Next Article in Journal
Treatment of Wastewater from the Confectionery Industry Using Pressure Membrane Processes
Previous Article in Journal
Coexistence of Different Scaling Laws for the Entanglement Entropy in a Periodically Driven System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Proceeding Paper

Privacy in Quantum Estimation †

by
Milajiguli Rexiti
1,2,*,‡ and
Stefano Mancini
3,‡
1
Department of Mathematics and Physics, Xinjiang Agricultural University, 830053 Urumqi, China
2
School of Advanced Studies, University of Camerino, 62032 Camerino, Italy
3
School of Science and Technology, University of Camerino, 62032 Camerino, Italy
*
Author to whom correspondence should be addressed.
Presented at the 11th Italian Quantum Information Science conference (IQIS2018), Catania, Italy, 17–20 September 2018.
These authors contributed equally to this work.
Proceedings 2019, 12(1), 13; https://doi.org/10.3390/proceedings2019012013
Published: 25 June 2019
(This article belongs to the Proceedings of 11th Italian Quantum Information Science conference (IQIS2018))

Abstract

:
We introduce the notion of privacy in quantum estimation by considering an one-parameter family of isometries taking one input into two output systems. It stems on the separate and adversarial control of the two output systems as well as on the local minimization of the mean square error. Applications to two-qubit unitaries (with one qubit in a fixed input state) are presented.

1. Introduction

Parameter estimation is becoming important in quantum information processing which takes place by quantum channel maps (see e.g., [1]). It is well known that any quantum channel admits an isometry as a dilation [2]. Hence we can conceive the estimation of a family of isometries through quantum channels. This models a realistic situation where not all information concerning the measured systems is accessible. More precisely, given a one parameter family of isometries { V α A B F } , we consider the parameter α ’s estimation by accessing only the system B. This amounts to use the quantum channel between A and B of which V α A B F represents the Stinespring dilation [2].
In communication theory channels are also characterized by their privacy [3]. This notion captures the ability to convey more information through the channel than the one that is lost into environment. To link this notion with estimation we assume system F is under control of a malicious being. Then the problem we are facing with becomes of what are the conditions under which a legitimate user controlling the B system (besides A ones) can perform a better estimation. We address this issue by minimizing mean square error.

2. Private Quantum Estimation

Consider a family of isometries V α : H A H B H F , which is parametrized by α I R . Assume parameter α has an a priori probability distribution function p ( α ) over I , the probe system A is prepared in the state ρ A . Then the output on B reads
ρ B ( α ) = Tr F V α ρ A V α = : N ( ρ A ) .
We perform measurement on this state, and estimate of the unknown parameter α using the measurement outcome. As goodness of this process, we consider average quadratic cost function:
C ¯ B : = I p ( α ) Tr ρ B ( α ) S ^ B α I 2 d α ,
where S ^ B is the measurement operator used to estimate α . The best of such operator is obtained by minimizing C ¯ B . Personik’s theorem [4] provided the solution to this optimization problem through the following operator equation
W B ( 0 ) S ^ B + S ^ B W B ( 0 ) = 2 W B ( 1 ) ,
where W B ( 0 ) : = I p ( α ) ρ B ( α ) d α and W B ( 1 ) : = I α p ( α ) ρ B ( α ) d α . On the other hand we can consider the state emerging from the channel complementary to N in Equation (1), namely
ρ F ( α ) = Tr B V α ρ A V α = : N ˜ ( ρ ) .
If this is controlled by an adversary, a strategy similar to the above can be employed to estimate α and leading to C ¯ m i n F with a suitable optimal measurement S ^ F .
By considering the system B (as well as A) hold by a legitimate user, we define the privacy of estimation through the difference between the minimum of the average quadratic cost functions
P e : = max C ¯ m i n F C ¯ m i n B , 0 .
Whenever it results positive, it means that C ¯ m i n B < C ¯ m i n F and hence B can better estimate α than F. This definition of the privacy assumes that the adversary can control the system F and at the same time has information about the input state. A weaker notion of privacy can be introduced by assuming the adversary with no information about the input state. This amounts to consider C ¯ m i n F in (5) averaged overall possible input states.

3. Application to Two-Qubit Unitaries

For a two-qubit system we consider V α = U α | 0 E , where U α : H A H E H B H F ( H A = H E = H B = H F C 2 ) are entangling unitaries that can be parameterized as [5]:
U ( α x , α y , α z ) = exp i 2 α x σ x σ x + α y σ y σ y + α z σ z σ z ,
with the parameter space
S = ( α x , α y , α z ) : π 2 α x α y α z 0 .
The state in the system A (probe’s state) will be generically considered as
ρ A = x | 0 + e i φ 1 x | 1 x 0 | + e i φ 1 x 1 | ,
with x [ 0 , 1 ] and φ [ 0 , 2 π ] . Below we will consider the estimation of a single parameter be either α x or α y or α z , by assuming the values of the other two to be known. To this end the states ρ B of Equation (1) and ρ F of Equation (4) can be readily calculated. There, the parameter φ appears as added to α z . Thus it has no effect in the estimation of the latter. But it can affect the estimation of α x and α y .
(i)
Estimation of α z . We took 325 points in the region 0 α y α x π 2 and for each point we estimated α z through ρ B and independently through ρ F . This is done by also optimizing the privacy (5) over the probe’s state, i.e., by considering
P e ( α x , α y ) = max max x C ¯ m i n F ( α x , α y , x ) C ¯ m i n B ( α x , α y , x ) , 0 ,
whose contour plot is reported in Figure 1.
On the line α x + α y = π 2 we have C ¯ m i n B = C ¯ m i n F and this divides the region 0 α y α x π 2 into two triangles. Only in the lower one the estimation is private (in the upper one C ¯ m i n F results smaller than C ¯ m i n B ). Furthermore there is a specific and small region where the privacy increases with respect to the background.
(ii)
Estimation of α y . In this case we took 325 points in the region 0 α z α x π 2 , and for each point we estimated α y through ρ B and independently through ρ F likewise the previous case. Then we evaluated the privacy
P e ( α x , α z ) = max max x , φ C ¯ m i n F ( α x , α z , x , φ ) C ¯ m i n B ( α x , α z , x , φ ) , 0 ,
whose contour plot is reported in Figure 2. Notice that although C ¯ m i n B can be made zero by choosing α z = α x 1, this does not give the maximum privacy since in such a case also C ¯ m i n F turns out to be zero. The maximum privacy is obtained when α z decrease to 0 and α x increase to π / 2 .
(iii)
Estimation of α x . In this last case we took 325 points in the region 0 α z α y π 2 and for each point we estimated α x through ρ B and independently through ρ F . We actually computed
P e ( α y , α z ) = max max x , φ C ¯ m i n F ( α y , α z , x , φ ) C ¯ m i n B ( α y , α z , x , φ ) , 0 ,
whose contour plot is shown in Figure 3.
Comparing the three cases we can see that the highest privacy is achievable for the estimation of α y , while it decreases by one order of magnitude for α x and by a further order of magnitude for α z . In this latter case the privacy is also not guaranteed in half of the parameter space. It is worth saying that P e ( α x , α y ) is not affected by the maximization over φ , while the quantities P e ( α x , α z ) and P e ( α y , α z ) are, but in a different way. In particular the former is almost insensible to φ , instead the latter strongly depends on it.

4. Conclusion

In conclusion we have considered the single parameter estimation of isometries representing Stinespring dilations of quantum channels, in which the environment is under control of an adversary and the goal is to allow the legitimate user of the channels to outperform the estimation. The optimal strategy has been found by minimizing the average quadratic cost. Applications to two-qubit unitaries show that the largest privacy is obtainable when estimating α y , i.e., the parameter in front of the generator σ y σ y . The developed approach can be extended to conceive the possibility of separate but cooperative control (instead of adversarial) of the two output systems [6].

Author Contributions

The authors equally contributed to this paper.

Funding

The work of M.R. is supported by China Scholarship Council.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wilde, M.M. Quantum Information Theory; Cambridge University Press: Cambridge, UK, 2017. [Google Scholar]
  2. Stinespring, W.F. Positive functions on C*-algebras. Proc. Am. Math. Soc. 1955, 6, 211. [Google Scholar]
  3. Cai, N.; Winter, A.; Yeung, R.W. Quantum privacy and quantum wiretap channels. Problems of Information Transmission. 2004, 40, 318, Devetak, I. The private classical capacity and quantum capacity of a quantum channel. IEEE Trans. Inf. Theory 2005, 51, 44. [Google Scholar] [CrossRef]
  4. Personick, S.D. Application of quantum estimation theory to analog communication over quantum channels. IEEE Trans. Inf. Theory 1971, 17, 240. [Google Scholar] [CrossRef]
  5. Rexiti, M; Mancini, S. Estimation of two-qubit interactions through channels with environment assistance. Int. J. Quantum Inf. 2017, 15, 1750053. [Google Scholar] [CrossRef]
  6. Rexiti, M.; Mancini, S. Adversarial versus cooperative quantum estimation. Quantum Inf. Processing 2019, 18, 102. [Google Scholar] [CrossRef]
1
This choice by virtue of (7) forces α y to be exactly determined.
Figure 1. Contour plot of the privacy P e for estimating α z .
Figure 1. Contour plot of the privacy P e for estimating α z .
Proceedings 12 00013 g001
Figure 2. Contour plot of the privacy P e for estimating α y .
Figure 2. Contour plot of the privacy P e for estimating α y .
Proceedings 12 00013 g002
Figure 3. Contour plot of the privacy P e for estimating α x .
Figure 3. Contour plot of the privacy P e for estimating α x .
Proceedings 12 00013 g003
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Rexiti, M.; Mancini, S. Privacy in Quantum Estimation. Proceedings 2019, 12, 13. https://doi.org/10.3390/proceedings2019012013

AMA Style

Rexiti M, Mancini S. Privacy in Quantum Estimation. Proceedings. 2019; 12(1):13. https://doi.org/10.3390/proceedings2019012013

Chicago/Turabian Style

Rexiti, Milajiguli, and Stefano Mancini. 2019. "Privacy in Quantum Estimation" Proceedings 12, no. 1: 13. https://doi.org/10.3390/proceedings2019012013

APA Style

Rexiti, M., & Mancini, S. (2019). Privacy in Quantum Estimation. Proceedings, 12(1), 13. https://doi.org/10.3390/proceedings2019012013

Article Metrics

Back to TopTop