Information-entropy trade-off for random vectors
نویسندگان
چکیده
The results here are based on formulae in the two appendices in R. Schack, C. M. Caves, and G. M. D’Ariano, “Hypersensitivity to perburbation in the quantum kicked top,” Phys. Rev. E 50, 972–987 (1994). The relevant equations in the two appendices are (A18) and (B5)–(B6). A preliminary version of the analysis here can be found at the end of Sec. V of R. Schack and C. M. Caves, “Information-theoretic characterization of quantum chaos,” Phys. Rev. E 53, 3257–3270 (1996). This analysis was further elaborated to essentially the present form in A. N. Soklakov and R. Schack, “Preparation information and optimal decompositions for mixed quantum states,” J. Mod. Opt. 47, 2265–2276 (2000). Consider N vectors randomly distributed in a D-dimensional Hilbert space, where we assume that N ≥ D. Given an entropy H ≤ log D, we want to group the vectors into groups that on average have this entropy and then ask how much information I is required to specify a group. The relation between I and H is the information-entropy trade-off. We can estimate this trade-off by considering a grouping of the vectors into spheres on projective Hilbert-space whose radius is given by a Hilbert-space angle φ. The number of spheres of radius φ is [Eq. (A18) of Schack1994]
منابع مشابه
Dynamic Routing and Congestion Control Through Random Assignment of Routes
We introduce an algorithm for maximizing utility through congestion control and random allocation of routes to users. The allocation is defined by a probability distribution whose degree of randomness as measured by its entropy, is controlled. We seek to use the entropy to modulate between the two extremes of path specification; minimum cost path selection on one end and equiprobable path alloc...
متن کاملMapping the Region of Entropic Vectors with Support Enumeration & Information Geometry
The region of entropic vectors is a convex cone that has been shown to be at the core of many fundamental limits for problems in multiterminal data compression, network coding, and multimedia transmission. This cone has been shown to be non-polyhedral for four or more random variables, however its boundary remains unknown for four or more discrete random variables. Methods for specifying probab...
متن کاملEntropy Assessment of Windows OS Performance Counters
The security of many cryptographic constructions depends on random number generators for providing unpredictable keys, nonces, initialization vectors and other parameters. Modern operating systems implement cryptographic pseudo-random number generators (PRNGs) to fulfill this need. Performance counters and other system parameters are often used as a low-entropy source to initialize (seed) the g...
متن کاملA Very Efficient Scheme for Estimating Entropy of Data Streams Using Compressed Counting
Compressed Counting (CC) was recently proposed for approximating the αth frequency moments of data streams, for 0 < α ≤ 2. Under the relaxed strict-Turnstile model, CC dramatically improves the standard algorithm based on symmetric stable random projections, especially as α → 1. A direct application of CC is to estimate the entropy, which is an important summary statistic in Web/network measure...
متن کاملEntropy Jumps for Radially Symmetric Random Vectors
We establish a quantitative bound on the entropy jump associated to the sum of independent, identically distributed (IID) radially symmetric random vectors having dimension greater than one. Following the usual approach, we first consider the analogous problem of Fisher information dissipation, and then integrate along the Ornstein-Uhlenbeck semigroup to obtain an entropic inequality. In a depa...
متن کامل