Symmetric extendibility for a class of qudit states

@article{Ranade2009SymmetricEF,
  title={Symmetric extendibility for a class of qudit states},
  author={Kedar S. Ranade},
  journal={Journal of Physics A: Mathematical and Theoretical},
  year={2009},
  volume={42},
  pages={425302}
}
  • Kedar S. Ranade
  • Published 29 June 2009
  • Mathematics
  • Journal of Physics A: Mathematical and Theoretical
The concept of symmetric extendibility has recently drawn attention in the context of tolerable error rates in quantum cryptography, where it can be used to decide whether quantum states shared between two parties can be purified by means of entanglement purification with one-way classical communication only. Unfortunately, at present there exists no simple general criterion to decide whether a state possesses a symmetric extension or not. In this paper, we derive criteria for symmetric… 

Symmetric extension of bipartite quantum states and its use in quantum key distribution with two-way postprocessing

We investigate which bipartite quantum states admit a symmetric extension and apply the results in the analysis of noise thresholds in quantum key distribution protocols with two-way postprocessing.

Symmetric Extendability of Quantum States and the Extreme Limits of Quantum Key Distribution

TLDR
The goal is to find the highest value of the quantum bit-error rate (QBER) Q for which two-way classical post-processing protocols on the data can distill secret keys and results appear to indicate that they are not.

Extendibility of Bosonic Gaussian States.

TLDR
A simple semidefinite program is derived, whose size scales linearly with the number of local modes, to efficiently decide k-extendibility of any given bosonic Gaussian state.

Distributing bipartite quantum systems under timing constraints

TLDR
This article studies how bipartite states may be distributed in the context of a quantum network limited by timing constraints, and explores various tasks that plausibly arise in this context, and characterize the achievability of several of these in settings where only one-way communication is allowed.

SICs: Some Explanations

TLDR
The aim, so far unfulfilled, is to prove existence of SICs in an infinite sequence of dimensions.

Extendibility of Werner States

We investigate the two-sided symmetric extendibility problem of Werner states. The interplay of the unitary symmetry of these states and the inherent bipartite permutation symmetry of the

References

SHOWING 1-10 OF 18 REFERENCES

Symmetric extension in two-way quantum key distribution

We introduce symmetric extensions of bipartite quantum states as a tool for analyzing protocols that distill secret key from quantum correlations. Whether the correlations are coming from a

Spectrum conditions for symmetric extendible states

We analyze bipartite quantum states that admit a symmetric extension. Any such state can be decomposed into a convex combination of states that allow a pure symmetric extension. A necessary condition

Asymptotic correctability of Bell-diagonal qudit states and lower bounds on tolerable error probabilities in quantum cryptography

TLDR
Basic properties of quantum state purification protocols are investigated which are capable of purifying tensor products of Bell-diagonal states and which are based on B-steps of the Gottesman-Lo-type with the subsequent application of a Calderbank–Shor–Steane quantum code.

Symmetric extensions of quantum States and local hidden variable theories.

TLDR
A simple and efficient algorithmic approach for the problem of constructing local hidden variable theories for quantum states based on constructing a so-called symmetric quasiextension of the quantum state that gives rise to a localhidden variable model with a certain number of settings for the observers Alice and Bob.

Unconditionally secure key distribution in higher dimensions by depolarization

  • H. Chau
  • Computer Science
    IEEE Transactions on Information Theory
  • 2005
TLDR
This paper presents a prepare-and-measure scheme using N-dimensional quantum particles as information carriers where N is a prime power and proves that this scheme is unconditionally secure against all attacks allowed by the laws of quantum physics.

Proof of security of quantum key distribution with two-way classical communications

TLDR
This investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.

Symmetric extendibility for qudits and tolerable error rates in quantum cryptography

TLDR
This letter study the symmetric extendibility in a specific class of two-qudit states, i.

J. Phys. A: Math. Theor

  • J. Phys. A: Math. Theor
  • 2007

IEEE Trans. Inf. Theory

  • IEEE Trans. Inf. Theory
  • 2003

Phys. Rev. Lett

  • Phys. Rev. Lett
  • 2003