Movatterモバイル変換


[0]ホーム

URL:


Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
Thehttps:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

NIH NLM Logo
Log inShow account info
Access keysNCBI HomepageMyNCBI HomepageMain ContentMain Navigation
pubmed logo
Advanced Clipboard
User Guide

Full text links

Nature Publishing Group full text link Nature Publishing Group Free PMC article
Full text links

Actions

.2017 Apr 26:8:15043.
doi: 10.1038/ncomms15043.

Fundamental limits of repeaterless quantum communications

Affiliations

Fundamental limits of repeaterless quantum communications

Stefano Pirandola et al. Nat Commun..

Abstract

Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed 'teleportation stretching', we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing financial interests.

Figures

Figure 1
Figure 1. Adaptive quantum protocol.
The first step is the preparation of the initial separable stateformula image ofa andb by some adaptive LOCC Λ0. After the preparation of the local registers, there is the first transmission: Alice picks a system from her local registera1a, so that the register is updated asaaa1; systema1 is sent through the channelformula image, with Bob getting the outputb1; Bob includes the output in his local register, which is updated asb1bb; finally, Alice and Bob apply another adaptive LOCC Λ1 to their registersa,b. In the second transmission, Alice picks and sends another systema2a through channelformula image with outputb2 for Bob. The parties apply a further adaptive LOCC Λ2 to their registers and so on. This procedure is repeatedn times, with output stateformula image for the Alice's and Bob's local registers.
Figure 2
Figure 2. From teleportation- to LOCC-simulation of quantum channels.
(a) Consider the generalized teleportation of an input stateρ of ad-dimensional systema by using a resource stateσ of two systems,A andB, with corresponding dimensionsd andd′ (finite or infinite). Systemsa andA are subject to a Bell detection (triangle) with random outcomek. This outcome is associated with a projection onto a maximally entangled state up to an associated teleportation unitaryUk which is a Pauli operator ford<+∞ and a phase-displacement ford=+∞ (see Methods for the basics of quantum teleportation and the characterization of the teleportation unitaries). The classical outcomek is communicated to Bob, who applies a correction unitaryformula image to his systemB with outputb. In general,Vk does not necessarily belong to the set {Uk}. On average, this teleportation LOCC defines a teleportation channelformula image froma tob. It is clear that this construction also teleports parta of an input state involving ancillary systems. (b) In general we may replace the teleportation LOCC (Bell detection and unitary corrections) with an arbitrary LOCCformula image: Alice performs a quantum operationformula image on her systemsa andA, communicates the classical variablek to Bob, who then applies another quantum operationformula image on his systemB. By averaging over the variablek, so thatformula image is certainly trace-preserving, we achieve the simulationformula image for any input stateρ. We say that a channelformula image is ‘σ-stretchable' if it can be simulated by a resource stateσ for some LOCCformula image. Note that Alice's and Bob's LOsformula image andformula image are arbitrary quantum operations; they may involve other local ancillas and also have extra labels (due to additional local measurements), in which caseformula image is assumed to be averaged over all these labels. (c) The most important case is when channelformula image can be simulated by a trace-preserving LOCCformula image applied to its Choi matrixformula imageformula image, with Φ being an EPR state. In this case, we say that the channel is ‘Choi-stretchable'. These definitions are suitably extended to bosonic channels.
Figure 3
Figure 3. Teleportation-covariant channels are Choi-stretchable.
(a) Consider the teleportation of an input stateρa by using an EPR state ΦAA of systemsA andA′. The Bell detectionformula image on systemsa andA teleports the input state ontoA′, up to a random teleportation unitary, that is,ρA=Ukρaformula image. Becauseformula image is teleportation-covariant,Uk is mapped into an output unitaryVk and we may writeformula image. Therefore, Bob just needs to receive the outcomek and applyformula image, so thatformula image. Globally, the process describes the simulation of channelformula image by means of a generalized teleportation protocol over the Choi matrixformula image. (b) The procedure is also valid for CV systems. If the inputa is a bosonic mode, we need to consider finite-energy versions for the EPR state Φ and the Bell detectionformula image, that is, we use a TMSV state Φμ and a corresponding quasi-projectionformula image onto displaced TMSV states. At finite energyμ, the teleportation process froma toA′ is imperfect with some outputformula image. However, for anyɛ>0 and input stateρa, there is a sufficiently large value ofμ such thatformula image (refs 25, 26). Consider the transmitted stateformula image. Because the trace distance decreases under channels, we haveformula image. After the application of the correction unitaryformula image, we have the output stateformula image which satisfiesformula image. Taking the asymptotic limit of largeμ, we achieveformula image→0 for any inputρa, therefore achieving the perfect asymptotic simulation of the channel. The asymptotic teleportation-LOCC is thereforeformula image whereformula image. The result is trivially extended to the presence of ancillas.
Figure 4
Figure 4. Teleportation stretching of an adaptive quantum protocol.
(a) Consider theith transmission through channelformula image, where the input (i−1)th register state is given byformula image. After transmission throughformula image and the adaptive LOCC Λi, the register state is updated toformula image. (b) Let us simulate the channelformula image by a LOCCformula image and a resource stateσ. (c) The simulation LOCCformula image can be combined with the adaptive LOCC Λi into a single ‘extended' LOCC Δi while the resource stateσ can be stretched back in time and out of the adaptive operations. We may therefore writeformula imagei(formula imageσ). (d) We iterate the previous steps for all transmissions, so as to stretchn copiesσn and collapse all the extended LOCCs Δn o …o Δ1 into a single LOCC Λ. In other words, we may writeformula image=Λ(formula imageσn). (e) Finally, we include the preparation of the separable stateformula image into Λ and we also average over all local measurements present in Λ, so that we may write the output state asformula image=formula image(σn) for a trace-preserving LOCCformula image. The procedure is asymptotic in the presence of asymptotic channel simulations (bosonic channels).
Figure 5
Figure 5. Classification of channels in DVs and CVs.
We depict the classes of channels that are considered in this work, together with the bounds for their two-way capacities.
Figure 6
Figure 6. Ideal performances in QKD.
We plot the secret-key rate (bits per channel use) versus Alice–Bob's distance (km) at the loss rate of 0.2 dB per km. The secret-key capacity of the channel (red line) sets the fundamental rate limit for point-to-point QKD in the presence of loss. Compare this capacity with a previous non-achievable upperbound (dotted line). We then show the maximum rates that are potentially achievable by current protocols, assuming infinitely long keys and ideal conditions, such as unit detector efficiencies, zero dark count rates, zero intrinsic error, unit error correction efficiency, zero excess noise (for CVs) and large modulation (for CVs). In the figure, we see that ideal implementations of CV protocols (purple lines) are not so far from the ultimate limit. In particular, we consider: (i) One-way no-switching protocol, coinciding with CV-MDI-QKD in the most asymmetric configuration (relay approaching Alice65). For high lossformula image, the rate scales asη/ln 4, which is just 1/2 of the capacity. Same scaling for the one-way switching protocol of ref. ; (ii) Two-way protocol with coherent states and homodyne detection which scales asformula image for high loss (thermal noise is needed for two-way to beat one-way QKD66). For the DV protocols (dashed lines), we consider: BB84 with single-photon sources with rateη/2; BB84 with weak coherent pulses and decoy states with rateη/(2e); and DV-MDI-QKD with rateη/(2e2). See Supplementary Note 6 for details on these ideal rates.
Figure 7
Figure 7. Two-way capacities for Gaussian channels in terms of the relevant channel parameters.
(a) Two-way capacityformula image of the thermal-loss channel as a function of transmissivityη forformula image=1 thermal photon. It is contained in the shadowed area identified by the lower bound (LB) and upper bound (UB) of equation (25). Our upper bound is clearly tighter than those based on the squashed entanglement, computed in ref. (dotted) and ref. (dashed). Note thatformula image at high transmissivities. Forformula image=0 (lossy channel) the shadowed region shrinks into a single line. (b) Two-way capacityformula image of the amplifier channel as a function of the gaing forformula image=1 thermal photon. It is contained in the shadowed specified by the bounds in equation (27). For small gains, we haveformula image. Forformula image=0 (quantum-limited amplifier) the shadowed region shrinks into a single line. (c) Two-way capacityformula image of the additive-noise Gaussian channel with added noiseξ. It is contained in the shadowed region specified by the bounds in equation (30). For small noise, we haveformula image. Our upper bound is much tighter than those of ref. (dotted), ref. (dashed) and ref. (dot-dashed).
Figure 8
Figure 8. Two-way capacities of basic qubit channels.
(a) Two-way capacity of the depolarizing channelformula image with arbitrary probabilityp. It is contained in the shadowed region specified by the bounds in equation (36). We also depict the best-known bound based on the squashed entanglement (dashed). (b) Two-way capacity of the amplitude damping channelformula image for arbitrary damping probabilityp. It is contained in the shadowed area identified by the lower bound (LB) of equation (48) and the upper bound (UB) of equation (49). We also depict the bound of equation (47) (upper solid line), which is good only at high dampings; and the boundformula image of ref. (dotted line), which is computed from the entanglement-assisted classical capacityCA. Finally, note the separation of the two-way capacityformula image from the unassisted quantum capacityformula image (dashed line).
Figure 9
Figure 9. Asymptotic LOCC simulation of bosonic channels.
The finite-energy LOCC simulationformula image generates a teleportation channelformula image. Assume thatformula image defines a target bosonic channelformula image according to the pointwise limit in equation (93). Then, we say that the bosonic channelformula image has asymptotic simulationformula image.
Figure 10
Figure 10. Adaptive protocol for two-way quantum or private communication.
The protocol employs a forward channelformula image and backward channelformula image. Transmissions are alternated with adaptive LOCCsformula image.
See this image and copyright information in PMC

References

    1. Nielsen M. A. & Chuang I. L. Quantum Computation and Quantum Information Cambridge Univ. Press (2000).
    1. Weedbrook C. et al. Gaussian quantum information. Rev. Mod. Phys. 84, 621–669 (2012).
    1. Holevo A. in Quantum Systems, Channels, Information: A Mathematical Introduction De Gruyter (2012).
    1. Bennett C. H. & Brassard G. inProceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 175–179 (Bangalore, India, 1984).
    1. Gisin N., Ribordy G., Tittel W. & Zbinden H. Quantum cryptography. Rev. Mod. Phys. 74, 145–196 (2002).

Publication types

LinkOut - more resources

Full text links
Nature Publishing Group full text link Nature Publishing Group Free PMC article
Cite
Send To

NCBI Literature Resources

MeSHPMCBookshelfDisclaimer

The PubMed wordmark and PubMed logo are registered trademarks of the U.S. Department of Health and Human Services (HHS). Unauthorized use of these marks is strictly prohibited.


[8]ページ先頭

©2009-2026 Movatter.jp