Next Article in Journal
Entropic Regularization to Assist a Geologist in Producing a Geologic Map
Next Article in Special Issue
Algorithmic Relative Complexity
Previous Article in Journal
Static Isolated Horizons: SU(2) Invariant Phase Space, Quantization, and Black Hole Entropy
Previous Article in Special Issue
Entropy Measures vs. Kolmogorov Complexity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum Kolmogorov Complexity and Information-Disturbance Theorem

by
Takayuki Miyadera
Research Center for Information Security, National Institute of Advanced Industrial Science and Technology, Daibiru building 1003, Sotokanda, Chiyoda-ku, Tokyo, 101-0021, Japan
Entropy 2011, 13(4), 778-789; https://doi.org/10.3390/e13040778
Submission received: 17 January 2011 / Revised: 9 March 2011 / Accepted: 24 March 2011 / Published: 29 March 2011
(This article belongs to the Special Issue Kolmogorov Complexity)

Abstract

:
In this paper, a representation of the information-disturbance theorem based on the quantum Kolmogorov complexity that was defined by P. Vitányi has been examined. In the quantum information theory, the information-disturbance relationship, which treats the trade-off relationship between information gain and its caused disturbance, is a fundamental result that is related to Heisenberg’s uncertainty principle. The problem was formulated in a cryptographic setting and the quantitative relationships between complexities have been derived.

1. Introduction

The quantum theory enables us to process information in ways that are not feasible in the classical world. Quantum computers can solve difficult problems such as factoring [1] or searching [2] in drastically small time steps. Quantum key distribution [3,4] achieves information-theoretic security unconditionally. This field of the quantum information theory has been intensively studied during the last two decades. While most of the studies in this field investigate how Shannon’s information theory was modified or restricted by the quantum theory, there is another information theory called the algorithmic information theory [5,6]. In contrast to Shannon’s theory, which defines information using a probability distribution, the algorithmic information theory assigns the concept of information to individual objects by using a computation theory. Although the algorithmic information theory has been successfully applied to various fields [7], its quantum versions were only recently proposed [8,9,10,11]. We believe there have only been a few applications so far [12,13,14]. In this research, we study how quantum Kolmogorov complexity, which was defined by Vitányi, can be applied to demonstrate quantum effects in a primitive information-theoretic operation.
We study the algorithmic information-theoretic representation of an information-disturbance relationship [15,16,17], which addresses a fundamental observation that information gain destroys quantum states. In particular, an operation that yields information gain with respect to an observable spoils quantum states that were prepared with respect to its conjugate (noncommutative) observable. This relationship indicates the impossibility of jointly measuring noncommutative observables, which is therefore related to Heisenberg’s uncertainty principle. In addition, it plays a crucial role in quantum cryptography. Because a state is inevitably spoiled when an eavesdropper obtains information, legitimate users can notice the existence of the eavesdropper [18]. In this study, we formulate the problem in a cryptographic setting and derive quantitative relationships. Our theorem, characterizing both the information gain and the disturbance in terms of the quantum Kolmogorov complexity, demonstrates a trade-off relationship between these complexities.
This paper is organized as follows. In the next section, we give a brief review of quantum Kolmogorov complexity defined by Vitányi. In Section 3, we introduce a toy quantum cryptographic model and describe our main result on the basis of this model. The paper ends a short discussion.

2. Quantum Kolmogorov Complexity Based on Classical Description

Recently some quantum versions of Kolmogorov complexity were proposed by a several researchers. Svozil [9], in his pioneering work, defined the quantum Kolmogorov complexity as the minimum classical description length of a quantum state through a quantum Turing machine [19,20]. As is easily seen by comparing the cardinality of a set of all the programs with that of a set of all the quantum states, the value often becomes infinity. Vitányi’s definition [8], while similar to Svozil’s, does not have this disadvantage. Vitányi added a term that compensates for the difference between a target state and an output state. Berthiaume, van Dam and Laplante [10] defined their quantum Kolmogorov complexity as the length of the shortest quantum program that outputs a target state. The definition was settled and its properties were extensively investigated by Müller [21,22]. Gacs [11] employed a different starting point related to the algorithmic probability to define his quantum Kolmogorov complexity.
In this paper we employ a definition given by Vitányi [8]. His definition based on the classical description length is suitable for quantum information-theoretic problems which normally treat classical inputs and outputs. In order to explain the definition precisely, a description of one-way quantum Turing machine is needed. It is utilized to define a prefix quantum Kolmogorov complexity. A one-way quantum Turing machine consists of four tapes and an internal control. (See [8] for more details.) Each tape is a one-way infinite qubit (quantum bit) chain and has a corresponding head on it. One of the tapes works as the input tape and is read-only from left-to-right. A program is given on this tape as an initial condition. The second tape works as the work tape. The work tape is initially set to be 0 for all the cells. The head on it can read and write a cell and can move in both directions. The third tape is called an auxiliary tape. One can put an additional input on this tape. The additional input is written to the leftmost qubits and can be a quantum state or a classical state. This input is needed when one treats conditional Kolmogorov complexity. The fourth tape works as the output tape. It is assumed that after halting the state over this tape will not be changed. The internal control is a quantum system described by a finite dimensional Hilbert space which has two special orthogonal vectors | q 0 (initial state) and | q f (halting state). After each step one makes a measurement of a coarse grained observable on the internal control { | q f q f | , 1 | q f q f | } to know if the computation halts. Although there are subtle problems [23,24,25,26] in the halting process of the quantum Turing machine, we do not get into this problem and employ a simple definition of the halting. A computation halts at time t if and only if the probability to observe q f at time t is 1, and at any time t < t the probability to observe q f is zero. By using this one-way quantum Turing machine, Vitányi defined the quantum Kolmogorov complexity as the length of the shortest description of a quantum state. That is, the programs of quantum Turing machine are restricted to classical ones, while the auxiliary inputs can be quantum states. We write U ( p , y ) = | x if and only if a quantum Turing machine U with a classical program p and an auxiliary (classical or quantum) input y halts and outputs | x . The following is the precise description of Vitányi’s definition.
Definition 1 [8] The (self-delimiting) quantum Kolmogorov complexity of a pure state | x with respect to a one-way quantum Turing machine U with y (possibly a quantum state) as conditional input given for free is
K U ( | x | y ) : = min p , | z { l ( p ) + log | z | x | 2 : U ( p , y ) = | z }
where l ( p ) is the length of a classical program p, and a is the smallest integer larger than a.
The one-wayness of the quantum Turing machine ensures that the halting programs compose a prefix free set. Because of this, the length l ( p ) is defined consistently. The term log | z | x | 2 represents how insufficiently an output | z approximates the desired output | x . This additional term has a natural interpretation using the Shannon-Fano code. Vitányi has shown the following invariance theorem, which is very important.
Theorem 1 [8] There is a universal quantum Turing machine U, such that for all machines Q, there is a constant c Q , such that for all quantum states | x and all auxiliary inputs y we have:
K U ( | x | y ) K Q ( | x | y ) + c Q
Thus the value of quantum Kolmogorov complexity does not depend on the choice of a quantum Turing machine if one neglects the unimportant constant term c Q . Thanks to this theorem, one often writes K instead of K U . Moreover, the following theorem is crucial for our discussion.
Theorem 2 [8] On classical objects (that is, finite binary strings that are all directly computable) the quantum Kolmogorov complexity coincides up to a fixed additional constant with the self-delimiting Kolmogorov complexity. That is, there exists a constant c such that for any classical binary sequence | x ,
min q { l ( q ) : U ( q , y ) = | x } K ( | x | y ) min q { l ( q ) : U ( q , y ) = | x } c
holds.
According to this theorem, for classical objects it essentially suffices to treat only programs that exactly output the object.

3. Information-Disturbance Trade-Off

In this section, we treat a toy model of quantum key distribution in order to discuss the information-disturbance relationship. Let us first review a standard scenario of quantum key distribution called BB84. Suppose that there exist three players Alice, Bob, and Eve. Alice and Bob are legitimate users. Alice encodes a message in qubits with one of the bases X or Z, and sends them to Bob. After confirming the receipt of the qubits by Bob, she announces the basis that was used by her for encoding. If there is no eavesdropper, Bob can perfectly recover the message by simply measuring the qubits by using the disclosed basis. Conversely, if there exists an eavesdropper Eve, the state received by Bob is destroyed and he will be unable to recover the message in that case. More precisely, according to the information-disturbance theorem in Shannon’s information-theoretical representation, Bob’s state is inevitably spoiled when Eve employs an attack that helps her obtain information about the messages encoded in the conjugate basis. In order to accomplish the key distribution protocol, Alice and Bob perform an error correction followed by a privacy amplification.
Motivated by this protocol, we introduce its toy version in order to investigate a universal relationship between information gain and disturbance. There are three players Alice, Bob and Eve. Alice chooses an N-bit message y { 0 , 1 } N and a basis X or Z for its encoding. We write the standard basis of a qubit as { | 0 , | 1 } , which are eigenstates of Z. Its conjugate basis is written as { | 0 ¯ , | 1 ¯ } , which are eigenstates of X and are defined as | 0 ¯ : = 1 2 ( | 0 + | 1 ) and | 1 ¯ : = 1 2 ( | 0 | 1 ) . She prepares a quantum state of N qubits described by a Hilbert space H A : = C 2 C 2 C 2 (N times) as follows. If her choice of basis is X, she encodes her message y = y 1 y 2 y N { 0 , 1 } N as | y ¯ : = | y 1 ¯ | y 2 ¯ | y N ¯ H A . If her choice of basis is Z, she encodes her message y as | y : = | y 1 | y 2 | y N H A . Alice sends thus prepared N qubits to Bob. Eve, whose purpose is to obtain information about the message, makes her apparatus interact with the qubits sent from Alice to Bob and divides the whole system into two parts. This process is described by a completely-positive map (CP-map)
Λ : S ( H A ) S ( H B H E )
where H B (resp. H E ) denotes a Hilbert space of the system distributed to Bob (resp. Eve), and S ( H ) is a set of all density operators on a Hilbert space H . Alice then announces the basis X or Z that she had used for encoding. Bob and Eve try estimating the message by using the quantum state and the information of the basis. Note that in this protocol H B and H E may be general quantum systems. In particular, H B may not be qubits. Thus in contrast to the standard quantum key distribution protocol, Bob may not measure X or Z to obtain information. Bob knows the basis used for encoding and the form of CP-map Λ. Thus Bob and Eve are equal in their knowledge on classical information. Only the distributed quantum states differ with each other. According to the information-disturbance relationship in Shannon’s information-theoretical setting, if Eve’s attack helps her obtain large information about the message encoded in the X basis, Bob cannot obtain large information about the message encoded in the Z basis. If the message is chosen probabilistically [27], this relationship is expressed in the formula as [17]:
I ( A : E | basis = X ) + I ( A : B | basis = Z ) N
where A represents the random variable of the message and E ( resp . B ) represents the random variable of the outcome of the measurement performed by Eve (resp. Bob), and I ( · , · ) denotes Shannon’s mutual information.
We formulate the above problem in the algorithmic information-theoretical setting. Let us denote the quantum state obtained by Bob (resp. Eve) corresponding to the message z ( resp . x ) encoded with the basis Z ( resp . X ) by ρ z B S ( H B ) ( resp . σ x E S ( H E ) ) . That is, ρ z B and σ x E are defined by
ρ z B = tr H E ( Λ ( | z z | ) ) σ x E = tr H B ( Λ ( | x ¯ x ¯ | ) )
where tr H E (resp. tr H B ) denotes a partial trace over H E (resp. H B ). Motivated by the above result in Shannon’s formulation, we expect that there will exist some trade-off relationship between K ( x | σ x E , X ) and K ( z | ρ z B , Z ) [28]. K ( x | σ x E , X ) is the quantum Kolmogorov complexity of the message x encoded with X for Eve. Note that Eve has quantum state σ x E , and knows X (and Λ). K ( z | ρ z B , Z ) is the quantum Kolmogorov complexity of the message z encoded with Z for Bob. He has quantum state ρ z B , and knows Z (and Λ). The following is our main theorem.
Theorem 3 There exists a trade-off relationship for the number of messages that have low complexity. For any integers l , m 0 ,
{ z | K ( z | ρ z B , Z ) l } + { x | K ( x | σ x E , X ) m } 2 N 1 + 2 l + m N 2 + c
holds, where | A | denotes the cardinality of a set A and c is a constant depending on the choice of the quantum Turing machine. Note that the right-hand side of the above inequality gives a nontrivial bound for l , m satisfying l + m N 2 c .
Proof: The proof has three parts. (i) An entanglement-based protocol which is related to the original one is introduced. (ii) It is shown that the number of messages that have low complexity can be represented by an expectation value of a certain observable in the entanglement-based protocol. (iii) The uncertainty relation is applied to show a trade-off relationship.
(i) Let us analyze the protocol. Instead of the original protocol, we treat an entanglement-based protocol (E91-like protocol), which is related to the original one. It runs as follows. Alice prepares N pairs of qubits. She prepares each pair in the EPR state, | ϕ : = 1 2 ( | 0 | 0 + | 1 | 1 ) . Therefore, the whole state can be written as | ϕ N : = | ϕ | ϕ | ϕ (N times) in a Hilbert space H A H A , where H A H A N C 2 . Alice sends qubits described by H A to Bob. Before the qubits reach Bob, Eve makes them interact with her own apparatus, and divides the whole system into two parts. The whole dynamics is described by ( i d S ( H A ) Λ ) : S ( H A H A ) S ( H A H B H E ) , where i d S ( H A ) is an identity map on S ( H A ) . We denote by Θ the whole state over H A H B H E after this process. That is, it is defined by Θ = ( id H A Λ ) ( | ϕ N ϕ N | ) . Alice then measures her qubits with the basis X or Z, and announces the basis used.
It can be shown [17] that this entanglement-based protocol is equivalent with the original protocol with a probabilistically [27] chosen message. In fact, we can see the following correspondence. Define Z z for z { 0 , 1 } N , a projection operator on H A , by Z z : = | z z | . { Z z } forms a projection-valued measure (PVM). Probability to obtain z { 0 , 1 } N in its measurement is P Z ( z ) : = tr ( Θ ( Z z 1 B 1 E ) ) = 1 2 N . In addition, a posteriori state [29] on H B H E is calculated as Λ ( | z z | ) , whose restriction on H B is nothing but ρ z B S ( H B ) . Similarly, define X x for x { 0 , 1 } N , a projection operator on H A , by X x = | x ¯ x ¯ | . It is easy to see that { X x } x { 0 , 1 } N forms a PVM on H A . For each x { 0 , 1 } N , probability to obtain x in its measurement is P X ( x ) = 1 2 N . A posteriori state [29] on H B H E becomes Λ ( | x ¯ x ¯ | ) , whose restriction on H E is σ x E .
(ii) We fix a universal quantum Turing machine U and discuss the quantum Kolmogorov complexity with respect to it. Firstly let us consider the complexity for Bob when the message z is encoded with Z. Bob knows Z and has a quantum system described by H B whose state is ρ z B . This system is identified with the auxiliary input tape. That is, we investigate K U ( z | ρ z B , Z ) . Thanks to theorem 2, it suffices to consider only the programs that exactly output the message z because the message is a classical object. That is, we regard
K c , U ( z | ρ z B , Z ) : = min q : U ( q , ρ z B , Z ) = | z l ( q )
which satisfies K c , U ( z | ρ z B , Z ) K U ( z | ρ z B , Z ) K c , U ( z | ρ z B , Z ) c for some constant c .
Let us denote T z { 0 , 1 } * a set of all programs that output z with auxiliary inputs ρ z B and Z. A relationship K c , U ( z | ρ z B , Z ) = min t T z l ( t ) follows. Although different programs may have different halting times, thanks to the lemma proved by Müller (Lemma 2.3.4. in [22]), there exists a CP-map Γ U , Z : S ( H B H I ) S ( H O ) satisfying for any t T z
Γ U , Z ( ρ z B | t t | ) = | z z |
where H I is a Hilbert space for programs, and H O = N C 2 is a Hilbert space for outputs. From this lemma, we obtain an important observation. If T z T z holds for some z z , ρ z B and ρ z B are perfectly distinguishable. In fact, as a CP-map does not increase the distinguishability of states, the relationships for t T z T z
Γ U , Z ( ρ z B | t t | ) = | z z | Γ U , Z ( ρ z B | t t | ) = | z z |
and their distinguishability on the right-hand sides imply the distinguishability of ρ z B and ρ z B . For each t { 0 , 1 } * we define C t { 0 , 1 } N as C t = { z | t T z } . That is, z C t is a message which can be reconstructed by giving a program t to the Turing machine U with an auxiliary input ρ z B and Z. Owing to the distinguishability between ρ z B and ρ z B , for z , z C t , there exists a family of projection operators { E z t } z C t on H B satisfying for any z , z C t ,
E z t E z t = δ z z E z t z C t E z t 1 tr ( ρ z B E z t ) = δ z z
As we are interested in minimum length programs, we define D t : = { z | t = argmin s T z l ( s ) } , which is a subset of C t . z D t is a message that has t as its minimum length program for reconstruction. It is still possible that D t D t . That is, there may be a message z whose shortest programs are not unique. In such a case, we choose one of the programs to avoid counting doubly. For instance, this can be done by introducing a total order < in all the programs { 0 , 1 } * , and by defining E t = { z | z D t , z D t  for all  t < t  with  l ( t ) = l ( t ) } . As this E t is a subset of C t , for any z , z E t
E z t E z t = δ z z E z t
z E t E z t 1
tr ( ρ z B E z t ) = δ z z
hold.
For any program t { 0 , 1 } * we define a projection operator P t : = z E t ( Z z E z t 1 E ) . For any integer l 0 , we consider a projection operator P ^ l : = t : l ( t ) l P t , whose expectation value with Θ becomes
tr ( Θ P ^ l ) = t : l ( t ) l z E t P Z ( z ) tr ( ρ z B E z t )
= t : l ( t ) l z E t P Z ( z )
= 1 2 N { z | K c , U ( z | ρ z B , Z ) l }
Similarly, we treat K c , U ( x | σ x E , X ) . We can introduce S x { 0 , 1 } * a set of all programs that output x with auxiliary inputs σ x E and X. K c , U ( x | σ x E , X ) = min s S x l ( s ) holds. We can define J s : = { x | s S x } for each s and introduce a family of projection operators { F x s } x F s on H E that satisfies
tr ( F x s σ x E ) = δ x x
for each x , x J s and so on. G s : = { x | s = argmin t S x l ( t ) } and F s : = { z | z G s , z G s  for all  s < s with l ( s ) = l ( s ) } , are also defined. We consider a family of projection operators { F x s } x F s . Similarly, for any program s { 0 , 1 } * , we define a projection operator Q s : = x F s ( X x 1 B F x s ) and consider for any integer m 0 , Q ^ m : = s : l ( s ) m Q s , whose expectation value with respect to Θ is written as
tr ( Θ Q ^ m ) = 1 2 N { x | K c , U ( x | σ x E , X ) m }
(iii) Our purpose is to obtain a trade-off relationship between Equation (1) and Equation (2). It is obtained by applying the uncertainty relation, which is often regarded as the most fundamental inequality characterizing quantum mechanics. Among the various forms of the uncertainty relation, we employ the Landau-Pollak uncertainty relation for arbitrary numbers of projection operators [30]. For a finite family of projection operators { A i } and any state ρ, it holds that
i tr ( ρ A i ) 1 + i j A i A j 2 1 / 2
We apply this inequality for a family of projection operators { P t , Q s } ( l ( t ) l , l ( s ) m ) and the state Θ. As P t P t = 0 for t t and Q s Q s = 0 for s s hold thanks to E t E t = F s F s = , we obtain
tr ( Θ P ^ l ) + tr ( Θ Q ^ m ) 1 + 2 t l ( t ) l s l ( s ) m P t Q s 2 1 / 2
The term P t Q s of the right-hand side is computed as follows. As the operator norm P t Q s is written as P t Q s = sup | Ψ : | Ψ = 1 P t Q s | Ψ , we need to bound P t Q s | Ψ for any normalized vector | Ψ .
z E t x F s ( Z z X x E z t F x s ) | Ψ = z E t x F s Ψ | ( X x Z z X x E z t F x s ) | Ψ 1 / 2 = z E t x F s t r ( μ z , x t , s X x Z z X x ) Ψ | 1 A E z t F x s | Ψ 1 / 2
where we used E z t E z t = 0 for z z and F x s F x s = 0 for x x , and μ z , x t , s is a posteriori state [29] defined as a unique state satisfying the above equality.
As | tr ( μ z , x t , s X x Z z X x ) | X x Z z X x = 1 2 N holds, we obtain
z E t x F s t r ( μ z , x t , s X x Z z X x ) Ψ | 1 A E z t F x s | Ψ 1 / 2 1 2 N / 2 z E t x F s Ψ | 1 A E z t F x s | Ψ 1 / 2 1 2 N / 2
where we have used z E t E z t 1 B and x F s F x s 1 E . As | { t | l ( t ) l } | 2 l + 1 and | { s | l ( s ) m } | 2 m + 1 hold, we obtain
tr ( Θ P ^ l ) + tr ( Θ Q ^ m ) 1 + 2 l + m N + 3 2
This inequality with Equation (1) and Equation (2) derives
{ z | K c , U ( z | ρ z B , Z ) l } + { x | K c , U ( x | σ x E , X ) m } 2 N 1 + 2 l + m N + 3 2
Taking into consideration the relationship between K c , U and K U , we finally obtain
{ z | K ( z | ρ z B , Z ) l } + { x | K ( x | σ x E , X ) m } 2 N 1 + 2 l + m N 2 + c
where c is a constant. Q.E.D.
Let us consider the implication of the above theorem. As noted in the theorem, a nontrivial bound is given only for l + m N 2 c . This situation is attained when one considers the asymptotic behavior of a family of protocols governed by increasing N. We consider { z | K ( z | ρ z B , Z ) p Z N } and { x | K ( x | σ x E , X ) p x N } for some p Z , p X [ 0 , 1 ] . If p Z and p X satisfy p Z + p X < 1 , for a sufficiently large N > 0 , the right-hand side of the above theorem behaves as 2 N ( 1 + O ( 2 ϵ N ) ) for some ϵ > 0 . That is, for any p Z , p X [ 0 , 1 ) satisfying p X + p Z < 1 , there exists ϵ > 0 such that it holds
| { z | K ( z | ρ z B , Z ) p Z N } | + | { x | K ( x | σ x E , X ) p X N } | 2 N ( 1 + O ( 2 ϵ N ) )
This type of argument is common in the algorithmic information theory.
In addition, the above theorem gives the following corollaries, which should be meaningful for an asymptotically large N.
Corollary 1 There exists a trade-off relationship between max z K ( z | ρ z B , Z ) and max x K ( x | σ x E , X ) :
max z { 0 , 1 } N K ( z | ρ z B , Z ) + max x { 0 , 1 } N K ( x | σ x E , X ) N O ( 1 )
Proof: Because for l = max z K ( z | ρ z B , Z ) and m = max x K ( x | σ x E , X ) , { z | K ( z | ρ z B , Z ) l } | = 2 N and { x | K ( x | σ x E , X ) m } | = 2 N hold, the right-hand side of the above theorem must be larger than 2 N ( 1 + 1 ) . It is only possible when l + m N 2 c holds. Q.E.D.
Corollary 2 (No-cloning theorem [31,32]) Unknown states cannot be cloned (for a sufficiently large N).
Proof: Suppose that universal cloning is possible. Put H B H E H A . There should exist a CP-map Λ satisfying both Λ ( | z z | ) = | z z | | z z | and Λ ( | x ¯ x ¯ | ) = | x ¯ x ¯ | | x ¯ x ¯ | for all z , x { 0 , 1 } N . It implies that max z K ( z | ρ z B , Z ) = O ( 1 ) and max x K ( x | σ x E , X ) = O ( 1 ) . This contradicts corollary 1. Q.E.D.

4. Discussion

In this research, we study a quantum algorithmic information-theoretic representation of the information-disturbance theorem. We first discuss the relationship between Shannon’s information-theoretic theorem and our algorithmic one. Using a possible relationship between Shannon information and Kolmogorov complexity is likely to yield an inequality
z { 0 , 1 } N p Z ( z ) K ( z | ρ z B , Z ) + x { 0 , 1 } N p X ( x ) K ( x | σ x E , X ) N c
directly from Shannon’s version. This inequality is different from our theorem derived in the present paper. In fact, even if families { K ( z | ρ z B , Z ) } z and { K ( x | σ x E , X ) } x satisfy this inequality, they may not satisfy the inequality in our theorem. In fact, if we put | { z | K ( z | ρ z B , Z ) = N 2 } | = 3 · 2 N 4 , | { z | K ( z | ρ z B , Z ) = N } | = 2 N 4 , | { x | K ( x | σ x E , X ) = N 3 } | = 3 · 2 N 4 , and | { x | K ( x | σ x E , X ) = N } | = 2 N 4 , then the left-hand side of Equation (3) becomes 9 N 8 , but our theorem (with c = 0 ) is not satisfied for l = N 2 and m = N 3 . It would be interesting to investigate an inequality for Shannon’s information that corresponds to our theorem.
As mentioned in the introduction, one of the purposes of this study is to demonstrate the usage of quantum Kolmogorov complexity in the quantum information theory. Our derivation dealt with Kolmogorov complexity directly without relying on the results known in Shannon’s version of the quantum information theory. Those results imply that Kolmogorov complexity can yield meaningful results by combining it with the uncertainty relation. Thus, quantum Kolmogorov complexity by itself can be a powerful tool in the quantum information theory by itself.
In addition, as mentioned earlier, there are various quantum versions of Kolmogorov complexity. It would be interesting and important to study quantum information-theoretic problems by using these quantum versions.
While our information-disturbance theorem was formulated in a cryptographic setting, it is strongly related to Heisenberg’s uncertainty principle, which is one of the most important characteristics of quantum mechanics. According to Heisenberg’s original Gedanken experiment, a precise measurement of the momentum destroys the position of a particle. If one regards Eve’s attack as the measurement of “momentum”, the information-disturbance relationship that predicts a disturbance in the conjugate “position” corresponds to the Heisenberg’s setting. However, despite this similarity, there is a gap between our information-disturbance theorem and Heisenberg’s uncertainty principle. The latter should be formulated as a relationship that does not depend on states as was discussed in [33]. Further investigation in this direction needs to be carried out. Besides exploring subjects related to the uncertainty principle, several things need to be done. We hope that the quantum Kolmogorov complexity will shed new light on the quantum information theory.

Acknowledgments

I would like to thank K. Imafuku and anonymous referees for valuable discussions and comments.

References and Notes

  1. Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM J. Comput. 1997, 26, 1484–1509. [Google Scholar] [CrossRef]
  2. Grover, L.K. A fast quantum mechanical algorithm for database search. In Proceedings of the 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, PA, USA, 22–24 May 1996; p. 212.
  3. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India, 10–12 December 1984; p. 175.
  4. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [PubMed]
  5. Kolmogorov, A.N. Three approaches to the quantitative definition of information. Probl. Inform. Transm. 1965, 1, 1–7. [Google Scholar] [CrossRef]
  6. Chaitin, G.J. On the length of programs for computing finite binary sequences: Statistical considerations. J. Assoc. Comput. Mach. 1969, 16, 145. [Google Scholar] [CrossRef]
  7. Li, M.; Vitányi, P.M.B. An Introduction to Kolmogorov Complexity and Its Applications; Springer-Verlag: New York, NY, USA, 1997. [Google Scholar]
  8. Vitányi, P.M.B. Quantum kolmogorov complexity based on classical descriptions. IEEE Trans. Inform. Theory 2001, 47, 2464. [Google Scholar] [CrossRef]
  9. Svozil, K. Quantum algorithmic information theory. J. Univers. Comput. Sci. 1996, 2, 311. [Google Scholar]
  10. Berthiaume, A.; van Dam, W.; Laplante, S. Quantum Kolmogorov complexity. J. Comput. System. Sci. 2001, 63, 201. [Google Scholar] [CrossRef]
  11. Gacs, P. Quantum algorithmic entropy. J. Phys. A: Math. Gen. 2001, 34, 1. [Google Scholar] [CrossRef]
  12. Mora, C.; Briegel, H.; Kraus, B. Quantum Kolmogorov complexity and its applications. Int. J. Quantum Inform. 2006, 5, 12. [Google Scholar] [CrossRef]
  13. Benatti, F; Krüger, T; Müller, M; Siegmund-Schultze, R; Szkora, A. Entropy and quantum Kolmogorov complexity: A quantum Brudno’s theorem. Commun. Math. Phys. 2006, 265, 437. [Google Scholar] [CrossRef]
  14. Miyadera, T.; Imai, H. Quantum Kolmogorov complexity and quantum key distribution. Phys. Rev. A 2009, 79, 012324. [Google Scholar] [CrossRef]
  15. Boykin, P.O.; Roychowdhuri, V.P. Information vs. Disturbance in Dimension D. Quantum Inf. Comput. 2005, 5, 396. [Google Scholar]
  16. Miyadera, T.; Imai, H. Information-disturbance theorem for mutually unbiased observables. Phys. Rev. A 2006, 73, 042317. [Google Scholar] [CrossRef]
  17. Miyadera, T.; Imai, H. Information-disturbance theorem and uncertainty relation. arXiv 2007. arXiv:0707.4559. [Google Scholar]
  18. Biham, E.; Boyer, M.; Boykin, P.O.; Mor, T.; Roychowdhury, V.P. A proof of the security of quantum key distribution. J. Cryptology 2006, 19, 381. [Google Scholar] [CrossRef]
  19. Deutsch, D. Quantum theory, the church-turing principle and the universal quantum computer. Proc. Roy. Soc. Lond. A 1985, 400, 96. [Google Scholar] [CrossRef]
  20. Bernstein, A.; Vazirani, U. Quantum complexity theory. SIAM J. Comput. 1997, 26, 1411. [Google Scholar] [CrossRef]
  21. Müller, M. Strongly universal quantum turing machines and invariance of Kolmogorov complexity. IEEE Trans. Inform. Theory 2008, 54, 763. [Google Scholar] [CrossRef]
  22. Müller, M. Quantum Kolmogorov complexity and the quantum turing machine. Ph.D. Thesis, Technical University of Berlin, Berlin, Germany, 2007. [Google Scholar]
  23. Myers, J.M. Can a universal quantum computer be fully quantum? Phys. Rev. Lett. 1997, 78, 1823. [Google Scholar] [CrossRef]
  24. Linden, N.; Popescu, S. The halting problem for quantum computers. arXiv 1998. arXiv:quant-ph/9806054. [Google Scholar]
  25. Ozawa, M. Quantum nondemolition monitoring of universal quantum computers. Phys. Rev. Lett. 1998, 80, 631. [Google Scholar] [CrossRef]
  26. Miyadera, T.; Ohya, M. On halting process of quantum Turing machine. Open Sys. Info. Dyn. 2005, 12, 261. [Google Scholar] [CrossRef]
  27. The word “probabilistically” here is used to mean “randomly in a probabilistic sense”. That is, we use an unbiased probability 1/|Ω| to choose a sample from a sample space Ω (say Ω={0,1}2N). (To avoid a possible confusion of it with randomness in algorithmic sense, we just write “probabilistically”.)
  28. To treat ρ z B and σ x E as an auxiliary input for a quantum Turing machine, they have to be somehow represented as states on a system consisting of qubits. Our discussion does not depend on how we identify them.
  29. In general, a posteriori state after a measurement is determined as follows. Suppose that there exist two system A and B that are described by Hilbert spaces A and B respectively. Let us consider a state ρ over the bipartite system AB. Suppose that on A one made a measurement described by a positive-operator-valued measure (POVM) F = {Fx} and obtained an outcome x. A posteriori state on the system B conditioned with this x becomes
    ρ x = tr A ( ρ ( F x 1 ) ) tr ρ F x 1 )
    That is, it is a unique state that satisfies tr(ρxG)tr(ρ(Fx1)) = tr(ρ(FxG)) for any operator G on B.
  30. Miyadera, T.; Imai, H. Generalized Landau-Pollak uncertainty relation. Phys. Rev. A 2007, 76, 062108. [Google Scholar] [CrossRef]
  31. Wootters, W.K.; Zurek, W. A single quantum cannot be cloned. Nature 1982, 299, 802. [Google Scholar] [CrossRef]
  32. Miyadera, T.; Imai, H. No-cloning theorem on quantum logics. J. Math. Phys. 2009, 50, 102107. [Google Scholar] [CrossRef]
  33. Miyadera, T.; Imai, H. Heisenberg’s uncertainty principle for simultaneous measurement of positive-operator-valued measures. Phys. Rev. A 2008, 78, 052119. [Google Scholar] [CrossRef]

Share and Cite

MDPI and ACS Style

Miyadera, T. Quantum Kolmogorov Complexity and Information-Disturbance Theorem. Entropy 2011, 13, 778-789. https://doi.org/10.3390/e13040778

AMA Style

Miyadera T. Quantum Kolmogorov Complexity and Information-Disturbance Theorem. Entropy. 2011; 13(4):778-789. https://doi.org/10.3390/e13040778

Chicago/Turabian Style

Miyadera, Takayuki. 2011. "Quantum Kolmogorov Complexity and Information-Disturbance Theorem" Entropy 13, no. 4: 778-789. https://doi.org/10.3390/e13040778

Article Metrics

Back to TopTop