Abstract
We introduce the notion of privacy in quantum estimation by considering an one-parameter family of isometries taking one input into two output systems. It stems on the separate and adversarial control of the two output systems as well as on the local minimization of the mean square error. Applications to two-qubit unitaries (with one qubit in a fixed input state) are presented.
1. Introduction
Parameter estimation is becoming important in quantum information processing which takes place by quantum channel maps (see e.g., [1]). It is well known that any quantum channel admits an isometry as a dilation [2]. Hence we can conceive the estimation of a family of isometries through quantum channels. This models a realistic situation where not all information concerning the measured systems is accessible. More precisely, given a one parameter family of isometries , we consider the parameter ’s estimation by accessing only the system B. This amounts to use the quantum channel between A and B of which represents the Stinespring dilation [2].
In communication theory channels are also characterized by their privacy [3]. This notion captures the ability to convey more information through the channel than the one that is lost into environment. To link this notion with estimation we assume system F is under control of a malicious being. Then the problem we are facing with becomes of what are the conditions under which a legitimate user controlling the B system (besides A ones) can perform a better estimation. We address this issue by minimizing mean square error.
2. Private Quantum Estimation
Consider a family of isometries which is parametrized by . Assume parameter has an a priori probability distribution function over , the probe system A is prepared in the state . Then the output on B reads
We perform measurement on this state, and estimate of the unknown parameter using the measurement outcome. As goodness of this process, we consider average quadratic cost function:
where is the measurement operator used to estimate . The best of such operator is obtained by minimizing . Personik’s theorem [4] provided the solution to this optimization problem through the following operator equation
where and On the other hand we can consider the state emerging from the channel complementary to in Equation (1), namely
If this is controlled by an adversary, a strategy similar to the above can be employed to estimate and leading to with a suitable optimal measurement .
By considering the system B (as well as A) hold by a legitimate user, we define the privacy of estimation through the difference between the minimum of the average quadratic cost functions
Whenever it results positive, it means that and hence B can better estimate than F. This definition of the privacy assumes that the adversary can control the system F and at the same time has information about the input state. A weaker notion of privacy can be introduced by assuming the adversary with no information about the input state. This amounts to consider in (5) averaged overall possible input states.
3. Application to Two-Qubit Unitaries
For a two-qubit system we consider , where () are entangling unitaries that can be parameterized as [5]:
with the parameter space
The state in the system A (probe’s state) will be generically considered as
with and . Below we will consider the estimation of a single parameter be either or or , by assuming the values of the other two to be known. To this end the states of Equation (1) and of Equation (4) can be readily calculated. There, the parameter appears as added to . Thus it has no effect in the estimation of the latter. But it can affect the estimation of and .
- (i)
- Estimation of . We took 325 points in the region and for each point we estimated through and independently through . This is done by also optimizing the privacy (5) over the probe’s state, i.e., by consideringwhose contour plot is reported in Figure 1.
Figure 1. Contour plot of the privacy for estimating .On the line we have and this divides the region into two triangles. Only in the lower one the estimation is private (in the upper one results smaller than ). Furthermore there is a specific and small region where the privacy increases with respect to the background. - (ii)
- Estimation of . In this case we took 325 points in the region , and for each point we estimated through and independently through likewise the previous case. Then we evaluated the privacywhose contour plot is reported in Figure 2. Notice that although can be made zero by choosing 1, this does not give the maximum privacy since in such a case also turns out to be zero. The maximum privacy is obtained when decrease to 0 and increase to .
Figure 2. Contour plot of the privacy for estimating . - (iii)
- Estimation of . In this last case we took 325 points in the region and for each point we estimated through and independently through . We actually computedwhose contour plot is shown in Figure 3.
Figure 3. Contour plot of the privacy for estimating .
Comparing the three cases we can see that the highest privacy is achievable for the estimation of , while it decreases by one order of magnitude for and by a further order of magnitude for . In this latter case the privacy is also not guaranteed in half of the parameter space. It is worth saying that is not affected by the maximization over , while the quantities and are, but in a different way. In particular the former is almost insensible to , instead the latter strongly depends on it.
4. Conclusion
In conclusion we have considered the single parameter estimation of isometries representing Stinespring dilations of quantum channels, in which the environment is under control of an adversary and the goal is to allow the legitimate user of the channels to outperform the estimation. The optimal strategy has been found by minimizing the average quadratic cost. Applications to two-qubit unitaries show that the largest privacy is obtainable when estimating , i.e., the parameter in front of the generator . The developed approach can be extended to conceive the possibility of separate but cooperative control (instead of adversarial) of the two output systems [6].
Author Contributions
The authors equally contributed to this paper.
Funding
The work of M.R. is supported by China Scholarship Council.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Wilde, M.M. Quantum Information Theory; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
- Stinespring, W.F. Positive functions on C*-algebras. Proc. Am. Math. Soc. 1955, 6, 211. [Google Scholar]
- Cai, N.; Winter, A.; Yeung, R.W. Quantum privacy and quantum wiretap channels. Problems of Information Transmission. 2004, 40, 318, Devetak, I. The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Inf. Theory 2005, 51, 44. [Google Scholar] [CrossRef]
- Personick, S.D. Application of quantum estimation theory to analog communication over quantum channels. IEEE Trans. Inf. Theory 1971, 17, 240. [Google Scholar] [CrossRef]
- Rexiti, M; Mancini, S. Estimation of two-qubit interactions through channels with environment assistance. Int. J. Quantum Inf. 2017, 15, 1750053. [Google Scholar] [CrossRef]
- Rexiti, M.; Mancini, S. Adversarial versus cooperative quantum estimation. Quantum Inf. Processing 2019, 18, 102. [Google Scholar] [CrossRef]
| 1 | This choice by virtue of (7) forces to be exactly determined. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).