2006
DOI: 10.1103/physreva.73.042316
|View full text |Cite
|
Sign up to set email alerts
|

Hashing protocol for distilling multipartite Calderbank-Shor-Steane states

Abstract: We present a hashing protocol for distilling multipartite CSS states by means of local Clifford operations, Pauli measurements and classical communication. It is shown that this hashing protocol outperforms previous versions by exploiting information theory to a full extent an not only applying CNOTs as local Clifford operations. Using the information-theoretical notion of a strongly typical set, we calculate the asymptotic yield of the protocol as the solution of a linear programming problem.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(19 citation statements)
references
References 19 publications
(48 reference statements)
0
19
0
Order By: Relevance
“…Observe that noise due to transmission decrease the fidelity of network states relative to pure GHZ states. In order to deal with this channel noise we employ entanglement distillation protocols for two colorable graph states to generate high fidelity network states [20,39,[67][68][69][70][71][72][73][74]. Recall that the requested graph state is generated by connecting GHZ states (which are two colorable) via the connecting procedures of section 2.2.1 which the network devices apply.…”
Section: Security Considerations-trusted Networkmentioning
confidence: 99%
“…Observe that noise due to transmission decrease the fidelity of network states relative to pure GHZ states. In order to deal with this channel noise we employ entanglement distillation protocols for two colorable graph states to generate high fidelity network states [20,39,[67][68][69][70][71][72][73][74]. Recall that the requested graph state is generated by connecting GHZ states (which are two colorable) via the connecting procedures of section 2.2.1 which the network devices apply.…”
Section: Security Considerations-trusted Networkmentioning
confidence: 99%
“…Quantum hashing protocols [25,26,35,[41][42][43][44][45] are a type of entanglement purification protocol. They are based on the quantum analogon of the noiseless coding theorem [46,47] and rely on the fact that it is exponentially likely that the input states are in a so-called likely subspace.…”
Section: F Multipartite Quantum Hashing Protocolmentioning
confidence: 99%
“…Distillation is better understood in the bipartite case [23][24][25][26] than in the multipartite case [27][28][29][30][31][32][33][34][35]. In the bipartite case, it is even known that some protocols achieve an optimal trade-off between rate and fidelity [36].…”
Section: Introductionmentioning
confidence: 99%