Quantum Information Theory with Gaussian Systems
Quantum Information Theory with Gaussian Systems
Quantum Information Theory with Gaussian Systems
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
5 <strong>Gaussian</strong> private quantum channels<br />
This integral is estimated for isotropic, uncorrelated <strong>Gaussian</strong> noise <strong>with</strong> uniform<br />
covariance g as follows:<br />
1<br />
c<br />
<br />
dξ e −ξT <br />
·G·ξ/4 2Nf−1 Nf −1<br />
= 2 g (Nf − 1)!<br />
|ξ|≥a<br />
a<br />
∞<br />
dr r 2Nf−1 e −r2 /(4g)<br />
by introducing polar coordinates and<br />
integrating over angular coordinates<br />
= 2 2Nf g Nf (Nf − 1)! ∞<br />
−1<br />
a 2<br />
dt t Nf−1 e −t/(4g)<br />
substituting t = r 2<br />
≤ 2 2Nf g Nf (Nf − 1)! ∞<br />
−1<br />
dt e −t/(8g)<br />
if a 2 is large enough to ensure that<br />
t Nf−1 e −t/(4g) ≤ e −t/(8g) for t ≥ a 2<br />
a 2<br />
(5.10)<br />
= 2 2Nf−3 g Nf−1 (Nf − 1)! −1 e −a 2 /(8g) . (5.11)<br />
Note that for the single-mode case Nf = 1 the inequality in the second to last<br />
line becomes an equality and there is no additional condition on a. Otherwise, the<br />
condition reads a 2 ≥ t0 , where t0 is the larger, real solution of t = 8 g (Nf −1)logt.<br />
This solution exists, if 8 g (Nf − 1) ≥ e, which we assume to be true in the case<br />
Nf ≥ 2 due to g ≫ 1. Combining Eqs.(5.8), (5.9) and (5.11), we arrive at the<br />
bound<br />
<br />
T[ ](α) − T(α) 1 ≤ 2 2Nf−4 g Nf−1 (Nf − 1)! −1 e −a 2 /(8g) . (5.12)<br />
In the next step, the cutoff integral (5.3) over a hypersphere of the phase space is<br />
replaced by a summation (5.4) over a discrete, regular grid of hypercubes (cf. Fig.5.2).<br />
Each cell is labeled by a positive integer k and described by a corner point ξk and<br />
the characteristic function of a set, χk(ξ) = 1 if ξ belongs to the k-th hypercube and<br />
zero otherwise. The length δ of the diagonal of the hypercubes yields the maximal<br />
distance |ξk − ξ| ≤ δ between a point in phase space and the corner of the cell in<br />
which it is situated. The vectors ξk will constitute the set of encryption operations.<br />
The error introduced is estimated as follows:<br />
108<br />
<br />
T Σ(α) − T [](α) 1 =<br />
<br />
<br />
1<br />
cΣ <br />
dξ<br />
|ξ|≤a<br />
K<br />
k=1<br />
χk(ξ)e −ξT<br />
k ·G·ξ k /4 W ξk |α〉〈α|W∗ ξk −<br />
1<br />
c []<br />
<br />
|ξ|≤a<br />
dξ e −ξT ·G·ξ/4 Wξ |α〉〈α|W ∗ ξ<br />
<br />
<br />
,<br />
1