No Arabic abstract
The purpose of fingerprinting is to compare long messages with low communication complexity. Compared with its classical version, the quantum fingerprinting can realize exponential reduction in communication complexity. Recently, the multi-party quantum fingerprinting is studied on whether the messages from many parties are the same. However, sometimes it is not enough just to know whether these messages are the same, we usually need to know the relationship among them. We provide a general model of quantum fingerprinting network, defining the relationship function $f^R$ and giving the corresponding decision rules. In this work, we take the four-party quantum fingerprinting protocol as an example for detailed analysis. We also choose the optimal parameters to minimize communication complexity in the case of asymmetric channels. Furthermore, we compare the multi-party quantum fingerprinting with the protocol based on the two-party quantum fingerprinting and find that the multi-party protocol has obvious advantages, especially in terms of communication time. Finally, the method of encoding more than one bit on each coherent state is used to further improve the performance of the protocol.
Inspired by classical (actual) Quantum Theory over $mathbb{C}$ and Modal Quantum Theory (MQT), which is a model of Quantum Theory over certain finite fields, we introduce General Quantum Theory as a Quantum Theory -- in the K{o}benhavn interpretation -- over general division rings with involution, in which the inner product is a $(sigma,1)$-Hermitian form $varphi$. This unites all known such approaches in one and the same theory, and we show that many of the known results such as no-cloning, no-deleting, quantum teleportation and super-dense quantum coding, which are known in classical Quantum Theory over $mathbb{C}$ and in some MQTs, hold for any General Quantum Theory. On the other hand, in many General Quantum Theories, a geometrical object which we call quantum kernel arises, which is invariant under the unitary group $mathbf{U}(V,varphi)$, and which carries the geometry of a so-called polar space. We use this object to construct new quantum (teleportation) coding schemes, which mix quantum theory with the geometry of the quantum kernel (and the action of the unitary group). We also show that in characteristic $0$, every General Quantum Theory over an algebraically closed field behaves like classical Quantum Theory over $mathbb{C}$ at many levels, and that all such theories share one model, which we pin down as the minimal model, which is countable and defined over $overline{mathbb{Q}}$. Moreover, to make the analogy with classical Quantum Theory even more striking, we show that Borns rule holds in any such theory. So all such theories are not modal at all. Finally, we obtain an extension theory for General Quantum Theories in characteristic $0$ which allows one to extend any such theory over algebraically closed fields (such as classical complex Quantum Theory) to larger theories in which a quantum kernel is present.
Classical fingerprinting associates with each string a shorter string (its fingerprint), such that, with high probability, any two distinct strings can be distinguished by comparing their fingerprints alone. The fingerprints can be exponentially smaller than the original strings if the parties preparing the fingerprints share a random key, but not if they only have access to uncorrelated random sources. In this paper we show that fingerprints consisting of quantum information can be made exponentially smaller than the original strings without any correlations or entanglement between the parties: we give a scheme where the quantum fingerprints are exponentially shorter than the original strings and we give a test that distinguishes any two unknown quantum fingerprints with high probability. Our scheme implies an exponential quantum/classical gap for the equality problem in the simultaneous message passing model of communication complexity. We optimize several aspects of our scheme.
We study properties of quantum strategies, which are complete specifications of a given partys actions in any multiple-round interaction involving the exchange of quantum information with one or more other parties. In particular, we focus on a representation of quantum strategies that generalizes the Choi-Jamio{l}kowski representation of quantum operations. This new representation associates with each strategy a positive semidefinite operator acting only on the tensor product of its input and output spaces. Various facts about such representations are established, and two applications are discussed: the first is a new and conceptually simple proof of Kitaevs lower bound for strong coin-flipping, and the second is a proof of the exact characterization QRG = EXP of the class of problems having quantum refereed games.
We analyze and demonstrate the feasibility and superiority of linear optical single-qubit fingerprinting over its classical counterpart. For one-qubit fingerprinting of two-bit messages, we prepare `tetrahedral qubit states experimentally and show that they meet the requirements for quantum fingerprinting to exceed the classical capability. We prove that shared entanglement permits 100% reliable quantum fingerprinting, which will outperform classical fingerprinting even with arbitrary amounts of shared randomness.
We present a quantum fingerprinting protocol relying on two-photon interference which does not require a shared phase reference between the parties preparing optical signals carrying data fingerprints. We show that the scaling of the protocol, in terms of transmittable classical information, is analogous to the recently proposed and demonstrated scheme based on coherent pulses and first-order interference, offering comparable advantage over classical fingerprinting protocols without access to shared prior randomness. We analyze the protocol taking into account non-Poissonian photon statistics of optical signals and a variety of imperfections, such as transmission losses, dark counts, and residual distinguishability. The impact of these effects on the protocol performance is quantified with the help of Chernoff information.