Port-based teleportation and asymptotic representation theory - - PowerPoint PPT Presentation

port based teleportation and asymptotic representation
SMART_READER_LITE
LIVE PREVIEW

Port-based teleportation and asymptotic representation theory - - PowerPoint PPT Presentation

Port-based teleportation and asymptotic representation theory Christian Majenz Based on joint work with Matthias Christandl, Felix Leditzky, Graeme Smith, Florian Speelman and Michael Walter 20.01.2020 Korteweg-de Vries Institute for


slide-1
SLIDE 1

Port-based teleportation and asymptotic representation theory

Christian Majenz

Based on joint work with Matthias Christandl, Felix Leditzky, Graeme Smith, Florian Speelman and Michael Walter

20.01.2020 Korteweg-de Vries Institute for Mathematics

slide-2
SLIDE 2

Outline

Introduction I

  • Port-based teleportation

Introduction II

  • The Schur-Weyl distribution
  • Asymptotics: spectrum estimation, fluctuations

Results

  • Convergence result
  • Asymptotics of port-based teleportation

Summary, open problems

slide-3
SLIDE 3

Introduction I

slide-4
SLIDE 4

A communication task

Alice Bob

A

A' B'

slide-5
SLIDE 5

A communication task

Alice Bob

A

A' B'

slide-6
SLIDE 6

Quantum teleportation

Alice Bob

A

A' B'

slide-7
SLIDE 7

Quantum teleportation

Alice Bob

A

A' B'

slide-8
SLIDE 8

Quantum teleportation

Alice Bob

A

A' B'

m

slide-9
SLIDE 9

Quantum teleportation

Alice Bob

A

A' B'

m

slide-10
SLIDE 10

Quantum teleportation

Alice Bob

A

A' B'

m

slide-11
SLIDE 11

Port-based teleportation (PBT)

Alice Bob

A

A1 B1 Ai Bi AN BN

... ... ... ... Ishizaka & Hiroshima ‘08

slide-12
SLIDE 12

Port-based teleportation (PBT)

Alice Bob

A

A1 B1 Ai Bi AN BN

... ... ... ... : number of “ports” : dimension of Alice’ input

N d

Ishizaka & Hiroshima ‘08

slide-13
SLIDE 13

Alice Bob

A

A1 B1 Ai Bi AN BN

... ... ... ...

Port-based teleportation (PBT)

: number of “ports” : dimension of Alice’ input

N d

Ishizaka & Hiroshima ‘08

slide-14
SLIDE 14

Alice Bob

A

A1 B1

port number i

Ai Bi AN BN

... ... ... ...

Port-based teleportation (PBT)

: number of “ports” : dimension of Alice’ input

N d

Ishizaka & Hiroshima ‘08

slide-15
SLIDE 15

Alice Bob

A

A1 B1

port number i

Ai Bi AN BN

... ... ... ...

Port-based teleportation (PBT)

: number of “ports” : dimension of Alice’ input

N d

Ishizaka & Hiroshima ‘08

slide-16
SLIDE 16

Why port-based teleportation?

slide-17
SLIDE 17

Why port-based teleportation?

Alice Bob

A

A1 B1

port number i

Ai Bi AN BN

... ... ... ... Can break time order of quantum operations!

slide-18
SLIDE 18

Why port-based teleportation?

Can break time order of quantum operations! Applications:

slide-19
SLIDE 19

Why port-based teleportation?

Can break time order of quantum operations! Applications:

  • Universal programmable quantum processors
slide-20
SLIDE 20

Why port-based teleportation?

Can break time order of quantum operations! Applications:

  • Universal programmable quantum processors
  • Instantaneous non-local quantum computation (Beigi & König ’11)
slide-21
SLIDE 21

Why port-based teleportation?

Can break time order of quantum operations! Applications:

  • Universal programmable quantum processors
  • Instantaneous non-local quantum computation (Beigi & König ’11)
  • Generic attack on any position-based cryptographic scheme

(Buhrman et al. ’14)

slide-22
SLIDE 22

Why port-based teleportation?

How expensive is PBT? Can break time order of quantum operations! Applications:

  • Universal programmable quantum processors
  • Instantaneous non-local quantum computation (Beigi & König ’11)
  • Generic attack on any position-based cryptographic scheme

(Buhrman et al. ’14)

slide-23
SLIDE 23

PBT variants

slide-24
SLIDE 24

PBT variants

Port-based teleportation is necessarily imperfect.

slide-25
SLIDE 25

PBT variants

Port-based teleportation is necessarily imperfect. Two variants:

  • plain, figure of merit: fidelity F
  • heralded, figure of merit: success probability p
slide-26
SLIDE 26

PBT variants

Port-based teleportation is necessarily imperfect. Two variants:

  • plain, figure of merit: fidelity F
  • heralded, figure of merit: success probability p

Two types of protocols:

  • Maximally entangled resource state (

)

FEPR, pEPR

  • Optimized resource state (

)

F*, p*

Trade-off between number of ports and /

N F p

slide-27
SLIDE 27

Symmetries

Alice Bob

A

A1 B1

port number i

Ai Bi AN BN

... ... ... ...

slide-28
SLIDE 28

Previous results

slide-29
SLIDE 29

Previous results

Closed-form:

  • (Ishizaka & Hiroshima ’08)

FEPR ≥ 1 − d2 − 1 N

  • (Ishizaka ’15)

F* ≤ 1 − 1 4(d − 1)N2 + O(N−3)

  • (Studzinski et al. ‘16)

p* = 1 − d2 − 1 d2 − 1 + N

slide-30
SLIDE 30

Previous results

slide-31
SLIDE 31

Previous results

Exact formulas (Studzinski et al. ’16, Mozrzymas et al. 17’):

FEPR

d

(N) = d−N−2 ∑

α⊢dN−1

μ=α+□

dμmμ

2

with

pEPR

d

(N) = 1 dN ∑

α⊢dN−1

m2

α

dμ* mμ* μ* = maxargμ=α+□ mμdα mαdμ F*

d (N) = d−2 sup q

μ, μ′ ⊢d N μ′ = μ + □ − □

q(μ)q(μ′ )

slide-32
SLIDE 32

Previous results

Exact formulas (Studzinski et al. ’16, Mozrzymas et al. 17’):

FEPR

d

(N) = d−N−2 ∑

α⊢dN−1

μ=α+□

dμmμ

2

with

pEPR

d

(N) = 1 dN ∑

α⊢dN−1

m2

α

dμ* mμ* μ* = maxargμ=α+□ mμdα mαdμ F*

d (N) = d−2 sup q

μ, μ′ ⊢d N μ′ = μ + □ − □

q(μ)q(μ′ )

Evaluating these formulas scales exponential in ! Asymptotics for arbitrary and ?

d d N → ∞

slide-33
SLIDE 33

Introduction II

slide-34
SLIDE 34

Representation theory

Group representation of a group : group homomorphism from to

G G GL(n, ℂ)

slide-35
SLIDE 35

Representation theory

Group representation of a group : group homomorphism from to

G G GL(n, ℂ)

Irreducible representations (irreps): no non-trivial invariant subspace

slide-36
SLIDE 36

Representation theory

Group representation of a group : group homomorphism from to

G G GL(n, ℂ)

Irreducible representations (irreps): no non-trivial invariant subspace All representations of finite and compact groups are direct sums

  • f irreps.
slide-37
SLIDE 37

Irreducible representations of SN, U(d), Young diagrams

Group Sn U(d) Irreducible representations [α] Vd,α Dimension dα md,α Partition range α ` n α `d k, k 2 N Examples: α = (5, 3, 2, 1) ` 11 α = (5, 3, 3, 3, 1) ` 15 α = (2, 1) ` 3

Irreps of ,

Sn U(d)

slide-38
SLIDE 38

Irreducible representations of SN, U(d), Young diagrams

Group Sn U(d) Irreducible representations [α] Vd,α Dimension dα md,α Partition range α ` n α `d k, k 2 N Examples: α = (5, 3, 2, 1) ` 11 α = (5, 3, 3, 3, 1) ` 15 α = (2, 1) ` 3

Irreps of ,

Sn U(d)

For , formally

α ⊢d n α ∈ ℕd ⊂ ℝd

slide-39
SLIDE 39

Irreducible representations of SN, U(d), Young diagrams

Group Sn U(d) Irreducible representations [α] Vd,α Dimension dα md,α Partition range α ` n α `d k, k 2 N Examples: α = (5, 3, 2, 1) ` 11 α = (5, 3, 3, 3, 1) ` 15 α = (2, 1) ` 3

Irreps of ,

Sn U(d)

For , formally

α ⊢d n α ∈ ℕd ⊂ ℝd

Example: representing the partition 13=6+4+3

α ⊢4 13 α = (6,4,3,0) ∈ ℕ4

slide-40
SLIDE 40

The Schur-Weyl distribution

, have natural representations on :

Sn U(d) (ℂd)

⊗n

slide-41
SLIDE 41

The Schur-Weyl distribution

, have natural representations on :

Sn U(d) (ℂd)

⊗n

  • acts by

U ∈ U(d) U⊗n

slide-42
SLIDE 42

The Schur-Weyl distribution

, have natural representations on :

Sn U(d) (ℂd)

⊗n

  • acts by

U ∈ U(d) U⊗n

  • permutes the tensor factors

Sn

slide-43
SLIDE 43

The Schur-Weyl distribution

, have natural representations on :

Sn U(d) (ℂd)

⊗n

  • acts by

U ∈ U(d) U⊗n

  • permutes the tensor factors

Sn

The two actions commute is representation of

⟹ (ℂd)

⊗n

Sn × U(d)

slide-44
SLIDE 44

The Schur-Weyl distribution

, have natural representations on :

Sn U(d) (ℂd)

⊗n

  • acts by

U ∈ U(d) U⊗n

  • permutes the tensor factors

Sn

The two actions commute is representation of

⟹ (ℂd)

⊗n

Sn × U(d)

Schur-Weyl duality theorem:

(ℂd)

⊗n ≅ ⨁ α⊢dn

[α] ⊗ Vd,α

slide-45
SLIDE 45

The Schur-Weyl distribution

, have natural representations on :

Sn U(d) (ℂd)

⊗n

  • acts by

U ∈ U(d) U⊗n

  • permutes the tensor factors

Sn

The two actions commute is representation of

⟹ (ℂd)

⊗n

Sn × U(d)

Schur-Weyl duality theorem:

(ℂd)

⊗n ≅ ⨁ α⊢dn

[α] ⊗ Vd,α

Schur-Weyl distribution: pd,n(α) =

dαmd,α dn

slide-46
SLIDE 46

Asymptotics

Schur-Weyl distribution: pd,n(α) =

dαmd,α dn

Change of variables:

̂ α = α n ̂ pd,n( ̂ α) := pd,n(α)

slide-47
SLIDE 47

Asymptotics

Schur-Weyl distribution: pd,n(α) =

dαmd,α dn

Change of variables:

̂ α = α n ̂ pd,n( ̂ α) := pd,n(α)

Theorem (Alicki 88’, Keyl & Werner ’01): Let . Then in distribution.

X(n) ∼ ̂ pd,n X(n) ⟶ 1 d(1,...,1)

slide-48
SLIDE 48

Asymptotics

Schur-Weyl distribution: pd,n(α) =

dαmd,α dn

Change of variables:

̂ α = α n ̂ pd,n( ̂ α) := pd,n(α)

Theorem (Alicki 88’, Keyl & Werner ’01): Let . Then in distribution.

X(n) ∼ ̂ pd,n X(n) ⟶ 1 d(1,...,1)

Theorem (Johansson ’01): Let and set . Then in distribution, where and .

X(n) ∼ ̂ pd,n A(n) = n d (X(n) − 1 d(1,...,1)) A(n) ⟶ A A = spec(G) G ∼ GUE0

d

slide-49
SLIDE 49

Asymptotics

Schur-Weyl distribution: pd,n(α) =

dαmd,α dn

Change of variables:

̂ α = α n ̂ pd,n( ̂ α) := pd,n(α)

Theorem (Alicki 88’, Keyl & Werner ’01): Let . Then in distribution.

X(n) ∼ ̂ pd,n X(n) ⟶ 1 d(1,...,1)

Theorem (Johansson ’01): Let and set . Then in distribution, where and .

X(n) ∼ ̂ pd,n A(n) = n d (X(n) − 1 d(1,...,1)) A(n) ⟶ A A = spec(G) G ∼ GUE0

d

Strengthen convergence? (needed for PBT…)

slide-50
SLIDE 50

Results

slide-51
SLIDE 51

Strengthened convergence

X(n) ∼ ̂ pd,n A(n) = n d (X(n) − 1 d(1,...,1))

slide-52
SLIDE 52

Strengthened convergence

X(n) ∼ ̂ pd,n A(n) = n d (X(n) − 1 d(1,...,1))

Theorem (CLMSSW ’19): converges in moments, i.e. for all where and .

A(n) 𝔽 [(A(n)

i ) s

] → 𝔽 [As

i]

s ∈ ℕ A = spec(G) G ∼ GUE0

d

slide-53
SLIDE 53

Strengthened convergence

X(n) ∼ ̂ pd,n A(n) = n d (X(n) − 1 d(1,...,1))

Theorem (CLMSSW ’19): converges in moments, i.e. for all where and .

A(n) 𝔽 [(A(n)

i ) s

] → 𝔽 [As

i]

s ∈ ℕ A = spec(G) G ∼ GUE0

d

Expectations of rational functions?

slide-54
SLIDE 54

Strengthened convergence

  • X(n) ∼ ̂

pd,n A(n) = n d (X(n) − 1 d(1,...,1))

Sum-free ordered cone Cd = {x ∈ ℝd xi ≥ xi+1, ∑

i

xi = 0}

A(n), spec(G) ∈ Cd

slide-55
SLIDE 55

Strengthened convergence

  • X(n) ∼ ̂

pd,n A(n) = n d (X(n) − 1 d(1,...,1))

Sum-free ordered cone Cd = {x ∈ ℝd xi ≥ xi+1, ∑

i

xi = 0}

A(n), spec(G) ∈ Cd

:

˜ A(n) ˜ A(n)

i

= A(n)

i

+ d n (d − i) ⇒ ˜ A(n) ∈ int(Cd)

slide-56
SLIDE 56

Strengthened convergence

  • X(n) ∼ ̂

pd,n A(n) = n d (X(n) − 1 d(1,...,1))

Sum-free ordered cone Cd = {x ∈ ℝd xi ≥ xi+1, ∑

i

xi = 0}

A(n), spec(G) ∈ Cd

:

˜ A(n) ˜ A(n)

i

= A(n)

i

+ d n (d − i) ⇒ ˜ A(n) ∈ int(Cd)

for same convergence

→ 0 n → ∞ ⇒

slide-57
SLIDE 57

Strengthened convergence

Theorem (CLMSSW ’19, informal): Let be a continuous function that diverges at most as where

  • is the distance from a facet of

, and

  • .

Then where and .

g : int(Cd) → ℝ δη

δ Cd η > − 2 − 1 d − 1

𝔽 [g ( ˜ A(n))] → 𝔽 [g(A)] A = spec(G) G ∼ GUE0

d

slide-58
SLIDE 58

Previous results

Exact formulas (Studzinski et al. ’16, Mozrzymas et al. 17’): with Evaluating these formulas scales exponential in ! Asymptotics for arbitrary and ?

FEPR

d

(N) = d−N−2 ∑

α⊢dN−1

μ=α+□

dμmμ

2

pEPR

d

(N) = 1 dN ∑

α⊢dN−1

m2

α

dμ* mμ* μ* = maxargμ=α+□ mμdα mαdμ F*

d (N) = d−2 sup q

μ, μ′ ⊢d N μ′ = μ + □ − □

q(μ)q(μ′ ) d d N → ∞

slide-59
SLIDE 59

Previous results

Exact formulas (Studzinski et al. ’16, Mozrzymas et al. 17’): with

FEPR

d

(N) = d−N−2 ∑

α⊢dN−1

μ=α+□

dμmμ

2

pEPR

d

(N) = 1 dN ∑

α⊢dN−1

m2

α

dμ* mμ* μ* = maxargμ=α+□ mμdα mαdμ F*

d (N) = d−2 sup q

μ, μ′ ⊢d N μ′ = μ + □ − □

q(μ)q(μ′ )

Expectation w.r.t. the Schur-Weyl distribution! Asymptotics in terms of GUE0

d

slide-60
SLIDE 60

Port-based teleportation: EPR

Theorem (CLMSSW ’19): The fidelity

  • f plain port-based teleportation with maximally

entangled states is given by . For , the success probability of heralded port-based teleportation with maximally entangled states is given by .

FEPR FEPR = 1 − d2 − 1 4N + o(N−1) G ∼ GUE0

d

pEPR = 1 − 𝔽[λmax(G)] d N + o(N−1/2)

: largest eigenvalue

λmax

slide-61
SLIDE 61

Port-based teleportation: optimized

Theorem (CLMSSW ’19): There exist constants , such that the fidelity

  • f plain port-

based teleportation with optimized entangled resource is given by for large enough.

cd c′

d > 0

F* 1 − cdN−2 ≤ F* ≤ 1 − c′

dN−2

N

Ishizaka ’15 Completely different techniques. Formula by Mozrzymas et al. principal eigenvalue of graph Laplacian on simplex discretized with root lattice of scaled by .

∝ 𝔱𝔳(d) N−1

slide-62
SLIDE 62

Conclusion

  • Strengthened convergence theorem for Schur-Weyl distribution
  • Characterized asymptotic performance of the standard port-

based teleportation protocols

  • Heralding comes at a cost, optimized resources help.

Summary Open problems

  • Close gap for plain PBT with optimized resource
  • Directly characterize cost of instantaneous non-local quantum

computation

  • General asymptotics for N, d → ∞
slide-63
SLIDE 63

Thanks!

FEPR = 1 − d2 − 1 4N + o(N−1) pEPR = 1 − 𝔽[λmax(G)] d N + o(N−1/2) ≤ 1 − c′

dN−2

1 − cdN−2 ≤ F* p* = 1 − d2 − 1 d2 − 1 + N