منابع مشابه
A Minimax Converse for Quantum Channel Coding
We prove a one-shot “minimax” converse bound for quantum channel coding assisted by positive partial transpose channels between sender and receiver. The bound is similar in spirit to the converse by Polyanskiy, Poor, and Verdú [IEEE Trans. Info. Theory 56, 2307–2359 (2010)] for classical channel coding, and also enjoys the saddle point property enabling the order of optimizations to be intercha...
متن کاملJoint source-channel coding for a quantum multiple access channel
Suppose that two senders each obtain one share of the output of a classical, bivariate, correlated information source. They would like to transmit the correlated source to a receiver using a quantum multiple access channel. In prior work, Cover, El Gamal, and Salehi provided a combined sourcechannel coding strategy for a classical multiple access channel which outperforms the simpler “separatio...
متن کاملGallager Bound of Classical-Quantum Channel Coding
Gallager bound is known as the minimum upper bound of average error probability of classical channel coding[5]. Burnashev and Holevo[8] derived its quantum version in the pure states case, and proposed its quantum version in the mixed states case. The attainability of their quantum version has been an open problem, We prove that the bound proposed by them can be attained by a POVM proposed by H...
متن کاملUniversal coding for classical-quantum channel
We construct a universal code for stationary and memoryless classicalquantum channel as a quantum version of the universal coding by Csiszár and Körner. Our code is constructed by the combination of irreducible representation, the decoder introduced through quantum information spectrum, and the packing lemma.
متن کاملRevisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding
Recently Xia and Song [Phys. Lett. A (In press)] have proposed a controlled quantum secure direct communication (CQSDC) protocol. They claimed that in their protocol only with the help of the controller Charlie, the receiver Alice can successfully extract the secret message from the sender Bob. In this letter, first we will show that within their protocol the controller Charlie’s role can be ex...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Journal on Selected Areas in Communications
سال: 2020
ISSN: 0733-8716,1558-0008
DOI: 10.1109/jsac.2020.2969034