Brought to you by:
Paper The following article is Open access

Delocalized information in quantum networks

and

Published 16 April 2020 © 2020 The Author(s). Published by IOP Publishing Ltd on behalf of the Institute of Physics and Deutsche Physikalische Gesellschaft
, , Citation J Miguel-Ramiro and W Dür 2020 New J. Phys. 22 043011 DOI 10.1088/1367-2630/ab784d

Download Article PDF
DownloadArticle ePub

You need an eReader or compatible software to experience the benefits of the ePub3 file format.

1367-2630/22/4/043011

Abstract

We consider entanglement-based quantum networks where information is stored in a delocalized way within regions or the whole network. This offers a natural protection against failure of network nodes, loss and decoherence, and has built-in security features. Quantum information is transmitted within the network by performing local measurements on individual nodes only. Information can be localized within regions or at a specific node by collaborative actions using only entanglement within a region, or sometimes even without entanglement. We discuss several examples based on error correction stabilizer codes, Dicke states and correlation space encodings. We show how to design fully functional networks using encoded states or correlation space resources.

Export citation and abstract BibTeX RIS

Original content from this work may be used under the terms of the Creative Commons Attribution 4.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

1. Introduction

Quantum networks promise to be one of the first applications of an upcoming quantum technology [1, 2] (see also e.g. [321]). They are the quantum counterpart of classical networks, where quantum information rather than classical information is distributed, stored and processed. Of particular importance is the distribution and storage of entanglement. Such entangled quantum states do not have a classical analog, and offer various applications ranging from quantum cryptography and conference key agreement to distributed metrology and distributed quantum computation [2232].

Usually such a quantum network is thought of consisting of multiple nodes or parties1 that are connected by quantum channels [2]. Upon request, quantum information is directly distributed, or entangled states are generated on demand between different parties. These entangled states can then be used for different applications, including the distribution of quantum information via teleportation. Alternatively a top-down approach to quantum networks is used [3, 4], where entangled resource states shared among network nodes serve to guarantee the required functionality. In both cases quantum information is stored locally at a given node.

Here we analyze a different approach to quantum networks, where quantum information is stored in a delocalized way within network regions or the whole network. Such an approach offers several advantages and interesting features that we illustrate and analyze in detail.

  • (i)  
    Natural protection against failure of network nodes, loss and decoherence during storage and transport.
  • (ii)  
    Built-in security features, such as limited accessible information per network node.
  • (iii)  
    Encoding/decoding and processing of information using only local operations or limited entanglement.

We clarify these features as follows: (i) since information is not localized at a given network node, failure or loss of individual nodes does not destroy encoded information completely, but only disturbs it to a certain extend. The same is true for processing or transport of information. While in a standard approach, failure or loss of any of the nodes involved in a transport process results into complete information loss or loss of entanglement, in the approach we follow here the failure of one (or several) individual nodes may have only a very limited influence, thereby minimizing the influence of network node failures. (ii) With respect to security of the stored information, the accessible information per node is bounded and can be made arbitrarily small. This implies that multiple nodes need to cooperate in order to access the information, while it is protected against malicious parties. In this context it is also interesting to note that the entanglement shared between an individual party and the rest of the network can be small [33], significantly less than one ebit. (iii) Since information is no longer stored in its bare form, one has to think of encoding, decoding and processing of information. Ideally, this should be done by local operations on individual nodes only, however it may also require some (restricted) amount of shared entanglement. In fact we find that processing of information, in particular transport among an entanglement-based network, is always possible using local operations only [34, 35].

We consider two different scenarios: (a) storage networks, where quantum information is stored in a distributed way among all or multiple nodes, and (b) generic networks with full functionality, including transport, that are comprised of different connected regions. Each region consists of multiple network nodes and corresponds to a single logical qubit. Regarding (a), we analyze several kind of encodings, where the logical basis states are given by codewords of error correction stabilizer codes, Dicke states [3638], or resource states that have been discussed in the context of quantum computation in correlation space [3335]. The usage of error correction codes for storage is well known and has been widely discussed. Such an approach offers protection against noise or loss, however requires active error correction. When used in a distributed scenario as we consider here, entanglement or non-local operations are required to detect and correct errors. Dicke state encodings in contrast have passive, built in protection features. Even without active error correction, quantum information is only slightly disturbed by loss, decoherence and node failures of a restricted amount of parties. Furthermore, the information that is distributed among the network can in some cases be probabilistically localized (using only local operations by all parties, or some restricted amount of entanglement). Finally, we investigate resource states for quantum computation in correlation space, particularly so-called quantum wires [35]. There quantum information is encoded in a virtual space that is not directly linked to physical qubits forming the quantum states. Local measurements on physical qubits allow one to manipulate, process and read-out information stored in correlation space. We analyze and discuss how information encoded on the correlation space is distributed throughout the physical particles. Importantly, a downloading process can be performed, i.e. the quantum information stored in a virtual space can be mapped to physical sites [39]. This is however in general a probabilistic process that can be made quasi-deterministic if the download should take place to an arbitrary node within a small region. Noise and imperfections on physical qubits during storage or manipulation influence the quantum information stored in correlation space, in many cases however in a strongly reduced way.

Regarding (b), we consider multi-party entangled states comprised of logical qubits, that act as resource states for a quantum network with full functionality. Each of the logical qubits is associated with a region that consists of several parties, and we consider entangled states of multiple logical qubits shared among the network. Depending on the choice of resource state, point-to-point communication, generation of bipartite entanglement or the generation of arbitrary logical graph states between network regions or individual nodes is possible. In the context of correlation space encodings we consider complex (multi-dimensional) resource states. Then also processing, or more concretely transport and of information among the network and download to individual sites, is of importance. We show that for all cases we consider, the transport can be done solely by local operations on individual physical nodes, so no extra entanglement is required [40]. We also study the influence of noise and imperfections on such transport and downloading processes. For correlations space resources, we introduce the notion of transport universality. Note that the required functionality of resource states in a network differs from full scale measurement-based quantum computation as considered in [33]. This implies that a much larger class of resource states is suitable in a communication scenario as we consider here. We find that information transport and download can be done solely by local operations, and analyze the influence of noise and imperfections on physical sites.

The paper is organized as follows. In section 2 we describe the problem setting and introduce required terminology and notation, in particular regarding Dicke states, measurement-based quantum computation and computation in correlation space. In section 3 we consider the storage scenario (a), and analyze uploading, downloading and localization of information. We study the influence of noise and imperfections for all combinations of Dicke-state encodings in section 3.3, while we investigate various correlation space encodings in section 3.4. In the latter case, we determine the effective noise in correlation space, and investigate the dependence on error positions in physical space. In sections 4 and 5 we consider scenario (b), i.e. full quantum networks built from encoded (logical) states, or by combining correlation space resources respectively.

2. Background

2.1. Problem setting

We consider N spatially separated parties, each holding a two-level system (qubit). The parties share a pre-defined entangled state that serves to store one (or several) logical qubits in this network in a delocalized way. Information needs to be uploaded from a given site into the network, downloaded to a specific site with the help of other parties, as well processed. In all cases, this corresponds to a collaborative process where some of the other parties perform measurements on their qubit. In the following we will review some of the underlying concepts. We start by describing measurement-based information processing, followed by the description of two different ways to encode quantum information, using Dicke states and correlation space resources. The required processes and concepts are then discussed in following sections.

2.2. Measurement based quantum computation

Measurement based quantum computation (MBQC) is an alternative model for quantum computation in opposition to quantum logical circuits or quantum Turing machines. MBQC has no direct classical counterpart, and is based on the implementation of single qubit measurements on a resource state [41, 42]. Any operation applied to an arbitrary input can be reproduced by an adequate measurement pattern on the resource state. Different classes of resource states have been studied in the MBQC context. In particular, resources for MBQC based on tensor networks [33, 34] are of special interest for the purposes of this paper.

2.3. Encoded resource states—dicke states

A natural way to protect information in quantum computation consists in distributing the information of some particular state into a larger system of more physical particles. Given an arbitrary single qubit state $\left|\varphi \right\rangle =\alpha \left|0\right\rangle +\beta \left|1\right\rangle $, it can be encoded into a larger logical system of n particles i.e. $\left|{\varphi }_{L}\right\rangle =\alpha \left|{0}_{L}\right\rangle +\beta \left|{1}_{L}\right\rangle $, with some appropriate choice of $\left|{0}_{L}\right\rangle ,\left|{1}_{L}\right\rangle $ , two orthogonal states of ${{\mathbb{C}}}^{{2}^{n}}.$ With a proper choice of the encoding, the information of the state can be shielded against errors, losses or intervention of any physical constituents of the system. Logical blocks are then entangled (see figure 1) and information is processed at the logical level. In [33, 34], computational universality of MBQC resources is analyzed in detail, and novel resources are proposed. However, we are not interested in computational properties of the encoded resource states, but in their storage and communication characteristics, i.e. how the information can be diluted throughout the parties and how one can eventually localize it in some particular physical system.

Figure 1.

Figure 1. Physical qubits are encoded into larger systems (logical qubits) where storage or quantum processing is performed in a protected way.

Standard image High-resolution image

The construction of encoded resources states is a passive alternative to error correction codes (where errors are identified and corrected), such that storage and processing of quantum information in a protected way is guaranteed. In this paper, we aim to find good choices of orthogonal states $\left|{0}_{L}\right\rangle := \left|{\psi }_{0}\right\rangle $, $\left|{1}_{L}\right\rangle := \left|{\psi }_{1}\right\rangle $ in terms of robustness and strength of the encoded resource states for storage purposes. Our analyzes are restricted to the use of local operations assisted by classical communication (LOCC) at a physical level. For a given resource state, only operations on single qubits are available.

Dicke states [36] are an interesting class of quantum states with different applications in quantum information [4345] and experimentally obtainable. A Dicke state of n qubits and k excitations is a symmetric state of the form:

Equation (1)

where the operator ${ \mathcal P }$ represents all the possible permutations for a given number of particles and excitations. For instance, for k = 0, the states reduces to the product state ${\left|0\right\rangle }^{\otimes n}$ and for k = 1 the state is simply the Wn state [46]. Note that any two Dicke states with different number of excitations $k\ne k^{\prime} $, ${{ \mathcal D }}_{\left|n,k\right\rangle }$, ${{ \mathcal D }}_{\left|n,k^{\prime} \right\rangle }$, are orthogonal to each other.

2.4. Correlation space

Several classes of computational resources [33, 34] have been introduced as universal resources for MBQC. These resource states are defined within a tensor network formalism, with some particular boundary conditions, where quantum information is processed in a virtual space called correlation space. In particular, we are interested in qubit computational wires introduced in [35]. A computational wire is a family of pure states formed by a one dimensional chain of two-level systems which fulfils two properties, i.e. it is preparable from a product state by nearest-neighbour interaction and the entanglement between the left and right sides of the chain approaches one ebit in the limit of large number of qubits. Notice however, that this does not imply that the entanglement of an individual physical particle with the rest of the chain is one ebit.

A pure quantum state of a chain of n qudits can be described by a matrix product state (MPS) representation [47, 48] with e.g. open-boundary conditions (see figure 2)

Equation (2)

where ${s}_{i}=\left\{0,\ldots ,\ d-1\right\}$. Readers who are not familiar with the tensor network and MPS formalism are referred to [4750].

Figure 2.

Figure 2. Graphical representation of a Matrix Product State in terms of the valence-bond picture. Each physical particle is associate with two virtual systems, each of one shares a maximally entangled state with their neighbours. The projector of the virtual space into each physical system at every site is given my matrices $A[{s}_{i}]$.

Standard image High-resolution image

Quantum information is processed in a virtual D dimensional vector space (correlation space) where the D × D matrices $A\left[i\right]$ live, as well as the D dimensional vectors $\left|L\right\rangle ,\left|R\right\rangle $, which represent the left and right boundary conditions. The MPS is denoted as ${\rm{\Phi }}{\left(\left|L\right\rangle \right)}_{1}^{n}$ since one can consider that the correlation space is in the state $\left|L\right\rangle $ [33]. Any measurement on a single physical qubit is translated into some operation acting on the correlation space state.

One particular instance of 1D structure described within this formalism, and denoted as quantum computational wire [35], has been shown to be an appropriate building block for constructing resources universal for quantum computation. For this kind of wires, it is shown [35] that, by single qubit measurements on the first $k-1$ particles, one can prepare the correlation state in any arbitrary state ${\rm{\Phi }}{\left(\left|\varphi \right\rangle \right)}_{k}^{n}$. A local measurement on a physical particle of the wire with outcome $\left|{m}_{i}\right\rangle $ is associated with the application of the operator $A[{m}_{i}]$ on the correlation space. It is also known how the information of the correlation space can be localized [39] in one physical qubit and how to upload it from a physical site [51]. We review these processes in section 3.4. We are however interested in the communication properties of this kind of wires under the only assistance of local measurements, local operations and classical communication (LOCC). In this paper we restrict ourselves to the qubit case, and where $d=D=2$. We focus on one particular computational wire with non-vanishing two point correlation functions and fixed boundary conditions, that we denote as period wire (see figure 3):

Equation (3)

Equation (4)

where $G=\exp \left({\rm{i}}\pi X/\tau \right)$, $T={\rm{diag}}\left({{\rm{e}}}^{\tfrac{-{\rm{i}}\phi }{2}},{{\rm{e}}}^{\tfrac{{\rm{i}}\phi }{2}}\right)$ and $X=| 0\rangle \langle 1| +| 1\rangle \langle 0| $ is the Pauli X operator. We denote τ and ϕ as period and entanglement factor respectively. Any matrix A can be expressed in an arbitrary basis $\left\{{m}_{0},{m}_{1}\right\}$ as $A[{m}_{i}]=\left\langle {m}_{i}\left|0\right\rangle \right.A[0]+\left\langle {m}_{i}\left|1\right\rangle \right.A[1]$. We interpret this wire in two different ways. On the one hand, one can think about wires as playing the role of logical blocks of qubits as seen before, with codewords $\left|{0}_{L}\right\rangle := {\rm{\Phi }}{\left(\left|{\varphi }_{0}\right\rangle \right)}_{1}^{n},$ $\left|{1}_{L}\right\rangle := {\rm{\Phi }}{\left(\left|{\varphi }_{1}\right\rangle \right)}_{1}^{n}$, where ${\varphi }_{0}$ and φ1 are two orthogonal states of the correlation space. In this case, one logical qubit is stored in a distributed way among the wire. We study certain features of these wires, such as entanglement of individual physical qubits, influence of noise and losses, error propagation and information localization.

Figure 3.

Figure 3. (a) Graphical representation of a matrix product state in terms of tensor networks. Every block is a rank-3 tensor, and open indices are the physical indices (see [33, 48] for a detailed explanation of graphical rules for tensor network). (b) Simplified illustration of a quantum computational wire, where qubits are attached in a 1D wire with arbitrary local entanglement and non-vanishing two point correlation functions.

Standard image High-resolution image

One may also interpret these wires in an alternative way. A single wire can be conceived as a building block of a whole communication network where information is stored in a delocalized way and transported upon request, such that direct communication between any different nodes or regions can be established. One can think about the correlation space in this scenario as a big holographic resource where the information is delocalized among all the nodes, and therefore, protected.

3. Storage of quantum information

An essential feature of a quantum network in a communication scenario is the storage of quantum information. In this section we explore the required characteristics of a resource state such that information can be stored in a non-local way. We analyze families of states that exhibit different properties. We study how errors affect the stored information, and how the information can be subsequently localized into some particular node or region, with only the assistance of LOCC.

3.1. Processes and properties

We start be describing the required processes, namely uploading and downloading of quantum information, and the features we analyze. This includes local entanglement, robustness against errors and loss as well as security features.

3.1.1. Uploading

Given a quantum state containing some information, one aims to store and protect that information against noise or external interference. In our scenario, this is accomplished by encoding the state into a larger network consisting of multiple network nodes or parties, such that the information is delocalized or diluted over the network. This delocalization process is called uploading. Two different uploading procedures should be distinguished.

First, we consider the case where an arbitrary state is directly encoded into a larger system of n particles. This task involves global operations (at the logical level) and can be accomplished by constructing an entangled state between a logical block and an auxiliary system aux (see figure 4). Consider the state:

Equation (5)

where the logical qubits are defined by some orthogonal codewords $\left|{0}_{L}\right\rangle ,\left|{1}_{L}\right\rangle $. This means that the system aux is maximally entangled with the whole logical block of qubits. Consider now an arbitrary state $\left|\phi \right\rangle =\alpha \left|0\right\rangle +\beta \left|1\right\rangle $ that we want to upload into the logical level. Hence, by performing a Bell measurement between the aux system and $\left|\phi \right\rangle $, the uploading into the logical level is deterministically achieved, i.e. the global state of the remaining particles is now $\alpha \left|{0}_{L}\right\rangle +\beta \left|{1}_{L}\right\rangle $ (up to unitary Pauli correction operations at the logical level). We remark that the logical Pauli correction operation can in general not be implemented locally, however are irrelevant in the sense that they actually do not need to be implemented as the logical subspace is unchanged. It suffices to relabel the basis states, and adapt the information processing and subsequent downloading processes accordingly.

Figure 4.

Figure 4. Uploading process. A Bell measurement is performed in the auxiliary system (right) to upload the information of some state into the logical level. The same picture also holds if one substitutes the logical block by a quantum wire of the form of figure 3.

Standard image High-resolution image

On the other hand, the uploading process can also be done from a single node within the network without using an entangled state. In this case, only the network state (e.g. a computational wire) is used, and a single party (or possibly also several parties) aim to upload quantum information that is given in the form of an auxiliary quantum state to the logical level, thereby delocalizing the quantum information.

3.1.2. Downloading

The reverse process to the uploading of information is the downloading, i.e. once information is spread out among the nodes of the network, we require the possibility of localizing this information in one particular physical system (again, by LOCC). In general, this is achieved by suitable measurements on the rest of the particles. However, crucial differences exist when localizing information with standard encoded states (Dicke states) or in the correlation space framework. Encoding properties defines the characteristics of the localization process. In particular, two features are specially relevant. The ideal situation is the one where the localization is performed in a deterministic way, and the information is downloaded in an a-priori chosen place. However, due to the properties of each encoding state, one can be restricted to the case where only probabilistic, or open-destination downloading process is possible. Probabilistic downloading means that information can only be localized probabilistically in a heralded way. This may be unsatisfactory in many cases. Open-destination downloading in turn is still deterministic, however the precise location can not be determined a priori. This corresponds to a probabilistic download attempt to a given site, which however can be repeated if not successful. In this way quantum information can be downloaded quasi-determistically to individual sites within a given region of small size.

We remark that for standard encodings, there are examples where the probability to localize information from two logical blocks is arbitrarily small, even for the open-destination scenario [33]. For correlation space encodings, this problem does not occure as we show below. The main difference is that for correlation space encodings, only a fraction of the qubits need to be measured, and unsuccessful downloaded can be repeated. This leads to a success probability approaching one to download information to an unspecified site within a region of fixed size (see section 3.4).

3.1.3. Robustness

The effect of local errors can affect the global state of the resource, jeopardizing the stored information. In particular, we are interested in errors occurring in single particles when the information is delocalized, and how robust is the encoded state under that noise. The effect of local noise should have limited influence on the global state, in order to consider an encoded state robust for storage. We find effective noise maps for this process. Besides, we study the stability of the resource states under loss of particles.

In order to analyze the effective noise when errors affect particles at the physical level, one can study the following scenario. Consider the maximally entangled state

Equation (6)

where an auxiliary single particle is defined on ${{ \mathcal H }}_{{aux}}={{\mathbb{C}}}^{2}$, entangled with a logical encoded block which lives on ${{ \mathcal H }}_{L}={{\mathbb{C}}}^{{2}^{\otimes n}}$. The state resulting from the introduction of local noise on the physical particles of a logical block is defined as the Choi–Jamiolkowski state [52, 53] i.e.

Equation (7)

where the noisy channel ${\xi }^{\otimes j}$ affects j particles of the logical qubit. If one then aims to localize (by local operations) the information of the block into one physical system q, it is relevant to study how close this final state is from a perfect Bell pair $\left|{\rm{\Phi }}\right\rangle =\tfrac{1}{\sqrt{2}}\left({\left|0\right\rangle }_{{aux}}{\left|0\right\rangle }_{q}+{\left|1\right\rangle }_{{aux}}{\left|1\right\rangle }_{q}\right),$ which would be the resulting state of a perfect localization. Notice that Γ contains the full information about the effective noise map, which is in principle accessible. We remark that we use the effect of the performed processes on part of a maximally entangled state only as a tool to analyze the resulting effective noise maps or the resulting process fidelity.

Similarly, the stability under losses can be analyzed in the following way. We consider an initial state of the form $\left|{{\rm{\Phi }}}^{+}\right\rangle \left\langle {{\rm{\Phi }}}^{+}\right|$ (6) shared by the auxiliary particle and the logical qubit, and we assume that some particles in the logical block are lost. The effect of a lost particle is described by tracing out that particle, i.e. ${{\rm{\Gamma }}}_{f}={{Tr}}_{i}\left(\left|{{\rm{\Phi }}}^{+}\right\rangle \left\langle {{\rm{\Phi }}}^{+}\right|\right)$, where i are the lost particles. Tracing out is equivalent to performing an average over all the possibles outcomes of a measurement of the system i in any basis.

Finally, we compute in both cases (errors and losses) the fidelity of the final state with respect to the initial one (6), denoted as Choi–Jamiolkowski fidelity (CJ fidelity):

Equation (8)

This parameter is a suitable measure to analyze how stable is a resource encoded state against loss of particles [53]. Note that in order to compute the CJ fidelity, we replace the state of each lost particle by an identity operator, i.e. consider a completely depolarizing map acting on each of these qubits.

3.1.4. Local entanglement

An essential property of the encoded states is the local entanglement that each physical particle shares with respect to the rest. We study this characteristic, which determines the behavior, strength and suitability of the resource states. Consider a maximally entangled state of logical qubits (between two blocks of particles):

Equation (9)

We study the entropy of entanglement of a single qubit i within a block by computing the Von Neumann entropy of its reduced density operator, i.e.

Equation (10)

Even though the entanglement between blocks of logical qubits is maximal, in general this is not the case for the local entanglement of a single party. In fact, encoded states with low local entanglement are of particular importance, since this leads to advantages in order to construct and maintain the states.

Other encoding codewords can be explored based on the ones studied here. We consider some additional examples in appendix A.

3.1.5. Security analysis

Once the information is stored in the resources in a delocalized way, it is important to analyze the security of the storage, i.e. how much influence a party has about the stored state. At this point, we can make a distinction between trusted and untrusted parties. The first case analyzes how errors or losses of the physical qubits can affect the global state, and has been studied in previous sections. We focus here in the case the parties are not trusted and we hence study how much information a single party (or a group of them) can access from a encoded state, i.e. how secure is the storage against attack of parties that aim to access the information even though not authorized to do so. In order to study this, we perform a similar analysis as was done in [54] in the context of quantum secret sharing. As in [54] we use the mutual information as figure of merit. We only consider the situation where the initial state is the desired one, i.e. pure and unaltered. We remark that this does not correspond to full security analysis, but rather illustrates how much information an untrusted party can access in the network given that the resource states were distributed as they should. Given the scenario of section 3.1.1, where the q system can upload or encode any state, we analyze the mutual information between any party of the resource and the q system. The mutual information determines how much information a particle t (or a set of them) of the resource can obtain about the system q, and therefore, about the global encoded state once the party q applies the Bell measurement (to achieve uploading), local in its system.

The quantum mutual information between two systems is defined as

Equation (11)

where S represents the Von Neumann entropy (10) of the reduced density operator of system q, system t, and both systems, respectively. We will use the mutual information to assess information accessible by individual parties, and to determine the corresponding security features.

3.2. Error correction codes—stabilizer encodings

We start by briefly considering a standard encoding using codewords corresponding to error correction stabilizer codes [55]. The codewords are graph states with $| {0}_{L}\rangle =| G\rangle $ and $| {1}_{L}\rangle ={\sigma }_{z}^{\otimes N}| G\rangle $, where $| G\rangle ={\prod }_{(k,l)\in E}{U}_{{kl}}| +{\rangle }^{\otimes N}$. Here ${U}_{{kl}}=\mathrm{diag}([1,1,1,-1])$ is a phase gate, $| +\rangle =(| 0\rangle +| 1\rangle )/\sqrt{2}$ and the graph G is specified by a set of edges E. The error correction properties of such a code depend on the choice of G, and codes to protect against a fixed number of arbitrary single-qubit errors can be designed.

In order to make use of the error correction features, active error correction needs to be performed. However, decoding and syndrome readout require global access to the state, i.e. additional entanglement. In contrast, the downloading process to any specific site is deterministic, and can be accomplished by simply measuring all other qubits in the Z-basis. Notice however that in this way the error correction features of the code are not employed. The entanglement of any qubit with the rest of the system is maximal (for any connected graph).

3.3. Dicke states

We continue our study by considering Dicke state encodings. We assume codewords of the form

Equation (12)

where $\left|n,k\right\rangle ={{ \mathcal D }}_{\left|n,k\right\rangle }$ is an abbreviate notation representing a Dicke state of n qubits and k excitations (1).

3.3.1. Uploading

A general uploading process can be accomplished from a state of the form (5) by proceeding as explained in section 3.1.1.

3.3.2. Downloading

In order to analyze how information can be localized from the logical level into one physical constituent, we consider a downloading process (with LOCC) from two entangled blocks (9) where information is eventually localized into one of the physical qubits of each block (sites k and $k^{\prime} $), such that we end up with a Bell pair between the two final qubits (see figure 5). Essentially, this procedure is accomplished by performing suitable measurements in all except one particle in each block. This process can only succeed deterministically for an a-priori fixed site if the local entanglement of the logical qubit is maximal.

Figure 5.

Figure 5. Downloading of information. Information can be localized into specific physical sites by measuring the rest of qubits in suitable basis. This process differs when localizing information of the correlation space, where one does not need to measure all the qubits of the wire, which remains functional with the unmeasured ones (see section 3.4).

Standard image High-resolution image

Consider an initial logical Bell state of the form (9) and two fixed sites k and $k^{\prime} $. The initial entanglement at the logical level is maximal, but the local entropy of entanglement for a single site k is ${E}_{{\rm{inital}}}\left({\rho }_{k}\right)\leqslant 1.$ If downloading succeeds deterministically, information is localized in the sites k and $k^{\prime} $, and the final state is a perfect Bell pair. Therefore, the entropy of entanglement of particle k at the end is ${E}_{{\rm{final}}}\left({\rho }_{k}\right)=1.$ Since the process only involves LOCC and single-site measurements, one can directly conclude that localization only succeeds deterministically when the local entanglement of the particle in the initial state is maximal.

If the local entanglement is not maximal, one has to face with a probabilistic localization (in the sense that the final place where the information is localized cannot fixed a priori), or a deterministic but imperfect (in terms of the fidelity of the final state) downloading.

In case the local entropy of entanglement is maximal, consider e.g. $\left|{0}_{L}\right\rangle ={\left|0\right\rangle }^{\otimes n},\left|{1}_{L}\right\rangle ={\left|1\right\rangle }^{\otimes n}$, localization is simply accomplished by performing X measurements on all except one particle of each logical block. This is in fact also the case for any graph state encoding, where Z measurements are enough to localize information.

3.3.3. Robustness under errors

In order to compute the CJ fidelity (8) we make use of some properties of Dicke states. Any Dicke state (1) of n particles and k excitations can be j-times decomposed as [38]:

Equation (13)

where $q^{\prime} =\max \left(0,(j+k-n\right)$ and $q^{\prime\prime} =\min \left(j,k\right)$, for $q^{\prime\prime} \gt q^{\prime} .$ On the other hand, given a state ${\rho }_{n,k}=\left|n,k\right\rangle \left\langle n,k\right|$, tracing out m number of particles leads to:

Equation (14)

where nf is the final number of particles, i.e. $m=n-{n}_{f}$. In particular, for any element $\left|n,{k}_{1}\right\rangle \left\langle n,{k}_{2}\right|$ we find:

Equation (15)

Computing the CJ fidelity (8) is hence straightforward for any pair of codewords $\left|{0}_{L}\right\rangle =\left|n,{k}_{1}\right\rangle ,\left|{1}_{L}\right\rangle =\left|n,{k}_{2}\right\rangle $ and for any number of losses:

Equation (16)

where

Equation (17)

and with $q^{\prime} =\max \left[0,(\max \left({k}_{1},{k}_{2}\right)-{n}_{f})\right]$ and $q^{\prime\prime} =\min \left[\left(n-{n}_{f}\right),\min \left({k}_{1},{k}_{2}\right)\right]$. In figure 6 one can see an illustrative analysis of the CJ fidelity for different codewords configurations. Two main conclusions can be extracted. On the one hand, one obtains a higher CJ fidelity when the codewords are close to each other in terms of number of excitations. Moreover, if both Dicke states are close to the limit of zero or maximal number of excitations, the CJ fidelity is again increased. Therefore, it turns out that the best choice of Dicke state codewords, if one is only interested on the robustness under losses, is $\left|{0}_{L}\right\rangle =\left|n,0\right\rangle ,\left|{1}_{L}\right\rangle =\left|n,1\right\rangle $, or the symmetric choice: $\left|{0}_{L}\right\rangle =\left|n,n\right\rangle ,\left|{1}_{L}\right\rangle =\left|n,n-1\right\rangle $.

Figure 6.

Figure 6. (a) CJ fidelity for one loss and for one codeword Dicke state fixed as a function of the other Dicke state (note scaling of Y axis). (b) CJ fidelity for given codewords as a function of the number of lost qubits. (c) CJ fidelity for the codewords $\left|{0}_{L}\right\rangle =\left|n,0\right\rangle $ fixed and different number of losses.

Standard image High-resolution image

However, we find that a conflict of interest exists if one requires other properties more than just robustness under losses. For instance, as shown above, the success probability of localizing information increases with the local entanglement.

3.3.4. Local entanglement

We analyze now the entanglement properties of the Dicke-type encoding. Consider a logical maximally entangled state of the form (9). We study the local entanglement that a physical particle shares with the rest of the system by computing the Von Neumann entropy (10) of its reduced density matrix. For the encoding codewords $\left|{0}_{L}\right\rangle =\left|n,{k}_{1}\right\rangle ,\left|{1}_{L}\right\rangle =\left|n,{k}_{2}\right\rangle $, and from the properties introduced before, it is easy to see that the entropy of entanglement of a single particle is:

Equation (18)

The entropy of entanglement is minimal (see figure 7) for encoding codewords which are, again, close to each other in terms of excitations and close to the boundaries with small or large (due symmetry) number of excitations. This result is consistent with the analysis of the robustness against losses, i.e. the less local entanglement, the more delocalized the information is and the more stability against losses.

Figure 7.

Figure 7. Local entropy of entanglement of a single particle (18) for different codewords configurations of Dicke states of n = 50 particles.

Standard image High-resolution image

An explanatory example is the extreme case with codewords $\left|{0}_{L}\right\rangle ={\left|0\right\rangle }^{\otimes n},\left|{1}_{L}\right\rangle ={\left|1\right\rangle }^{\otimes n}$, where the local entanglement is maximal and the stability is minimal, i.e. when a single particle is lost, the information and entanglement is completely destroyed.

3.3.5. Security analysis

Following section 3.1.5, we study the amount of information a single party can access once the quantum information has been delocalized over the network. The results are shown in figure 8. One finds again a relation with the local entanglement. We see that the entanglement is a key property that defines how the information is spread around the system, i.e. the less local entanglement, the more distributed. Hence, a single particle within a encoding configuration with low local entanglement has a low information about the global state of the logical system.

Figure 8.

Figure 8. Mutual information for one party and different Dicke state encoding configuration. Single points represents isolated fluctuations when the difference on the number of excitation between codewords is one.

Standard image High-resolution image

3.4. Correlation space encodings

In this section, we analyze the period wires (4) conceived as logical blocks, where the state of the correlation space defines the state of the logical qubit (see section 2.4).

3.4.1. Uploading

The general uploading procedure of section 3.1.1 is applicable for our wire configuration. In this case, a wire plays the role of the logical block, with codewords $\left|{0}_{L}\right\rangle ={\rm{\Phi }}\left(\left|0\right\rangle \right),\left|{1}_{L}\right\rangle ={\rm{\Phi }}\left(\left|1\right\rangle \right)$. Note that orthogonality of correlation space states does not always imply orthogonality of the corresponding wire states [51]. However, orthogonality is fulfilled for the period wires (4) we make use in this paper.

An alternative interpretation of uploading is possible [51], where any physical state is uploaded into the correlation space. We review this process in the appendix B.

3.4.2. Downloading

In contrast to the Dicke-type encoding, it is known how to localize information of the correlation space into some physical site of a wire [39]. This process does not imply the measurement of all the parties of the wire and we show that it can be made quasi deterministic. Based on the protocol developed in [39], we analyze how information is delocalized within the correlation space, and which properties influence this spreading of information.

We briefly review the downloading procedure of [39], and point out some additional features. Given a quantum wire of the form (4), one can always find a basis such that

Equation (19)

with ${r}_{0}\gt 0$, ${r}_{1}\geqslant 0$, ${r}_{0}^{2}+{r}_{1}^{2}=1$ and $\left\langle {\varphi }_{i}| {\varphi }_{j}\right\rangle ={\delta }_{{ij}}$. In particular, if ${r}_{1}=0$ the operators are of the form:

Equation (20)

with $\left|{\varphi }_{0}\right\rangle =\cos \tfrac{\theta }{2}\left|0\right\rangle +{{\rm{e}}}^{{\rm{i}}\alpha }\sin \tfrac{\theta }{2}\left|1\right\rangle $ and $\left|{\varphi }_{1}\right\rangle =\sin \tfrac{\theta }{2}\left|0\right\rangle -{{\rm{e}}}^{{\rm{i}}\alpha }\cos \tfrac{\theta }{2}\left|1\right\rangle .$ In fact, we show that if one can find a basis $\left\{{m}_{0},{m}_{1}\right\}$ such that matrices of the form (20) exists, the local entropy of entanglement of any particle of the wire is maximal for any θ (see appendix C). Therefore, we can relate the local entanglement of the wire with the probabilistic behavior of the localization process (see below).

Consider the case of a wire which admits a basis where the matrices are of the form (20). The wire is prepared in the state ${\rm{\Phi }}{\left(\left|\psi \right\rangle \right)}_{k}^{n}$ by appropriate measurements of the first k particles. As before, by expanding the $k+1$ site in the $\left\{\left|{m}_{0}\right\rangle ,\left|{m}_{1}\right\rangle \right\}$ basis and mapping the state of the correlation space into $\left\{\left|{\varphi }_{0}\right\rangle ,\left|{\varphi }_{1}\right\rangle \right\}\to \left\{\left|+\right\rangle ,\left|-\right\rangle \right\}$ by single measurements of the next physical qubits (from site $k+2$ to $k^{\prime} $), we end up with a state of the form: $\sum _{s=0,1}{Z}_{m}^{s}{\left|{\psi }_{m}\right\rangle }_{k+1}{\left|{m}_{s}\right\rangle }_{k^{\prime} +1}{\rm{\Phi }}{\left(\left|{\psi }_{s}\right\rangle \right)}_{k^{\prime} +2}^{n}$. In order to accomplish the mapping, around τ measurements are needed (up to by-products), where τ is the period factor of the wire. With a measure on the site $k^{\prime} +1$ one achieves the downloading of the state $\left|\psi \right\rangle $ at position $k+1$. For a more general wire configuration (19), a filter operation [39] is needed in order to recover orthogonality, leading to a probabilistic process for an a priori fixed site downloading.

In particular, we show that the success probability of localizing the information in the period wire (4) is directly related with its local entanglement. The period wires are defined by the matrices (4), and the parameter ϕ. As we discuss below (see section 3.4.4) ϕ determines the local entanglement of the wire. For this wire, there exists a basis $\left|{m}_{i}\right\rangle $ such that the MPS matrices are expressed in the form (19), with

Equation (21)

Following [39], one concludes that the success probability of an a-priori fixed site downloading is

Equation (22)

This shows that the probability depends exclusively on the entanglement factor, and the process is deterministic (p = 1) for a maximally entangled wire $(\phi =\pi )$. Henceforth, the entanglement of the wire is one crucial property that defines how the information is spread over the particles.

If we do not restrict ourselves to the case where the localization has to be achieved in a specidfic, pre-defined site, and we allow for open destination downloading, the success probability can be made arbitrarily close to 1 using larger wires. By repeating the filtering process l times, the success probability becomes $p=1-{\left|{r}_{1}\right|}^{l}$. This is an important difference between the Dicke-type encoding and the correlation space,since here there is no need of measuring all the qubits to localize information and, therefore, if the localization procedure fails, one can keep repeating it until succeeding. Besides, once the process succeeds, information is localized in a qubit that is detached from the unmeasured part of the wire. The remaining part of the wire remains functional and can still be used to store and process information.

3.4.3. Robustness under losses

In an encoding scenario, each wire plays the role of a logical qubit with codewords given by the states of the correlation space, typically $\left|{0}_{L}\right\rangle ={\rm{\Phi }}\left(\left|0\right\rangle \right),\left|{1}_{L}\right\rangle ={\rm{\Phi }}\left(\left|1\right\rangle \right)$.

Consider again an auxiliary qubit entangled with a wire in the state

Equation (23)

with $n\to \infty .$ Note this state can be obtained from a single wire and a Bell pair, by performing a Bell measurement between one qubit of the Bell state, and the first particle of the wire, measuring the next k particles to implement the rotation $\left\{A[{m}_{0}]\left|R\right\rangle ,A[{m}_{1}]\left|R\right\rangle \right\}\to \left\{\left|0\right\rangle ,\left|1\right\rangle \right\}$ in the correlation space.

We study the robustness of this wire encoding under loss of particles, for different configurations. For that purpose, we analyze again the CJ fidelity (8) with respect to the state (23) when several particles of the wire are lost (see figure 9). The CJ fidelity is computed following the steps specified in section 3.1.3. Similarly to the Dicke-type encoding, the stability of this encoding under loss of particles depends on the local entanglement of the wire, where smaller entanglement leads to higher robustness. This confirms the relation between the entanglement and the spreading of information that we showed above.

Figure 9.

Figure 9. CJ fidelity for different entanglement factors of the wire.

Standard image High-resolution image

3.4.4. Local entanglement

In analogy to section 3.3.4, we analyze the local entanglement of a single particle within a wire in the logical state $\left|{{\rm{\Phi }}}_{L}^{+}\right\rangle =\tfrac{1}{\sqrt{2}}\left(\left|{0}_{L}\right\rangle \left|{0}_{L}\right\rangle +\left|{1}_{L}\right\rangle \left|{1}_{L}\right\rangle \right)$, with $\left|{0}_{L}\right\rangle ={\rm{\Phi }}\left(\left|0\right\rangle \right),\left|{1}_{L}\right\rangle ={\rm{\Phi }}\left(\left|1\right\rangle \right)$(see figure 10). The parameter ϕ is the factor that determines the local entanglement of the wire, a result consistent with the studies of previous sections. Therefore, denoting ϕ as entanglement factor is justified. One can see the influence of the parameter ϕ on the local entanglement from the analysis of section 3.4.2. From equation (21), one can infer that the only case where MPS matrices (20) can be written in the form (19) is for $\phi =\pi $. In appendix C it is shown that if a basis exists such that the matrices can be expressed as in equation (19), the local entanglement of the wire is maximal (which is the case for ϕ = π). For other values of the entanglement parameter, MPS matrices are of the general form (20) and the local entanglement depends on ϕ in the way shown in figure 10. Note that the local entanglement of the wire can be made arbitrarily low.

Figure 10.

Figure 10. Entropy of entanglement as a function of the entanglement factor of the wire.

Standard image High-resolution image

3.4.5. Security analysis—correlation length

We now analyze the amount of information available for a single party within the wire. Figure 11 shows that the mutual information of a single party depends both on the entanglement and the period factors of the wire. In order to understand these results we need to discern how the information of the correlation space is distributed throughout all the particles. We evaluate is the correlation length of the wire, which characterize the length scale on which two-point correlations vanish. Therefore, the correlation length can be seen as a value that determines the distance over which information is spread in the wire, and we study the relation of ϕ and τ with it. The correlation length is defined as [48]:

Equation (24)

where $| {\lambda }_{1}| $ and $| {\lambda }_{2}| $ are the two largest eigenvalues of the transfer matrix ${E}_{{\mathbb{I}}}=\sum A[i]\otimes \overline{A[i]}$. Figure 12 shows the dependence of the correlation length with the period and the entanglement factor separately. It is clear that both parameters have an important influence on the distribution of the information over the wire. This can be seen from the downloading process studied in previous sections, when one aims to localize information deterministically. There we showed that the entanglement factor defines the success probability of the localization procedure. Moreover, in case one succeeds, a number of particles of the order of the period factor has to be measured in order to accomplish the localization.

Figure 11.

Figure 11. Mutual information of one party and different wire period factor (τ) configurations as a function of entanglement factor with n = 400.

Standard image High-resolution image
Figure 12.

Figure 12. Correlation length of the period wire as a function of the period factor and the entanglement factor.

Standard image High-resolution image

We conclude that both, the local entanglement and the period factor, are essential parameters that determine how the information of the correlation space is distributed through the qubits of the wire, and how many particles are needed to localize that information. This is hence related to the amount of information accessible for each party, as we show in our analysis (figure 11) i.e. the more distributed the information is, the less information a party can access. Besides, our analysis reveals that the position of the particle also matters. Particles close to the left boundary, where the state of the correlation space is defined (section 2.4), have a higher access to information than qubits sited away. The correlation length also determines how the amount of accessible information decreases with the distance to that left boundary.

4. Quantum networks of encoded resources

On can also build general entangled resource states that form a fully functional quantum network out of logical systems. To this aim, one considers an encoding $\{| {0}_{L}\rangle ,| {1}_{L}\rangle \}$ and a multipartite resource state that is built form these logical qubits. Each logical qubit is formed by a region, i.e. a set of different parties, and the overall network consists of multiple of these logical qubits or regions. For instance, one may consider a multipartite logical GHZ state $| {{\rm{GHZ}}}_{L}\rangle =| {0}_{L}{\rangle }^{\otimes n}+| {1}_{L}{\rangle }^{\otimes n}$, a logical 1D cluster state, or a general logical graph state network state [11]. Each logical qubit serves to store one quantum bit of information, which is—similarly as discussed above–distributed among the corresponding physical sites. One may then use such a resource to transport encoded quantum information, or to establish entanglement between logical qubits by measuring the other logical systems. For instance, one may generate from a logical GHZ state a logical Bell pair between any two logical qubits by measuring the remaining $(n-1)$ logical systems in the logical X-basis. A logical graph state can be manipulated by logical Z-measurements, which allows one to cut vertices from the graph, and by logical X or Y-measurements, which allows one to transport quantum information among 1D structures [12], thereby realizing a general, entanglement based quantum network. Depending on the choice of logical resource state, one can also achieve full functionality in the sense that any desired logical graph state can be be generated between regions [3, 11, 12, 21]. For instance, a fully connected decorated logical graph state or a logical 2D-cluster state allow one to do this between all logical qubits, or a subset of them.

Interestingly, these logical measurements can always be done in a fully local way, that is by measuring only the individual physical qubits. This is a consequence of the result of [40], that states that any two orthorgonal multiqubit states can be deterministically distinguished by LOCC. The same procedure allows one to actually perform an arbitary projective measurement in the logical subspace, by choosing the eigenstates of the observable as the two states to be distinguished. Notice that no direct generalization of this result to distinguish k orthogonal states exists (only a few special cases are known). Hence an extension of the protocol beyond logical qubits, i.e. to store and process logical d-level systems, cannot be directly obtained.

Notice that one may modify the scheme to distinguish between two orthorgonal states by LOCC to obtain a (probabilistic) download procedure. One selects the site to be downloaded as last qubit, and performs the LOCC protocol to distinguish between the two states as outlined in [40]. Only the last step, i.e. the measurement of the last particle which determines the final outcome, is not performed. This performs a map $| {0}_{L}\rangle \to | {\varphi }_{0}\rangle $, $| {1}_{L}\rangle \to | {\varphi }_{1}\rangle $, where $\{| {\varphi }_{k}\rangle \}$ are orthogonal, but the states are not normalized. That is, the weights between the resulting states may change, depending on the branch of the LOCC protocol. This change of weights is in principle known, but needs to be undone to realize a full download of quantum information to physical sites. The final step corresponds to a filtering operation, which only succeeds probabilistically.

5. Correlation space resources as a quantum network

In this section we consider an alternative interpretation of the correlation space of the quantum wires introduced before. Here, we understand a quantum wire as a building block for a communication network, where each particle represents one node of the network. We analyze the properties of the wires when one demands processing of information (transport) and communication between nodes (or regions) under request by only local operations, by exploiting the knowledge of the quantum wire of the previous sections.

5.1. Period wire as a 1D quantum network

Consider again the period quantum wire Φ of the form (3) with $G=\exp \left({\rm{i}}\pi X/\tau \right)$ and $T={\rm{diag}}\left({{\rm{e}}}^{\tfrac{-{\rm{i}}\phi }{2}},{{\rm{e}}}^{\tfrac{{\rm{i}}\phi }{2}}\right)$, where τ and ϕ are the period and the entanglement factor respectively. The correlation space is prepared in some state $\left|\varphi \right\rangle $, i.e. ${\rm{\Phi }}{\left(\left|\varphi \right\rangle \right)}_{1}^{n}$. In order to transport the information along the wire, one just needs to perform X measurements on the physical qubits. The X measurement implies the application of the G operator in the correlation space (up to by-products), such that the state is rotated periodically throughout the virtual positions. The information shows up completely only every τ positions during transport. We analyze the influence of errors during the transport by studying a processing-downloading process.

5.1.1. Errors during transport

Consider an initial Bell state and a period quantum wire. A generalized Bell measurement is performed between the second qubit of the Bell pair and the first one of the wire. After by-product corrections (assuming successful uploading), the remaining state is of the form:

Equation (25)

We transport the state two periods (2τpositions) in the wire before starting a localization process. In the ideal case (no error), the state of the correlation space ${\rm{\Phi }}\left(\left|i\right\rangle \right)$ is first mapped into itself by the transport. Assuming the localization process is successful (otherwise it could be repeated until succeeding), the remaining state is again a Bell pair between the first qubit of the initial Bell state (aux) and the qubit of the wire where downloading succeeds, decoupled from the rest of the wire. In order to examine the stability of the wire under errors in the transport, we study the fidelity of this final state in case some error (or loss) occurs during the transport with respect to the ideal case (Bell pair obtained), with a similar spirit as for the CJ fidelity (8).

When an error affects a physical particle, the corresponding error on its matrix operator of the correlation space is in general non-trivial. For instance, for a maximally entangled period wire with ϕ = π, if a Pauli error affect any particle, the effect on the correlation space is (see appendix D for proof):

Equation (26)

Note that, when one transports information by measuring on the X basis, a X error in the measured qubit has no influence on the correlation space state.

For other entanglement configuration of the wire, these relations between the physical errors and they correspondence in the correlation space become cumbersome. However, if the qubit where any CPTP error occurs is measured in any basis (which is the case we typically come up against), it is known [56] which is the effect on the correlation space.

Consider now, for instance, a Pauli Z error affecting the kth particle of the wire with probability one during a transport process. The state ${\rm{\Phi }}\left(\left|i\right\rangle \right)$ for $i=\left\{0,1\right\}$ is now mapped into some state ${\rm{\Phi }}\left(\left|{\chi }_{i}\right\rangle \right)$ after the transport. Assume also that the subsequent downloading process is successful. If the local entanglement of the wire is maximal, i.e. T = Z, the error shows up completely in the end, i.e. the final state is the Bell state $\left|{{\rm{\Phi }}}^{-}\right\rangle =\tfrac{1}{\sqrt{2}}\left(\left|00\right\rangle -\left|11\right\rangle \right)$. However, if one reduces the local entanglement of the wire (the parameter ϕ) , the error appears diluted at the end of the process. For instance, for $\phi =\tfrac{\pi }{3}$, the final state expressed in the Bell basis is: $\tfrac{\sqrt{3}}{2}\left|{{\rm{\Phi }}}^{+}\right\rangle +\tfrac{1}{2}\left|{{\rm{\Phi }}}^{-}\right\rangle $. Figure 13 shows the fidelity of the final state $\left|\varphi \right\rangle $ after the transport-localization process with some Z error affecting one particle in the transport, i.e. $F={\left|\left\langle \varphi \left|{{\rm{\Phi }}}^{+}\right\rangle \right.\right|}^{2}$, for different entanglement parameters. The remarkable result is that this fidelity does not depend on the position where the error happens or the period parameter of the wire. Therefore, the stability of the wire depends exclusively on the entanglement, as one can conclude due to the strong similarity between figures 13 and 10.

Figure 13.

Figure 13. Fidelity of the downloaded state with a Z error occurring in the transport, as a function of the local entanglement of the wire.

Standard image High-resolution image

The price to pay for the protection against errors is a lower success probability of delocalizing and localizing information. However, when considering arbitrarily large wires, these processes can be made quasi-deterministic with open destination targets. One can always choose regions such that localization within this region has an arbitrary high probability of success. The size of this regions depends entirely on the local entanglement of the wire. Notice that for a given success propability p for the downloading process, the required number of repetitions to succeed with a probability $1-\epsilon $ is given by $n=\mathrm{log}(\epsilon )/\mathrm{log}(1-p)$.

5.1.2. Losses during transport

The worst case of the previous scenario occurs when the particles are lost. We consider the overall process of uploading–processing–downloading, where we assume that one or more particles are lost (and hence traced out) during the transport. We study again the fidelity with respect to the ideal Bell state. Note that tracing out a particle is equivalent to averaging over the possible outcomes of a measurement in a given basis. By observation, one can easily check that, in our case, this map is analogous to a phase-flip channel $(\sigma \to q\sigma +(1-q)Z\sigma Z)$ with probability $q=\tfrac{1}{2}$ at the physical level. The Kraus decomposition of this map can be obtained by first expressing the final state in the Bell basis followed by a subsequent diagonalization

Equation (27)

where the Kraus operators Ki are identified from: ${K}_{i}\left|{\psi }_{00}\right\rangle =\sqrt{{m}_{i}}\left|{m}_{i}\right\rangle $. For the case of one lost particle, this is always a rank-2 channel, independently of the position of the lost qubit.

A remarkable effect is observed when more than one qubit is lost. We find a fidelity dependence with the relative position of the lost particles (see figure 14). The effect of the relative position of the particles is strongly related with the period factor τ of the wire. Given two losses, if the distance between them corresponds with one period τ, the fidelity is minimal. However, the fidelity is maximized when the relative distance coincides with half of a period $\tfrac{\tau }{2}$. In a more general scenario, with m lost qubits, one has to consider the $\left(\begin{array}{c}n\\ m\end{array}\right)$ relative distances of every pair of lost particles. The fidelity is maximal (minimal) when the maximal possible number of relative distances is equal to $\tfrac{\tau }{2}\left(\tau \right)$. We conjecture that this effect is due to the non-vanishing two-point correlation functions.

Figure 14.

Figure 14. Dependence of the fidelity with the last lost particle. Bold line corresponds to one single loss. Dashed–dotted line represents two losses and the dependence with the second, where the first lost particles is fixed at site 1. Dashed line illustrates the case of three losses and the dependence with the third, where the first two lost particles are fixed in positions 1 and 2.

Standard image High-resolution image

5.2. Period wire as building block for general networks

In this section we consider period wires as building blocks for general communication resources. We show that resource states for a fully functional communication network with arbitrary topology can be constructed by merging elementary wires in a suitable way. This then enables entanglement routing among the network. We start by listing the required functionality. One can consider a wire as a resource where quantum information can be uploaded, transported among the wire, and then downloaded at a chosen position. Similarly, one may also use such a wire to establish entanglement between two chosen sites. This corresponds to a double-downloading process as detailed below.

In turn, a network is given by multiple parties that are connected by wires. One may then upload information from a given site, download it to a chosen site as well as transport information among wires. Since in a general network a single node can be connected to several neighbours, one requires that the transport direction from a given node can be freely chosen. This includes the possibility to merge and cut wires, where the merging is only needed to establish resources [11, 12]. Here we mainly consider point-to-point communication, i.e. using the network in such a way that information is transported from A to B. One may also establish entanglement between the two chosen sites. We also show how certain graph states, including GHZ states, can be obtained in the network.

We show in the following how all elementary building blocks and required processes can be realized with correlation space resources.

It was shown in [51] how to upload some arbitrary state (placed in the zeroth site) into the correlation space by LOCC and local measurements. With analogous techniques used in [51] (see appendix), it is straightforward to see that a state can be uploaded from any node of the wire, by choosing the direction of uploading within the wire. This involves cutting the wire in the opposite direction. The uploaded state can be subsequently transported to other regions in a protected way, and localized in another node.

5.2.1. Cutting of resources

It is possible to cut a chain from an arbitrary site of the wire in any direction, by using similar techniques than for localization (section 3.4.2). For simplicity, consider a wire with maximal local entanglement:

Equation (28)

Taking property (20) into account, one can expand the kth site in its basis, i.e.

Equation (29)

By appropriate measurements of the next q sites, one can perform the transformation $\left\{\left|{\varphi }_{0}\right\rangle ,\left|{\varphi }_{1}\right\rangle \to \left|+\right\rangle ,\left|-\right\rangle \right\}$ in the correlation space. Expanding the site $r=k+q+1$ in its basis:

Equation (30)

Finally, by measuring site r and selecting the outcome ${\left|{m}_{0}\right\rangle }_{r}$

Equation (31)

one succeeds in cutting the chain into two wires, both preserving their functionality, but separately. Note that the information of the initial wire remains completely in the right one. In case the entanglement is not maximal, one cannot select the position where the cutting is accomplished, but it eventually succeeds, similar as in the downloading process.

5.2.2. Double localization of information

Given a network constructed from period wires (see below), it is important to be able to connect particles upon request, i.e. to establish entanglement between two (or more) parties. Consider again a maximally entangled wire, i.e. $\phi =\pi $. Given two, previously fixed, qubits of the wire, denoted as k1 and k2,

Equation (32)

one can create a direct communication link between them by applying a double localization process (figure 15). This is achieved by measuring the particles toward the exterior direction in each case, mapping ${\left|{\varphi }_{i}\right\rangle }_{{k}_{1}}\to \left|{i}_{+}\right\rangle $ to the left, and ${\left|j\right\rangle }_{{k}_{2}}\to \tfrac{1}{\sqrt{2}}\left(\left|{\varphi }_{0}\right\rangle +{\left(-1\right)}^{j}\left|{\varphi }_{1}\right\rangle \right)$ to the right. If there are $\tau -1$ particles between the two qubits, and we measure the $\tau -1$ particles in the X basis, where τ is the period factor of the wire, a Bell pair is obtained between the selected qubits and the state is decoupled from the rest of the wire in both directions (see figure 15). In case the local entanglement of the wire is not maximal, this process becomes probabilistic and target sites cannot be fixed previously.

Figure 15.

Figure 15. Localization of a Bell pair within a wire. Information is localized in two sites by processing a procedure similar to downloading along the external directions from both qubits.

Standard image High-resolution image

Note that this process has two inconveniences. First, not any pair of particles can be chosen, since one is restricted to the property of leaving one period between them. Secondly, in case that we obtain unwanted outcomes (by-products) in the measurement of the intermediate nodes, the final state is not a perfect Bell pair.

Nevertheless, both problems can be solved by considering compensation stations placed in different positions of the network. This stations are simply constructed with a certain number of auxiliary wires of limited length. These auxiliary wires are coupled with the main wires in order to process information until period restrictions and measurement by-products are fixed. In a sense, these boxes serve to extend the distance between two sites to a full period. All possibilities are present, and one only needs to cut all wires except the one with the proper length. Notice that the length of the wire can be properly chosen such that cutting and correcting suitable byproducts is possible.

5.2.3. Merging of resources

We conceive the 1D quantum wires as fundamental building blocks. In order to construct more complex structures, one has to be able to couple wires in order to route the information or create direct links between any constituents.

For simplicity, we restrict ourselves to the case of maximally entangled wires. However, these processes are valid also for lower entangled wires, by applying appropriate filtering operations and taking into account the impossibility of a priori fixed destination. We start by showing that two 1D wires can be coupled in the boundary qubits to merge them into a larger wire. Given two wires initialized in the $\left|+\right\rangle $ state,

Equation (33)

we perform the operation $P=\left|0\right\rangle \left\langle {m}_{0}0\right|+\left|1\right\rangle \left\langle {m}_{1}1\right|$ between the last qubit of the left chain and the first qubit of the right one, merging them into an intermediate node r. The basis $\left\{{m}_{0},{m}_{1}\right\}$ corresponds to the one where operators are expressed as equation (20). Note that for the wires we use this basis coincides with the computational basis. Therefore, one obtains

Equation (34)

and the merging successes (see figure 16(a)).

Figure 16.

Figure 16. (a) Two wires can be merged in their boundaries to create a larger wire. More wires can be merged in their boundaries to distill multipartite entangled states with one particle of each wire. (b) Wires can be also merged in any middle point to localize n-party entangled states. (c) By merging wires in any middle point, one can re-direct the transport of information of the correlation space along any other direction of the merged wires.

Standard image High-resolution image

More than two wires can be coupled. One can consider, for instance, three wires where a projection $P=\left|0\right\rangle \left\langle 000\right|+\left|1\right\rangle \left\langle 111\right|$ is performed on their extremities (first site of each), i.e.

Equation (35)

If now the states of the correlation space are all mapped $\left|{\varphi }_{i}\right\rangle \to \left|i\right\rangle $ by suitable local measurements and one expands the next site (denoted as q):

Equation (36)

If now localization on each wire is performed (see previous section), by mapping the correlation state to $\left|\pm \right\rangle $ and measuring the following site in the computational basis, a 4-party GHZ state $\sum {\left|{jjj}\right\rangle }_{{qq}^{\prime} q^{\prime\prime} }{\left|j\right\rangle }_{r}$ is obtained. By measuring the r qubit in the X basis, a GHZ of three qubits (one of each wire) is found and decoupled from the rest of the wires (figure 16(b)). Note that the remaining wires are still functional. Note also that by constructing router stations with auxiliary wires, any particle can be chosen on demand to be part of this GHZ state. This process can be expanded for an arbitrary large number of wires, therefore generating n-party GHZ states.

With analogous techniques, one can prove that two wires can be coupled in any middle point of them, such that a four-party GHZ state can be obtained by downloading information in the four diverging directions (see figure 16(b)). Given this merging configuration, one can easily check that a cutting can be performed in any of the directions, such that one can transport information through the remaining chain leafs (see figure 16(c)). That is, a network with a given structure (intersecting wires), one can either generate GHZ states between parties next to an intersection vertex, or use any of the intersecting vertices to route information. To this aim all but an incoming and outgoing wire are cut.

We emphasize that the merging of wires is a not process that takes place when processing information in the network. This should rather be understood as a tool that describes the required resource states in such an entanglement based network, and how they can (in principle) be generated from individual wire states.

5.2.4. Fully functional communication network

Given the quantum period wires and the tools studied above, it is possible to construct a networks with arbitrary topology where information can be transport through in a protected way, and where direct communication links between any two (or more) particles can be established. These is accomplished by merging 1D wires and including compensation stations between regions as described above (see figure 17).

Figure 17.

Figure 17. Construction example of a fully functional communication network based on period wires. Information can be protected during transport and direct links (multipartite states) can be obtained between constituents of any region with the help of the auxiliary wires in the compensation stations.

Standard image High-resolution image

6. Summary and conclusions

We have studied two different approaches for encoding and storage of quantum information in a distributed way. On the one hand, Dicke-type encodings (section 3.3) rely on an experimentally attainable class of states (Dicke states), where different orthogonal pairs of states can be selected exhibiting different properties. The measurement of all the parties is necessary to localize information, and the entanglement determines the success probability of this process. A conflict of interest exists when aiming to store information with stability under errors (or losses) and still having a high success probability to localize information.

On the other hand, we have analyzed the properties of the correlation space resource states, in particular of period wires (section 3.4) for storage of quantum information. We have seen how information is distributed over the wire. These wires are basically defined by two tunable parameters that define its entanglement and the correlation length. Therefore, localization of information (with LOCC) can be made quasi-deterministic by allowing for open-site destination, without compromising stability under errors or losses. Once the downloading succeeds, the qubit with the localized information is detached from the unmeasured wire, which remains functional. Thereby the probability of success for the download process depends on the entanglement factor, while the required number of particles to be measured to accomplish localization depends on the correlation length.

Moreover, we have shown that one can construct a fully functional communication network. This is either based on considering multipartite resource states that are comprised of logical qubits. In this case, information is distributed over regions that form the logical qubits, but can be processed and routed among the network solely by local operations on the individual sites.

Our second approach consists in using period wires as building blocks. We show how to cut and merge wires, and we also discuss how to upload, transport and localize information within the wires. By suitably coupling wires beforehand to form suitable resource states and by establishing compensation stations to compensate by-products, a 2D network can be built such that direct communication links can be obtained between any group of constituents from different regions of the network. This is done in such a way that information is distributed throughout the correlation space network in a diluted way, such that it is protected from errors or even loss of particles. In addition, information processing takes place solely by measuring individual (physical) qubits. Entanglement and correlations of the wire determine how the information is distributed. The more spread the information is, the more protected it is. However, when information is widely distributed through the network, localization and cutting processes becomes probabilistic, and sometimes the target nodes cannot be fixed a priori. Therefore, we consider these networks particularly useful for communication between regions (instead of single nodes) with a high robustness under errors or attacks.

With our approach, we have shown an alternative view on quantum networks. The essential element is that information is stored in a distributed (or holographic) way within parts or the whole network, thereby protecting it against errors and losses while keeping the processing of information simple, i.e. using only measurements on individual sites. It would be interesting to extend our approach to the storage of multiple qubits in the network in a delocalized way. While it is straightforward to consider generalizations of the resources to store higher dimensional systems or multiple qubits, it is not clear if and how uploading, downloading and information processing can be achieved using only local operations on individual sites.

Acknowledgments

This work was supported by the Austrian Science Fund (FWF) through project P30937-N27. W.D. also acknowledges support by the Erwin Schrödinger International Institute for Mathematics and Physics (ESI), where part of this work was completed.

Appendix A.: Concatenated encoding codewords

Alternative extensions of Dicke-type encodings can be explored. For instance, one can consider the concatenation of two Dicke states, with a similar spirit of the concatenated-GHZ [57]. By taking $\left|\tilde{0}\right\rangle =\left|n,{k}_{1}\right\rangle ,\left|\tilde{1}\right\rangle =\left|n,{k}_{2}\right\rangle $, one can define the following codewords:

Equation (A1)

where the particles are organized in N groups of m particles each. Without going into details, our results indicate that this concatenated-Dicke states can be a suitable intermediate choice for storing information. Given two Dicke states codewords $\left|\tilde{0}\right\rangle ,\left|\tilde{1}\right\rangle $, direct encoding brings certain values for the robustness and local entanglement (see previous sections). However, if one considers their concatenated form (A1), the robustness is in general decreased and the local entanglement is increased to some extent. This is due to the "block" structure, which gives some extra structure in terms of local entanglement. This compromises however the robustness under losses, as the effect of a loss depends on the size of the corresponding block. One loss has more impact in its block—and therefore on the whole states—if the size of the block is smaller. These tunable properties, together with the block structure of the concatenated encoding, can be useful for some purposes.

Appendix B.: Uploading of information in correlation space

It was shown in [51] how to upload some state into the correlation space by LOCC. Given an arbitrary state ${\left|\psi \right\rangle }_{0}={\lambda }_{0}\left|0\right\rangle +{\lambda }_{1}\left|1\right\rangle $ (placed in the zeroth site) that we want to upload to the correlation space, and given a wire ${\rm{\Phi }}{\left(\left|L\right\rangle \right)}_{1}^{n}$, one can write the initial state in terms of some orthogonal basis $\left\{\left|{m}_{s}\right\rangle \right\}$ at site 1:

Equation (B1)

A generalized Bell measurement is subsequently applied to complete the uploading, i.e. by projecting onto ${\left|{B}_{1}\right\rangle }_{10}={\sum }_{j}{\left|{m}_{j}\right\rangle }_{1}\otimes {\left|j\right\rangle }_{0}$ the remaining state of the wire is ${\sum }_{j}{\rm{\Phi }}{\left({\lambda }_{j}A\left[{m}_{j}\right]\left|L\right\rangle \right)}_{2}^{n}$. Finally, by adequate local measurements on the next physical sites, one can implement the basis change $\left\{A\left[{m}_{s}\right]\left|L\right\rangle \right\}\to \left\{\left|s\right\rangle \right\}$ in the correlation space and the upload is successful. However, this process is not always successful. In case the states $A\left[{m}_{0}\right]\left|L\right\rangle $ and $A\left[{m}_{1}\right]\left|L\right\rangle $ are not orthogonal, one would need some probabilistic filtering operation (in analogy to section 3.4.2).

Appendix C.: Maximally entangled wire

We show that, given a quantum wire with period τ for which one can find a basis $\left\{{m}_{i}\right\}$ where $A[{m}_{0}]=\left|{\varphi }_{0}\right\rangle \left\langle 0\right|,A[{m}_{1}]=\left|{\varphi }_{1}\right\rangle \left\langle 1\right|$, the local entanglement of any particle is maximal. We consider a general case where $\left|{\varphi }_{0}\right\rangle =\cos \theta \left|0\right\rangle +\sin \theta \left|1\right\rangle $ and $\left|{\varphi }_{1}\right\rangle =\sin \theta \left|0\right\rangle -\cos \theta \left|1\right\rangle $, for any θ. In the period wires we use, the basis $\left\{{m}_{i}\right\}$ coincides with the computational basis. Consider now a wire in the state:

Equation (C1)

One can compute the reduced density operator of an arbitrary particle q, by first constructing the corresponding matrix product operator (MPO) [58, 59]

with ${D}^{2}\otimes {D}^{2}$ operators $M\left[{s}_{i},{s}_{i}^{{\prime} }\right]={\sum }_{s,s^{\prime} }A\left[{s}_{i}\right]\otimes \overline{A\left[{s}_{i}^{{\prime} }\right]}$, and subsequently tracing out the rest of particles. Note that tracing out is equivalent to contracting indices si and ${s}_{i}^{{\prime} }$ in every site M (see figure C1). One can compute each element $\left({s}_{q},{s}_{q}^{{\prime} }\right)$ of the reduced density matrix of site q by contracting the expression from right and left, i.e.

where $M\left[{s}_{q-1}\right]$ and $M\left[{s}_{q+1}\right]$ are tensors of dimension $1\otimes {D}^{2}$ and ${D}^{2}\otimes 1$ respectively. One can easily check that, from the right contracted boundary vector $\left(1\ 0\ 0\ 1\right)$, any new $1\otimes {D}^{2}$ vector carried to the left is again ${E}_{i}=\left({\sin }^{2}\theta +{\cos }^{2}\theta \ 0\ 0\ {\sin }^{2}\theta +{\cos }^{2}\theta \right)=\left(1\ 0\ 0\ 1\right),$ where Ei is the intermediate transfer operator at position i. With these techniques, it is straightforward to see that the reduced density operator of the qubit q (enough far away from boundaries) is equal to the identity, independent of the value of θ and the state of the correlation space, therefore proving that the entropy of entanglement of the wire is maximal at a local level, if a basis exists such that $A[{m}_{0}]=\left|{\varphi }_{0}\right\rangle \left\langle 0\right|,A[{m}_{1}]=\left|{\varphi }_{1}\right\rangle \left\langle 1\right|.$

Figure C1.

Figure C1. (a) Matrix product operator. (b) Reduced density operator of a particle q, which is obtained by tracing out (contracting both physical inidices of each site) the rest of qubits. MPO.

Standard image High-resolution image

Appendix D.: Errors in the correlation space

Given a maximally entangled period wire with $\phi =\pi $ and period τ, one can find a basis $\left\{{m}_{i}\right\}$ where the correlation space matrices can be expressed (20) as $A[{m}_{0}]=\left|{\varphi }_{0}\right\rangle \left\langle 0\right|,A[{m}_{1}]=\left|{\varphi }_{1}\right\rangle \left\langle 1\right|.$ Noting that $\langle {\rm{i}}| {\varphi }_{j}\rangle =\tfrac{1}{2}({{\rm{e}}}^{w}+{(-1)}^{i\oplus j}{{\rm{e}}}^{-w})$ with $w=\tfrac{{\rm{i}}\pi }{k}$, one can represent the wire state as:

Equation (D1)

If a Pauli X error affects now the q qubit, $X\left|{s}_{q}\right\rangle =\left|{s}_{q}\oplus 1\right\rangle $. Therefore, by relabelling in the equation (D1), the state after the error is

Equation (D2)

It is easy to check that the effect on the correlation space is equivalent to the map ${A}^{q}\left[{m}_{i}\right]\to {{XA}}^{q}[{m}_{i}]X={\left|{\varphi }_{i\oplus 1}\right\rangle }_{q}\left\langle i\oplus 1\right|,$ on the virtual operator corresponding to the particle q. Equivalently, if a Pauli Z error applies to qubit q, i.e. $Z\left|{s}_{q}\right\rangle ={\left(-1\right)}^{q}\left|{s}_{q}\right\rangle $, can be directly seen from the form of matrices $A[{m}_{0}]$ and $A[{m}_{1}]$, that the translation of this error into the correlation space operator is ${A}^{q}\left[{m}_{i}\right]\to {A}^{q}[{m}_{i}]Z$.

For Pauli Y error, one just need to combine the previous cases to find expression (26).

Footnotes

  • Throughout this article, we use party, node and site synonymously to refer to a single network node that is located at and operated by a specific party.

Please wait… references are loading.
10.1088/1367-2630/ab784d