Quantum Information Theory Session
Org:
Jason Crann (Carleton University) and
Arthur Mehta (University of Ottawa)
[
PDF]
 MAHMUD AZAM, University of Saskatchewan
TQFTs and Quantum Computing [PDF]

Quantum computing is captured in the formalism of the monoidal subcategory $M$ of the category $\mathrm{Vect}_\mathbb{C}$ of complex vector spaces generated under tensor
products by $\mathbb{C}^2$  in particular, quantum circuits can be seen as diagrams in this category
 while topological quantum field theories, in the sense of Atiyah, are diagrams in
$\mathrm{Vect}_\mathbb{C}$ indexed by a cobordism category.
We outline a program to formalize a connection between these two scenarios.
In doing so, we first equip cobordisms with machinery for producing $\mathbb{C}$linear maps by
parallel transport along curves under a connection and then assemble these structures into a higher
category. The category $M$ above is also given a suitable higher categorical structure which
we call $\mathbb{F}\mathrm{Vect}_\mathbb{C}$. Finally, we realize quantum circuits as images of these cobordisms with additional structure under a higher monoidal functor to
$\mathbb{F}\mathrm{Vect}_\mathbb{C}$,
which are computed by taking parallel transports of vectors and then combining the results
in a pattern encoded in the domain of the functor. This talk reports on joint work with Steven Rayan.
 XIAONING BIAN, Dalhousie University
Generators and relations for 3qubit Clifford+CS operators [PDF]

We give a presentation by generators and relations of the group of 3qubit Clifford+CS operators. The proof roughly consists of two parts: (1) applying the ReidemeisterSchreier theorem repeatedly to an earlier result of ours; and (2) the simplification of thousands of relations into 17 relations. Both (1) and (2) have been formally verified in the proof assistant Agda. The ReidemeisterSchreier theorem gives a constructive method for computing a presentation of a submonoid given a presentation of the supermonoid. To achieve (2), we devise an almostnormal form for Clifford+CS operators. Along the way, we also identify several interesting structures within the Clifford+CS group. Specifically, we identify three different finite subgroups for whose elements we can give unique normal forms. We show that the 3qubit Clifford+CS group, which is of course infinite, is the amalgamated product of these three finite subgroups. This result is analogous to the fact that the 1qubit Clifford+T group
is an amalgamated product of two finite subgroups.
 DAVID CUI, Massachusetts Institute of Technology
Sumofsquares decompositions and nonlocal games [PDF]

Any nonlocal game has an associated game polynomial representing its winning probability. Exhibiting a sumofsquares decomposition of this game polynomial gives an upperbound on the quantum value of the nonlocal game. Such decompositions can be numerically found via a complete hierarchy of semidefinite programs and thus are powerful tools in the theory of nonlocal games. In this talk, we’ll discuss how sumofsquares decompositions can give us selftesting results for nonlocal games and upperbounds for multipartite games on quantum networks. This is partly based on joint work with Arthur Mehta, Hamoon Mousavi, and Sajjad Nezhadi.
 ERIC CULF, University of Waterloo
Coset states in Uncloneable Cryptography [PDF]

The coset state structure has proven useful on multiple occasions in quantum information, for example in the context of the hidden subgroup problem and stabiliser codes. A basis of coset states exists for every vector subspace of a space of bitstrings, and the elements of the basis are indexed by the coset representatives of the subspace and its orthogonal complement  this provides a large amount of algebraic structure. Recently, Coladangelo, Liu, Liu, and Zhandry [Crypto 2021] introduced a monogamyofentanglement (MoE) game based on this structure. We extend this game to construct a variety of uncloneable cryptographic protocols.
First, we show that one of the two cooperating players can learn the other player's answer without significantly affecting the winning probability of the MoE game. This allows to construct a variety of novel cryptographic primitives including a form of uncloneable encryption where decryption uses an interaction between the sender and the receiver, and a stronger form of onesided device independent quantum key distribution (1S DI QKD) where the receiver's classical device may also be assumed to be untrusted. Our other extension is to show that a comparable MoE property holds for coset states of a wide variety of groups, including infiniteorder compact and locally compact abelian groups. This gives rise to an extension of the 1S DI QKD protocol to continuousvariable quantum systems.
This talk is based on joint work with Anne Broadbent (arxiv.org/abs/2303.00048); and with Victor V. Albert and Thomas Vidick (arxiv.org/abs/2212.03935).
 SAM HARRIS, Northern Arizona University
Quantum reductions of synchronous games to graph games [PDF]

Synchronous games that are equivalent, in some sense, preserve certain properties about winning strategies. In this talk, we will see how one can transform any synchronous game into a graph homomorphism game. More specifically, we'll see that every synchronous game is equivalent, in some weak sense, to a threecoloring game for an associated undirected graph, and we'll give an upper bound on the number of vertices required for the graph. As a result, we will obtain a quantum version of Lovasz's reduction theorem of the kcoloring problem of a graph to the 3coloring problem of a graph that holds in all quantum models, extending and simplifying the work of Z. Ji in the finitedimensional model. This work uses a weak *equivalence of games that we will describe.
 NATHANIEL JOHNSTON, Mount Allison University
Absolute kIncoherence and Antidistinguishability [PDF]

We explore the quantum resource theory of kincoherence, in which the free states are those that can be written as a convex combination of pure states with at most k nonzero entries. In particular, we investigate the set of quantum states that can be shown to be kincoherent based only on their eigenvalues. In analogy with the absolute separability problem, we call these states "absolutely kincoherent", and we derive several necessary and sufficient conditions for membership in this set. As an application of our results, we derive a correct version of a recentlydisproved conjecture about antidistinguishability of quantum states.
 NICHOLAS LARACUENTE, University of Chicago
Information Fragility or Robustness of Quantum States and Processes [PDF]

How quickly can weak noise destroy information in a quantum system? Several forms of this question can be phrased in terms of the ratio between initial and decayed quantum relative entropy. We consider relevant analytic properties of relative entropy, including how it relates to positive semidefinite order and von Neumann algebra inclusion indices. We emphasize regimes of extremely fast or slow decay, including when nonclassical features enable such extremes.
 DEBBIE LEUNG, University of Waterloo
RateDistortion Theory for Mixed States Ensembles [PDF]

Consider the compression of asymptotically many i.i.d. copies of ensembles of mixed quantum states where the encoder has access to a general side information system. The figure of merit is percopy error. Ratedistortion theory studies the tradeoff between the compression rate and the percopy error. The ratedistortion function is the best compression rate given a certain distortion. In this talk, we derive the ratedistortion functions of mixedstate compression in the entanglementassisted and unassisted scenarios, and also for the general setting where the consumption of both communication and entanglement are considered. We will discuss consequences of our results and open problems. Joint work with Zahra Baghali Khanian and Kohdai Kuroiwa.
 SÉBASTIEN LORD, University of Ottawa
Uncloneable Quantum Advice [PDF]

In this work, we initiate the study of the computational complexity of cloning fixed sequences of quantum states. This is in contrast to prior studies of the nocloning principle where the states to be copied are not fixed, but rather selected at random from some larger set.
We frame our main results as the instantiation of uncloneable quantum advice for certain specific promise problems and languages. A quantum advice state can be understood as a quantum program which is run by a user to solve a given problem instance. Thus, uncloneable quantum advice can be viewed as a contribution to the larger ongoing quest in quantum cryptography to construct copyprotection schemes for interesting functionalities. Indeed, existing quantum copyprotection schemes only offer security if the program to be copyprotected is chosen at random from some larger family. Our work establishes a proofofprinciple that a version of copyprotection for fixed and specific programs is achievable.
Joint work with Anne Broadbent and Martti Karvonen.
 HERMIE MONTERDE, University of Manitoba
Low fidelity quantum transmission [PDF]

A quantum spin network is modelled by an undirected graph $X$, where the vertices and edges of $X$ represent the qubits in the network and their interactions, respectively. The fidelity (probability) of quantum state transfer from vertex $u$ to vertex $v$ at time $t$ is given by the modulus of the $(u,v)$ entry of the unitary operator $U(t)=\text{exp}(itH)$, where $H$ is the Hamiltonian of the quantum system. Most studies focus on high fidelity quantum transmission between distinct vertices in a graph (such as perfect state transfer and pretty good state transfer). In this talk, we discuss low fidelity quantum transmission and provide several infinite families of graphs that exhibit such a property. This talk is based on the paper https://arxiv.org/abs/2303.06297.
 ASHWIN NAYAK, University of Waterloo
Optimal lower bounds for Quantum Learning via Information Theory [PDF]

We revisit two problems in learning theory, in which the goal is to
learn some property given copies (``samples'') of the same quantum
state. We derive optimal lower bounds on the number of samples required
to solve these problems, using a combination of algebraic and
informationtheoretic techniques. The resulting proofs are both simpler
and shorter than those given before.
(Based on work with Shima Bab Hadiashar and Pulkit Sinha.)
 CONNOR PADDOCK, University of Ottawa
Satisfiability problems and algebras of boolean constraint system games [PDF]

Properties of boolean constraint system (BCS) algebras characterize various types of perfect entangled strategies for BCS nonlocal games. These different types of perfect strategies suggest various generalized notions of satisfiability for constraint systems. We construct a constraint system which is $C^*$satisfiable but not tracially satisfiable. We show that reductions between constraint systems can be captured as homomorphisms between BCS algebras, and use this point of view to streamline and strengthen several results of Atserias, Kolaitis, and Severini [AKS'19]. In particular, we show that the question of whether there is a hyperlinear group is linked to proving dichotomy theorems for $\mathcal{R}^{\mathcal{U}}$satisfiability of constraint systems. We also point out a number of additional open problems with other types of satisfiability.
 QUANTUM INFORMATION THEORY TALK AND TUTORIAL: YUMING ZHAO, University of Waterloo
Introduction to quantum selftesting [PDF]

Suppose we have a physical system consisting of two separate labs, each capable of making a number of different measurements. If the two labs are entangled, then the measurement outcomes can be correlated in surprising ways. In quantum mechanics, we model physical systems like this with a state vector and measurement operators. However, we do not directly see the state vector and measurement operators, only the resulting measurement statistics (which are referred to as a \emph{correlation}). There are typically many different models achieving a given correlation. Hence it is a remarkable fact that some correlations have a unique quantum model. A correlation with this property is called a selftest.
This tutorial will offer an introduction to selftesting and relevant mathematics. Particular focus will be given to the operatoralgebraic perspective of understanding selftesting and the use of approximate representation theory in proving robustness.
 THOMAS THEURER, University of Calgary
Resource theory of quantum thermodynamics: State convertibility from qubit cooling and heating [PDF]

Thermodynamics plays an important role both in the foundations of physics and in technological applications. An operational perspective adopted in recent years is to formulate it as a quantum resource theory. I will begin with a quick introduction to the general framework of quantum resource theories, in particular motivating it and explaining why the convertibility of resourceful states is at its core. I will then specialize to the resource theory of quantum thermodynamics and present recent results that I found in collaboration with Elia Zanoni, Carlo Maria Scandolo, and Gilad Gour: We solved the question of how in the quantum limit, thermal nonequilibrium can be used to heat and cool other quantum systems that are initially at thermal equilibrium. We then showed that the convertibility between quasiclassical resources (resources that do not exhibit coherence between different energy eigenstates) is fully characterized by their ability to cool and heat qubits, i.e., by two of the most fundamental thermodynamical tasks on the simplest quantum systems. We, therefore, characterized the core problem of the resource theory of thermodynamics with operationally relevant tasks.
 DAVE TOUCHETTE, Université de Sherbrooke
 SHERRY WANG, University of Ottawa
Postquantum Technologies: Password Authentication and Digital Credentials [PDF]

In a postquantum world, where attackers may have access to fullscale quantum computers, all public key cryptosystems will be compromised. In this talk, we’ll look at two possible postquantumsecure systems. We’ll look at an implementation of a password authentication scheme on a quantum computer. Briefly, we’ll also talk about postquantum digital credentials, which are a privacy technology that allows users to disclose information about an attribute without revealing the attribute itself during transactions.
 CUNLU ZHOU, University of New Mexico
A singlet projector based NPA hierarchy for the quantum MAXCUT problem [PDF]

The QMAhard quantum MAXCUT (QMC) problem, a quantum analog of the classical MAXCUT problem, studies the maximum eigenvalue of the socalled antiferromagnetic Heisenberg model. The quantum Heisenberg model plays a central role in condensed matter physics for understanding quantum magnetism and is one of the simplest models that exhibit genuine quantum computational hardness. The NPA hierarchy is the quantum (noncommutative) analog of the Lasserre hierarchy, which consists of a sequence of converging semidefinite programming (SDP) relaxations and has played an important role in studying combinatorial optimization problems. In this talk, I will introduce an NPA hierarchy for QMC based on the singlet projectors (projectors of the form $h = \psi^\rangle\langle\psi^$, where $\psi^\rangle = \frac{1}{\sqrt{2}} \left(01\rangle  10\rangle\right)$). The singlet projector follows the $SU(2)$ symmetry naturally, and the obtained NPA hierararchy is conceptually simpler and practically implementable. I will show several analytic and computational results concerning this new hierarchy.
(Based on work with Jun Takahashi, Chaithanya Rayudu, Robbie King, Kevin Thompson, and Ojas Parekh.)
© Canadian Mathematical Society