1 submitted 23 June, 2003;
originally announced June 2003.