Sample Complexity of Black Box work Extraction
Shantanav Chakraborty,Siddhartha Das,Arnab Ghorui,Soumyabrata Hazra,Uttam Singh
Technical Report, arXiv, 2024
@inproceedings{bib_Samp_2024, AUTHOR = {Shantanav Chakraborty, Siddhartha Das, Arnab Ghorui, Soumyabrata Hazra, Uttam Singh}, TITLE = {Sample Complexity of Black Box work Extraction}, BOOKTITLE = {Technical Report}. YEAR = {2024}}
Extracting work from a physical system is one of the cornerstones of quantum thermodynamics. The extractable work, as quantified by ergotropy, necessitates a complete description of the quantum system. This is significantly more challenging when the state of the underlying system is unknown, as quantum tomography is extremely inefficient. In this article, we analyze the number of samples of the unknown state required to extract work. With only a single copy of an unknown state, we prove that extracting any work is nearly impossible. In contrast, when multiple copies are available, we quantify the sample complexity required to estimate extractable work, establishing a scaling relationship that balances the desired accuracy with success probability. Our work develops a sample-efficient protocol to assess the utility of unknown states as quantum batteries and opens avenues for estimating thermodynamic quantities using near-term quantum computers.
Testing of quantum nonlocal correlations under constrained free will and imperfect detectors
Abhishek Sadhu,Siddhartha Das
Physical Review A, PRA, 2023
@inproceedings{bib_Test_2023, AUTHOR = {Abhishek Sadhu, Siddhartha Das}, TITLE = {Testing of quantum nonlocal correlations under constrained free will and imperfect detectors}, BOOKTITLE = {Physical Review A}. YEAR = {2023}}
In this work, we deal with the relaxation of two central assumptions in standard locally realistic hidden variable (LRHV) inequalities: free will in choosing measurement settings, and the presence of perfect detectors at the measurement devices. Quantum correlations violating LRHV inequalities are called quantum nonlocal correlations. In principle, in an adversarial situation, there could be a hidden variable introducing bias in the selection of measurement settings, but observers with no access to that hidden variable could be unaware of the bias. In practice, however, detectors do not have perfect efficiency. A main focus of this paper is the introduction of the framework in which given a quantum state with nonlocal behavior under constrained free will, we can determine the threshold values of detector parameters (detector inefficiency and dark counts) such that the detectors are robust enough to certify nonlocality. We also introduce a class of LRHV inequalities with constrained free will, and we discuss their implications in the testing of quantum nonlocal correlation
Speed limits on correlations in bipartite quantum systems
vivek Pandey,Divyansh Shrimali,Brij Mohan,Siddhartha Das,Arun Kumar Pati
Physical Review A, PRA, 2023
@inproceedings{bib_Spee_2023, AUTHOR = {Vivek Pandey, Divyansh Shrimali, Brij Mohan, Siddhartha Das, Arun Kumar Pati}, TITLE = {Speed limits on correlations in bipartite quantum systems}, BOOKTITLE = {Physical Review A}. YEAR = {2023}}
Quantum speed limit is bound on the minimum time a quantum system requires to evolve from an initial state to final state under a given dynamical process. It sheds light on how fast a desired state transformation can take place which is pertinent for design and control of quantum technologies. In this paper, we derive speed limits on correlations such as entanglement, Bell-CHSH correlation, and quantum mutual information of quantum systems evolving under dynamical processes. Our main result is speed limit on an entanglement monotone called negativity which holds for arbitrary dimensional bipartite quantum systems and processes. Another entanglement monotone which we consider is the concurrence. To illustrate efficacy of our speed limits, we analytically and numerically compute the speed limits on the negativity, concurrence, and Bell-CHSH correlation for various quantum processes of practical interest. We are able to show that for practical examples we have considered, some of the speed limits we derived are actually attainable and hence these bounds can be considered to be tight.
Practical limitations on robustness and scalability of quantum Internet
Abhishek Sadhu,Meghana Ayyala Somayajula,Karol Horodecki,Siddhartha Das
Technical Report, arXiv, 2023
@inproceedings{bib_Prac_2023, AUTHOR = {Abhishek Sadhu, Meghana Ayyala Somayajula, Karol Horodecki, Siddhartha Das}, TITLE = {Practical limitations on robustness and scalability of quantum Internet}, BOOKTITLE = {Technical Report}. YEAR = {2023}}
As quantum theory allows for information processing and computing tasks that otherwise are not possible with classical systems, there is a need and use of quantum Internet beyond existing network systems. At the same time, the realization of a desirably functional quantum Internet is hindered by fundamental and practical challenges such as high loss during transmission of quantum systems, decoherence due to interaction with the environment, fragility of quantum states, etc. We study the implications of these constraints by analyzing the limitations on the scaling and robustness of quantum Internet. Considering quantum networks, we present practical bottlenecks for secure communication, delegated computing, and resource distribution among end nodes. Motivated by the power of abstraction in graph theory (in association with quantum information theory), we consider graph-theoretic quantifiers to assess network robustness and provide critical values of communication lines for viable communication over quantum Internet. In particular, we begin by discussing limitations on usefulness of isotropic states as device-independent quantum key repeaters which otherwise could be useful for device-independent quantum key distribution. We consider some quantum networks of practical interest, ranging from satellite-based networks connecting far-off spatial locations to currently available quantum processor architectures within computers, and analyze their robustness to perform quantum information processing tasks. Some of these tasks form primitives for delegated quantum computing, e.g., entanglement distribution and quantum teleportation.
Fundamental limitations on the device-independent quantum conference key agreement
Karol Horodecki,Marek Winczewski,Siddhartha Das
Physical Review A, PRA, 2022
@inproceedings{bib_Fund_2022, AUTHOR = {Karol Horodecki, Marek Winczewski, Siddhartha Das}, TITLE = {Fundamental limitations on the device-independent quantum conference key agreement}, BOOKTITLE = {Physical Review A}. YEAR = {2022}}
Building a quantum secure internet is one of the most important challenges in the field of quantum technologies [1,2]. It would ensure worldwide information-theoretically secure communication. The idea of quantum repeaters [3–5] gives hope that this dream will come true. However, the level of quantum security proposed originally in a seminal article by Bennett and Brassard [6] seems to be insufficient due to the fact that on the way between an honest manufacturer and an honest user, an active hacker can change with the inner workings of a quantum device, making it totally insecure [7]. Indeed, the hardware Trojan-horse attacks on random number generators are known [8], and the active hacking on quantum devices became a standard testing approach since the seminal attack by Makarov [9]. The idea of device-independent (DI) security overcomes this obstacle [7,10] (see also [11] and references therein). Although difficult to be done in practice, it has been demonstrated quite recently in several recent experiments [12–14]. In parallel, the study of the limitations of this approach in terms of upper bounds on the distillable key has been put forward [15–18]. However, these approaches focus on pointto-point quantum device-independent secure communication. In this paper we introduce the upper bounds on the performance of the device-independent conference key agreement (DI-CKA) [19,20]. The task of the conference agreement is to distribute to N > 2 honest parties the same secure key for one-time-pad encryption. A protocol achieving this task in a device-independent manner has been shown in Ref. [20]. We set an upper bound on the performance of such protocols in a network setting. We focus on physical behaviors with N users (for arbitrary N > 2), where each user is both the sender and receiver of the behavior treated as a black box. This situation is a special case of a network describable with a multiplex quantum channel where inputs and outputs are classical with quantum phenomena going inside the physical behavior [21]. All N trusted parties have the role of both the sender to and receiver from the channel and their goal is to obtain a secret key in a device-independent way against a quantum adversary. Aiming at upper bounds on the device-independent key, we narrow the consideration to the independent and identically distributed case. In this scenario, the honest parties share n identical devices. All the N parties set (classical) inputs x = (x1,..., xN ) to each of the n shared devices P(a|x) and receive (classical) outputs a = (a1,..., aN ) from each of them. We restrict our consideration to quantum devices. Such devices are realized by certain measurements M ≡ ⊗N i=1Mxi ai on quantum states ρA1,...,AN ≡ ρN(A). We define these devices (ρN(A),M) = Tr[ρN(A) ⊗N i=1 Mxi ai ]. In this work we provide upper bounds on the deviceindependent conference key distillation rates for arbitrary multipartite states. As the first main result, we introduce a multipartite generalization of the cc-squashed entanglement provided in Ref. [22] and developed in Ref. [18]. With a little abuse of notation with respect to that used in Refs. [16,18], for the sake of the reader, we will omit the fact that the measure is multipartite as well as reduce the abbreviation cc in its name and here call it just reduced c-squashed entanglement,
Quantum speed limits for information and coherence
Brij Mohan,Siddhartha Das,Arun K Pati
New Journal of Physics, NJP, 2022
@inproceedings{bib_Quan_2022, AUTHOR = {Brij Mohan, Siddhartha Das, Arun K Pati}, TITLE = {Quantum speed limits for information and coherence}, BOOKTITLE = {New Journal of Physics}. YEAR = {2022}}
The quantum speed limit indicates the maximal evolution speed of the quantum system. In this work, we determine speed limits on the informational measures, namely the von Neumann entropy, maximal information, and coherence of quantum systems evolving under dynamical processes. These speed limits ascertain the fundamental limitations on the evolution time required by the quantum systems for the changes in their informational measures. Erasing of quantum information to reset the memory for future use is crucial for quantum computing devices. We use the speed limit on the maximal information to obtain the minimum time required to erase the information of quantum systems via some quantum processes of interest.
Upper Bounds on Device-Independent Quantum Key Distribution Rates in Static and Dynamic Scenarios
Eneet Kaur,Karol Horodecki ,Siddhartha Das
Physical Review Applied, PRAp, 2022
@inproceedings{bib_Uppe_2022, AUTHOR = {Eneet Kaur, Karol Horodecki , Siddhartha Das}, TITLE = {Upper Bounds on Device-Independent Quantum Key Distribution Rates in Static and Dynamic Scenarios}, BOOKTITLE = {Physical Review Applied}. YEAR = {2022}}
In this work, we develop upper bounds on key rates for device-independent quantum key distribution (DI-QKD) protocols and devices. We study the reduced cc-squashed entanglement and show that it is a convex functional. As a result, we show that the convex hull of the currently known bounds is a tighter upper bound on the device-independent key rates of the standard Clauser-Horne-Shimony-Holt (CHSH)- based protocol. We further provide tighter bounds for DI-QKD key rates achievable by any protocol applied to the CHSH-based device. This bound is based on reduced relative entropy of entanglement optimized over decompositions into local and nonlocal parts. In the dynamical scenario of quantum channels, we obtain upper bounds for device-independent private capacity for the CHSH-based protocols. We show that the device-independent private capacity for the CHSH-based protocols on depolarizing and erasure channels is limited by the secret key capacity of dephasing channels.