• Keine Ergebnisse gefunden

Quantum Information Theory Problem Set 2

N/A
N/A
Protected

Academic year: 2022

Aktie "Quantum Information Theory Problem Set 2"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Quantum Information Theory Problem Set 2

Spring 2008 Prof. R. Renner

Problem 2.1 Min-Entropy in the i.i.d. limit

Let us introduce the “smoothed” min-entropy of a random variable X overX as Hmin (X) = max

QX

δ(QX,PX)<

minx∈X hQ(x), (1)

where hQ(x) = −logQX(x) and the maximum is over all probability distributions QX that are -close to PX. Further, we define an i.i.d. random variable X~ ={X1, X2, . . . , Xn} on X×n with PX~(~x) = Qn

i=1PX(xi). Use the weak law of large numbers to show that the “smoothed”

min-entropy converges to the Shannon entropy H(X) in the i.i.d. limit:

→0lim lim

n→∞

1

nHmin (X)~ ≥H(X). (2) Problem 2.2 Channel capacity

1 - p

1 - p p p

X Y

(a) Binary Symmetric Channel

1 - p

1 - p p p

X Y

(b) Symmetric Erasure Channel

The asymptotic channel capacity is given by C= max

PX

I(X :Y).

a) Calculate the asymptotic capacities of the two channels depicted above.

b) Can we transmit a message error-free and with a finite amount of channel uses?

*c) Show that feedback does not improve the channel capacity.

Referenzen

ÄHNLICHE DOKUMENTE

Classically, this game is won with a probability of at most 75% for large n. When the two players are chosen, the remaining players measure their qubit in some basis and count

Quantum Information Theory Problem Set 4. Spring

Quantum Information Theory Problem Set 5. Spring

Quantum Information Theory Problem Set 6. Spring

Tsirelson’s inequality (cf. Nielsen/Chuang, Problem 2.3) gives an upper bound on the possible violation of Bell’s inequality in Quantum

Let us consider the following thought experiment: Alice and Bob share a system that is comple- tely described by a random variable Z (the hidden variable). A Bell experiment is

We will now derive some properties of the von Neumann entropy that will be useful in

Furthermore, classical communication between A and B is insecure in that everything broadca- sted over the channel will be heard by E. Prove the