Covert Capacity of Bosonic Channels
Abstract
We investigate the quantum-secure covert-communication capabilities of lossy thermal-noise bosonic channels, the quantum-mechanical model for many practical channels. We determine the expressions for the covert capacity of these channels: , when Alice and Bob share only a classical secret, and , when they benefit from entanglement assistance. We find that entanglement assistance alters the fundamental scaling law for covert communication. Instead of , , entanglement assistance allows , , covert bits to be transmitted reliably over channel uses.
I Introduction
In contrast to standard information security methods (e.g., encryption, information-theoretic secrecy, and quantum key distribution (QKD)) that protect the transmission’s content from unauthorized access, covert or low probability of detection/intercept (LPD/LPI) communication [1, 2, 3] prevents adversarial detection of transmissions in the first place. The covertness requirement constrains the transmission power averaged over the blocklength to , where the power is either measured directly in watts [1, 2] and mean photon number [4, 5] output by a physical transmitter, or indirectly, as the frequency of non-zero symbol transmission over the discrete classical [6, 7] and quantum [8, 9] channels.
For many channels, including classical additive white Gaussian noise (AWGN) [1, 2], and discrete memoryless channels (DMCs) [6, 7], the power constraint prescribed by the covertness requirement imposes the square root law (SRL): no more than covert bits can be transmitted reliably in channel uses. We call constant the covert capacity of a channel, since it only depends on the channel parameters and captures a fundamental limit. Attempting to transmit more results in either detection by the adversary with high probability as , or unreliable transmission. Even though the Shannon capacity [10] of such channels is zero (since ), the SRL allows reliable transmission of a significant number of covert bits for large .
To date, the focus has been on classical covert communication. However, quantum mechanics governs the fundamental laws of nature, and quantum information theory [11, 12] is required to determine the ultimate limits of any communications system. Here we focus on the lossy thermal noise bosonic channel depicted in Fig. 1, called the bosonic channel for brevity, and formally described in Section II-B. The bosonic channel is a quantum-mechanical model of many practical channels (including optical, microwave, and radio frequency (RF)). This channel is parametrized by the power coupling (transmissivity) between the transmitter Alice and the intended receiver Bob, and the mean photon number per mode injected by the thermal environment, where a single spatial-temporal-polarization mode is our fundamental transmission unit. We call a covert communication system quantum secure when it is robust against an adversary Willie who not only knows the transmission parameters (including the start time, center frequency, duration, and bandwidth), but also has access to all the transmitted photons that are not captured by Bob, as well as arbitrary quantum information processing resources (e.g., joint detection measurement, quantum memory, and quantum computing). While our approach is motivated by the security standards from the QKD literature, covertness demands a different set of assumptions. We require excess noise that is not under Willie’s control (e.g., the unavoidable thermal noise from the blackbody radiation at the center wavelength of transmission and the receiver operating temperature). This assumption is not only well-grounded in practice, but also necessary for covertness, as the transmissions cannot be hidden from quantum-capable Willie that fully controls noise on the channel [4, Th. 1],[13]. Finally, we assume that Alice and Bob share a resource that is inaccessible by Willie. This enables covertness irrespective of channel conditions, as well as substantially increases the number of reliably-transmissible covert bits when the resource is an entangled quantum state.

In [5] we develop an expression for the maximum mean photon number that Alice can transmit under the aforementioned quantum-secure covertness conditions. We also present the expression for the covert capacity for the bosonic channel and argue that it is achievable using a random coding scheme. However, [5] focuses on the prescription for maintaining covertness of a transmission, with the capacity proofs left out. Here, we fill in this gap by rigorously examining the coding limits for covert communication over the bosonic channels.

Our main contribution is the analysis of the covert communication system depicted in Fig. 2 and formally described in Sec. II-C, with and without an entangled resource state shared by Alice and Bob. Since entanglement assistance gain manifests only when and , we expect it to benefit covert communication. We find that entanglement assistance, in fact, alters the fundamental scaling law of covert communication. Using the asymptotic notation defined in Sec. II-A:
-
1.
We show that without entanglement assistance, the SRL has a standard form: , , covert bits transmissible reliably over channel uses. Our second-order bound is similar to classical [14]: , where is the average decoding error probability and is the inverse-Gaussian cumulative distribution function.111Note that for . We also show that quadrature phase shift keying (QPSK) modulation achieves the same constants and as the optimal Gaussian modulation.
-
2.
We show that with entanglement assistance, the scaling law becomes , . We derive the expression for the optimal constant and the second-order bound.222Our fundamental information unit is a bit and indicates the binary logarithm, while is the natural logarithm. While a practical-receiver structure that achieves is an open problem, we discuss a design [15] that achieves the scaling law, albeit with a constant .
Next, we present the mathematical prerequisites, including the asymptotic notation, the channel and system models, the formal definitions of covertness and reliability, and the bounds we need. We state and prove our results in Sec. III. We conclude with the discussion of future work in Sec. IV, including investigating the shared resource state size, the entanglement-assisted receiver design for covert communication, and the possible relationship of the scaling law for entanglement-assisted covert communication to a corner case in classical and non-entanglement assisted classical-quantum covert communication.
II Prerequisites
II-A Asymptotic notation
We use the standard asymptotic notation [16, Ch. 3.1], where denotes an asymptotic upper bound on (i.e. there exist constants such that for all ) and denotes an upper bound on that is not asymptotically tight (i.e. for any constant , there exists constant such that for all ). We note that is equivalent to and is equivalent to .
II-B Channel model
We focus on a single-mode lossy thermal noise bosonic channel in Fig. 1. It quantum-mechanically describes the transmission of a single (spatio-temporal-polarization) mode of the electromagnetic field at a given transmission wavelength (such as optical or microwave) over linear loss and additive Gaussian noise (such as noise stemming from blackbody radiation). Here, we introduce the bosonic channel briefly, deferring the details to [17, 18, 19, 20]. The attenuation in the Alice-to-Bob channel is modeled by a beamsplitter with transmissivity (fractional power coupling) . The input-output relationship between the bosonic modal annihilation operators of the beamsplitter, , requires the “environment” mode to ensure that the commutator , and to preserve the Heisenberg uncertainty law of quantum mechanics. On the contrary, classical power attenuation is described by , where and are complex amplitudes of input and output mode functions. Bob captures a fraction of Alice’s transmitted photons, while Willie has access to the remaining fraction. We model noise by mode being in a zero-mean thermal state , respectively expressed in the coherent state (quantum description of ideal laser light) and Fock (photon number) bases as follows:
(1) |
where
(2) |
and is the mean photon number per mode injected by the environment.
II-C System model
The covert communication framework is depicted in Fig. 2. Our fundamental transmission unit is the field mode described above. We assume a discrete-time model with modes available to Alice and Bob. is the number of orthogonal temporal modes, which is the product of the transmission duration (in seconds) and the optical bandwidth (in Hz) of the source around its center frequency, and the factor of two corresponds to the use of both orthogonal polarizations. The orthogonality of the available modes results in the bosonic channel being memoryless. Alice and Bob have access to a bipartite resource state occupying systems at Alice and at Bob. Correlations between parts of in systems and can either be classical or quantum, resulting in either a classical-quantum or an entangled state . The latter allows entanglement-assisted communication.
II-D Coding and reliability
Alice desires to transmit one of equally-likely -bit messages covertly to Bob using available modes of the bosonic channel and her share of the resource state . Her encoder is a set of encoding channels . Alice encodes message by acting on systems of with , transforming to . Transmission of the resulting systems over uses of results in Bob receiving the state , where denotes the partial trace over system . Bob decodes by applying a positive operator-valued measure (POVM) to . Denoting by and the respective random variables corresponding to Alice’s message and Bob’s estimate of it, the average decoding error probability is:
(3) |
where . We call the communication system reliable if, for any , there exists large enough with a corresponding resource state , encoder , and decoder POVM , such that .
II-E Quantum-secure covertness
As is standard in information theory of covert communication, we assume that Willie cannot access , although he knows how it is generated. To be quantum secure, a covert communication system has to prevent the detection of Alice’s transmission by Willie, who has access to all transmitted photons that are not received by Bob and arbitrary quantum resources. Thus, the quantum state , observed by Willie when Alice is transmitting, has to be sufficiently similar to the product thermal state that describes the noise observed when she is not. We call a system covert if, for any and large enough, . Arbitrarily small implies that the performance of a quantum-optimal detection scheme is arbitrarily close to that of a random coin flip through quantum Pinsker’s inequality [12, Th. 10.8.1]. The properties of both classical and quantum relative entropy are highly attractive for mathematical proofs, and were used to analyze covert communication [1, 2, 3, 4, 5, 6, 7, 8, 9]. We discuss the significance of the quantum relative entropy in [5, Sec. II.B]. The maximum mean photon number per mode that Alice can transmit under the covertness constraint is [5]:
(4) |
where
(5) |
When the exact values for the environment mean photon number per mode and the transmissivity are unknown, Planck’s law and the diffraction-limited propagation model provide a useful lower bound. Coherent-state modulation using the continuous-valued complex Gaussian distribution [4, Th. 2] and practical QPSK scheme [5, Th. 2] achieve the constant (5).
While quantum resources, such as entanglement shared between Alice and Bob, or quantum states lacking a semiclassical description (e.g., squeezed light) do not improve signal covertness, the quantum methodology allows covertness without assumptions of adversary’s limits, other than the laws of physics. However, the square root scaling in (4) holds even when Willie uses readily-available devices such as noisy photon counters [4, Th. 5], with a constant larger than . Nevertheless, here we show that quantum resources—specifically, entanglement assistance—allow the transmission of significantly more covert bits. Next, we discuss the finite blocklength capacity bounds that we use in our proofs.
II-F Finite blocklength capacity bounds for bosonic channels
One can obtain the converse results for covert communication using the standard channel coding theorems. However, covertness introduces the dependence of the mean photon number per mode on the blocklength in (4). This complicates both classical and quantum achievability proofs by rendering invalid the conditions for employing standard results such as the asymptotic equipartition property. Classical results [6, 7] overcome this issue using the information spectrum methods [21, 22, 23]. However, until recently, quantum information spectrum approaches [24, 25] have been limited to channels with output quantum states living in the finite-dimensional Hilbert space, which is not the case for bosonic channels. We now rehash a lower bound on the second-order coding rate from [26, 27] that is based on the new quantum union bound [26].
Define quantum relative entropy between states and , and its second, third, and fourth absolute central moments as follows:
(6) | ||||
(7) | ||||
(8) | ||||
(9) |
where is quantum relative entropy variance. The finite blocklength capacity of a memoryless classical-quantum channel described in Sec. II-C is characterized as follows:
Lemma 1.
Suppose that the channel from Alice to Bob is memoryless, such that over uses . There exists a coding scheme that employs a shared resource state to transmit bits over uses of with arbitrary decoding error probability for a sufficiently large and , such that:
(10) |
where , is the Berry-Esseen constant satisfying , is Bob’s marginal state for the output of a single channel use, and is the inverse-Gaussian distribution function.
Proof:
Suppose Alice and Bob have access to bipartite systems containing copies of the resource state , with Alice restricted to system and Bob to system . Denote by the state in the bipartite system , . Alice and Bob agree to divide these systems into non-overlapping -system subsets, each mapping to a message . Denote the corresponding subsets of system indexes by . The encoding channel is thus . Alice sends to Bob by transmitting the corresponding codeword over uses of . The authors of [26, 27] call this scheme position-based coding. Bob’s received state is , where . Bob constructs binary projective measurements corresponding to each message, and applies them sequentially to . This operation, resembling a matched filter from classical communication, is called sequential decoding in [26, 27]. Its analysis in [26, Sec. 5] proves that
(11) |
where is the hypothesis testing relative entropy [28, 29] defined in [26, Eq. (5.2)] and . Specifically, [26, Corr. 8] yields (11) when is classical-quantum and [26, Th. 6] when it is entangled. The standard steps for deriving the second-order rate bounds in the proof of [26, Prop. 13] up to [26, Eq. (A.24)] yield:
(12) |
where . Substituting (12) in (11), setting , expanding at using Lagrange’s mean value theorem [30, Th. 2.3], upperbounding , and employing the convexity argument in [31, Eq. (D.3)] completes the proof. ∎
In contrast to [26], Lemma 1 does not absorb the remainder terms of in asymptotic notation, making (10) exact. This is done to account for the dependence of on imposed by the covertness constraint (4). Finally, note that skipping the convexity argument concluding the proof yields a tighter but analytically inconvenient bound using (8) instead of (9).
III Results
III-A Covert channel capacity
In classical and quantum information theory [10, 11, 12], the channel capacity is measured in bits per channel use and is expressed as , where is the total number of reliably-transmissible bits in channel uses. On the other hand, the power constraint (4) imposed by covert communication implies that and that the capacity of the covert channel is zero. Inspired by [7], we regularize the number of covert bits that are transmitted reliably without entanglement assistance by and with entanglement assistance , instead of . This approach allows us to state Definitions 1 and 2 of covert channel capacity and derive the results that follow. For consistency with [7], we also normalize the capacity by the covertness parameter , which we discuss in Section II-E.
III-B Covert communication without entanglement assistance
We define the capacity of covert communication over the bosonic channel when Alice and Bob do not have access to a shared entanglement source as follows:
Definition 1.
The capacity of covert communication without entanglement assistance is:
(13) |
where is the number of covert bits that are reliably transmissible in channel uses (modes), and parametrizes the desired covertness.
The following theorem provides the expression for :
Theorem 1.
The covert capacity of the bosonic channel without entanglement assistance is , where is defined in (5) and .
In order to prove Theorem 1, we prove the following lemma:
Lemma 2.
There exists a sequence of codes with covertness parameter , blocklength , size , and average error probability that satisfies:
(14) |
where .
Proof:
Alice and Bob follow the construction in the proof of Lemma 1 and generate a random codebook mapping -bit input blocks to -symbol codewords. Each is generated according to , where is the QPSK alphabet and is the uniform distribution over it. We set , where is defined in (4). We assume that is shared between Alice and Bob before transmission, and is kept secret from Willie. Product coherent states are modulated with amplitudes corresponding to the symbols in each codeword : . Thus, Alice transmits the maximum mean photon number that maintains covertness [5, Th. 2].
The shared resource state is the random codebook modulated by coherent states. Thus, is a classical-quantum state, system is in a coherent state , and system is in one of the orthonormal states corresponding to QPSK symbol index. Alice’s position-based encoder then selects the systems corresponding to the -symbol codeword for message , and discards the rest. Bob employs the sequential decoding strategy described in [26, Sec. 5] and [27, Sec. 3].
Since the propagation of a coherent state through the bosonic channel induces a displaced thermal state in Bob’s output port, the received state is , where displaced thermal states form an ensemble corresponding to the transmission of QPSK symbols. Letting ,
(15) | ||||
(16) |
where the von Neumann entropy is
(17) |
while and are the Holevo information and its variance for ensemble . The closed-form expressions for and are unknown, and we derive the Taylor series expansions at in Appendices A-2 and A-3:
(18) | ||||
(19) |
In Appendix A-4 we show that . We complete the proof by substituting from (4) and observing that dominates the remainder in Lemma 1. ∎
We are now ready to prove Theorem 1.
Proof:
Achievability: Dividing both sides of (14) by and taking the limit yields the achievable lower bound.
Converse: Let Alice and Bob have access to respective systems and of shared infinite-dimensional bipartite classically-correlated resource state , with arbitrary. Consider a sequence of codes such that the decoding error probability as . Then:
(20) | ||||
(21) |
where is the mutual information between random variables and corresponding to Alice’s message and Bob’s decoding of it, (20) follows from Fano’s inequality [10, Th. 2.10.1], (21) is the Holevo bound [11, Th. 12.1], [32] and is the Holevo capacity of the bosonic channel from Alice to Bob [33] with
(22) |
The Taylor series expansion of around in (21) yields:
(23) | ||||
(24) |
where (24) follows from Taylor’s theorem with the remainder [30, Ch. V.3]. Substituting (24) and (4) in (21) yields:
(25) |
Dividing both sides of (25) by and taking the limit yields the converse. ∎
Remark: Since, to our knowledge, [26, Corr. 8] was proven only for the discrete inputs, Lemma 1 does not apply to the Gaussian ensemble of coherent states directly. However, since achieves the Holevo capacity of the bosonic channel, we compare the information quantities for QPSK modulation in (18) and (19) to the corresponding ones for . Comparison of (18) and (24) confirms the well-known fact [34] that QPSK modulation achieves the Holevo capacity in the low signal-to-noise ratio (SNR) regime. We calculate the Holevo information variance for in Appendix B-2 and note that (19) and (86) have the same first term. Thus, the QPSK modulation has the same finite blocklength performance as in the low SNR regime.
III-C Entanglement-assisted covert communication
Entanglement assistance increases the communication channel capacity [35, 36]. However, in most practical settings (including optical communication where noise level is low and microwave/RF communication where signal power is high ), the gain over the Holevo capacity without entanglement assistance is at most a factor of two. The only scenario with a significant gain is when while [15, App. A]. This is precisely the covert communication setting. In fact, entanglement assistance alters the fundamental square root scaling law for covert communication, changing the normalization from to :
Definition 2.
The capacity of covert communication with entanglement assistance is:
(26) |
where is the number of covert bits that are reliably transmissible in channel uses (modes), and parametrizes the desired covertness.
The following theorem provides the expression for :
Theorem 2.
The covert capacity of the bosonic channel with entanglement assistance is , where is defined in (5) and .
Thus, while quantum resources such as shared entanglement and joint detection receivers do not affect , they dramatically impact the amount of information that can be covertly conveyed. As in the proof of Theorem 1, in order to prove Theorem 2, we prove the following lemma:
Lemma 3.
There exists a sequence of codes with covertness parameter , blocklength , size , and average error probability that satisfy:
(27) |
where .
Proof:
Let the resource state be a tensor product of a two-mode squeezed vacuum (TMSV) states such that and , where and are defined in (2) and (4), respectively. Alice and Bob use the position-based code [26, Th. 6] as in the proof of Lemma 1 and assign each message to TMSV states. Alice transmits modes corresponding to message from her part of , discarding the rest. Willie has no access to Bob’s system . Since is a thermal state, setting as in (4) ensures covertness [4, Th. 2].
We are now ready to prove Theorem 2.
Proof:
Achievability: Dividing both sides of (27) by and taking the limit yields the achievable lower bound.
Converse: Let Alice and Bob have access to respective systems and of shared infinite-dimensional bipartite entangled resource state , with arbitrary. Consider a sequence of codes such that the decoding error probability as . Then:
(32) | ||||
(33) |
where is the mutual information between random variables and corresponding to Alice’s message and Bob’s decoding of it, (32) follows from Fano’s inequality [10, Th. 2.10.1], (33) is the entanglement-assisted capacity bound [36]. Substitution of (28) and (4) into (33), division of both sides by , and the limit in (30) yields the converse. ∎
IV Discussion and conclusion
We derived the quantum-secure covert capacity for the bosonic channel with and without entanglement assistance, closing an important gap from [5]. Since entanglement assistance particularly benefits the low-SNR regime, it is expected to improve covert capacity. Surprisingly, it alters the fundamental scaling law for covert communication from to covert bits reliably transmissible in channel uses. Next, we outline follow-on questions.
IV-A Amount of shared resource
The resource state employed in the proofs of Lemmas 2 and 3 is quite large: . This is especially onerous for the entanglement-assisted communications due to the massive costs associated with generating and storing such large entangled states. While the proofs in [26] rely on the state of size , we note that our structured receiver design for entanglement-assisted communication [15] (discussed next) uses TMSV states. The quantum channel resolvability approach[24, 25] should be investigated for reducing to , as was done in [6] for classical covert communication.
IV-B Structured receiver for entanglement-assisted covert communication
The sequential decoding strategy from [27, 26] used by Bob in the proof of Lemma 3 does not correspond to any known receiver architecture. In fact, despite the entanglement-based enhancement of classical communication capacity being known for over two decades [35, 36], a strategy to achieve the full gain has been elusive until our recent work on the structured receiver for entanglement-assisted communication in [15]. The receiver in [15] combines insights from the sum-frequency generation receiver proposed for a quantum illumination radar [37, 38] and the Green Machine receiver proposed for attaining superadditive communication capacity over the bosonic channel [39]. The resulting structured receiver design realizes the logarithmic scaling gain from entanglement assistance at low SNR. Consider the approximation [15, App. A.2] of this receiver’s achievable rate (in bits/mode):
(34) |
where , , is defined in (22), and is a receiver design parameter. Fixing Bob’s receiver makes the Alice-to-Bob channel a classical DMC, allowing us to follow the achievability approach in [7] almost exactly and obtain the following approximation to its entanglement-assisted covert capacity:
(35) |
where the second approximation is valid when . Evolving the receiver [15] to achieve is an ongoing work.
IV-C Connection to the scaling law for a special case of covert communication without entanglement assistance
Finally, we describe a curious resemblance of the scaling law for entanglement-assisted covert communication presented here to that for a corner case of classical [6, Th. 7] and classical-quantum [8, Sec. VII] covert communication without entanglement assistance. Consider a simplified scenario where Alice has two fixed input states and , and is the “innocent” state that is not suspicious to Willie (e.g., vacuum). Let , , where is the Alice-to-Bob channel. Denote the support of by , and suppose that . This allows a measurement which perfectly identifies to Bob the transmission of . If Alice is restricted by the SRL to sending with probability , covert bits can be reliably transmitted in channel uses [8, Sec. VII]. This scaling law was observed prior to [8] in the classical covert DMCs with the analogous properties of the supports for corresponding Bob’s output probability distributions [6, Th. 7]. Exploring this connection could lead to new insights in entanglement-assisted communications.
Acknowledgement
Appendix A Taylor series expansion of Holevo information and its variance for QPSK modulation
A-1 Preliminaries
In order to prove Theorem 1, we must characterize the behavior of the Holevo information and its variance as a function of the transmitted mean photon number per mode for QPSK. Since the closed-form expressions for (15) and (16) are unknown, we use Taylor’s theorem:
Lemma 4 (Taylor’s theorem).
If is a function with continuous derivatives on the interval , then
where denotes the derivative of , and the Lagrange form of remainder is with satisfying .
To evaluate the Taylor series expansion, we use the following lemmas where and are non-singular operators parameterized by , and where is the identity operator.
Lemma 5 ([40, Th. 6]).
.
Lemma 6 ([40, lemma in Sec. 4]).
.
A-2 Holevo information for quadrature phase shift keying
Here, we derive the Taylor series expansion of the Holevo information defined in (15) for QPSK at the displacement . Setting in (15) yields
(36) |
where is the zero mean thermal state defined in (1), with .
Von Neumann entropy is invariant under unitary transformations. Since displacement is a unitary, , implying that . We now evaluate the derivatives of using Lemma 5:
(37) |
where . The derivatives of , , , and are as follows [41, Ch. VI, Eq. (1.31)]:
(38) | ||||
(39) | ||||
(40) | ||||
(41) |
where and denote the creation and annihilation operators, respectively. Thus,
(42) |
Setting in (42) yields . Since both terms in (37) are zero when , . Using Lemma 6, the second derivative of with respect to is as follows:
(43) |
Setting in (43) and removing terms containing yields
(44) |
where . Setting in yields
(45) |
Substitution of (45) into (44) yields
(46) |
Since is diagonal in the Fock state basis, , where , defined in (2). Now,
(47) | ||||
(48) |
since for . Thus, the traces of the first two terms in (46) cancel and we are left with
(49) |
The first term in (49) is written in the Fock state basis as
(50) | ||||
(51) | ||||
(52) |
Taking the trace and evaluating the sums yields
(53) | ||||
(54) |
The second term in (49) can be written in the Fock state basis as
(55) | ||||
(56) |
Taking the trace and evaluating the sums yields
(57) | ||||
(58) |
Summing (54) and (58) yields . Thus, the first non-zero term in the Taylor series expansion of the Holevo information is
(59) |
A-3 Holevo information variance for quadrature phase shift keying
Now we derive the Taylor series expansion of Holevo information variance defined in (16) for QPSK at the displacement . The first two derivatives of are:
(60) | ||||
(61) |
Since , contributes nothing to the first two terms of the Taylor series. The first two derivatives of are:
(62) | ||||
(63) |
Note that . Thus, does not contribute to the first two terms of the Taylor series. Next, we evaluate the derivatives of . Let be the term inside the square in . Note that . The derivative of with respect to is:
(64) |
Setting , , since . The second derivative with respect to is:
(65) | ||||
(66) |
Setting ,
(67) |
Using Lemma 5, we find that the derivative of with respect to is
(68) |
Setting ,
(69) |
since and . Substituting this term into (67) and expanding yields
(70) | |||
(71) |
Summing over yields:
(72) |
Since for and ,
(73) | ||||
(74) | ||||
(75) | ||||
(76) |
Using (74) and (76), we find the first term of (A-3) as:
(77) | ||||
(78) | ||||
(79) |
Similarly, the second term of (A-3) is:
(80) |
Thus,
Normalizing by yields the first non-zero term in the Taylor series of (16):
(81) |
A-4 Fourth central moment of Holevo information for quadrature phase shift keying
Appendix B Quantum relative entropy variance for Gaussian states
B-1 Preliminaries
Here we employ the symplectic formalism to derive the quantum relative entropy variance for Gaussian and TMSV-based modulation schemes and analyze its asymptotic behavior for small . The quantum relative entropy variance between quantum Gaussian states , with respective first moments and covariance matrices (CMs) is [42, Th. 1]:
(82) |
where is the difference of the Gibbs matrices , , and is the symplectic matrix in the representation ( is the number of modes, is the identity matrix, and is an zero matrix). A Gibbs matrix is where are the symplectic eigenvectors of , , , are the symplectic eigenvalues, and . A matrix is symplectic if it is real and satisfies . The symplectic eigenvalues , , for a quantum-mechanical system’s CM satisfy
We note that a phase shift does not play any role in calculating the quantum relative entropy variance when is a thermal product state and the rotation is applied in one of the modes of . Taking into account the correspondence of the phase shift to an orthogonal symplectic matrix , the property of symplectic matrices , and the cyclic permutation property of trace, one can see that (82) remains the same if we used or .
.
B-2 Quantum relative entropy variance without entanglement assistance
Consider the ensemble of Gaussian single-mode thermal states , , with CM , and first moments , where is the mean number of thermal photons, is a matrix, and , are -dimensional vectors. The prior classical distribution of this ensemble is Gaussian with the first moments and the CM :
(83) |
The expression for the quantum relative entropy variance of the ensemble has been derived in [43, Def. 1, Prop. 2],
(84) |
where, , , , , . For (and ), i.e., we assume that the first moments of the Gaussian states are equal to the random vector :
(85) |
The Taylor series expansion of (85) at yields:
(86) |
B-3 Quantum relative entropy variance with entanglement assistance
Here, the upper mode of a TMSV state may be phase-modulated (which we need not consider per the discussion in App. B-1) and sent through a bosonic channel of transitivity and mean thermal photon number . The lower mode does not change. The mean photon number per mode of the TMSV is . The two-mode output state is not displaced (i.e., as no displacements are involved in the TMSV nor the evolution of the state) and its CM is:
(91) |
where
(92) | ||||
(93) | ||||
(94) |
The CM (91) is determined from the CM of the TMSV,
(99) |
by applying , where the matrices describe the thermal loss channel which is applied to the upper mode of the TMSV,
(100) | ||||
(101) |
We seek the expression for the quantum relative entropy variance , where is a non-displaced Gaussian state with the CM in (91) and is the product of two non-displaced thermal states with ’s CM from (91) where all correlations (off-diagonal elements) are set to zero:
(106) |
To this end we need the symplectic spectrum of and , that is, the symplectic matrices and the diagonal matrices , such that . The CM is already in the symplectic diagonal form, with and the symplectic eigenvalues . For , the symplectic eigenvalues are:
(107) | ||||
(108) |
and the symplectic eigenvectors (organized into a symplectic matrix),
(113) |
where,
(114) | ||||
(115) |
Using (107), (108), (114), and (115), one can verify that is the symplectic diagonal form of : since , is symplectic, and .
B-4 Fourth central moment of quantum relative entropy for Gaussian states
Consider zero-mean quantum Gaussian states , with and CMs . The steps in the derivation of the fourth central moment are similar to those leading to (82) in the proof of [42, Th. 1]. Inspection of [42, App. B] yields:
(128) |
where obtaining numerical constants , involves applying the commutation relationships of the quadrature operators and Isselsis’ theorem [44], as is done to derive in [42, App. B]. We omit this calculation, as we are interested only in how scales with when and are defined in (91) and (106), respectively. The first-order expansion of around yields . The logarithm is taken to the fourth power, since it enters through , which is multiplied at most four times in (128).
References
- [1] B. A. Bash, D. Goeckel, and D. Towsley, “Square root law for communication with low probability of detection on AWGN channels,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Cambridge, MA, Jul. 2012.
- [2] ——, “Limits of reliable communication with low probability of detection on AWGN channels,” IEEE J. Select. Areas Commun., vol. 31, no. 9, pp. 1921–1930, 2013.
- [3] B. A. Bash, D. Goeckel, S. Guha, and D. Towsley, “Hiding information in noise: Fundamental limits of covert wireless communication,” IEEE Commun. Mag., vol. 53, no. 12, 2015.
- [4] B. A. Bash, A. H. Gheorghe, M. Patel, J. L. Habif, D. Goeckel, D. Towsley, and S. Guha, “Quantum-secure covert communication on bosonic channels,” Nat. Commun., vol. 6, Oct. 2015.
- [5] M. S. Bullock, C. N. Gagatsos, S. Guha, and B. A. Bash, “Fundamental limits of quantum-secure covert communication over bosonic channels,” IEEE J. Select. Areas Commun., vol. 38, no. 3, pp. 471–482, Mar. 2020.
- [6] M. R. Bloch, “Covert communication over noisy channels: A resolvability perspective,” IEEE Trans. Inf. Theory, vol. 62, no. 5, pp. 2334–2354, May 2016.
- [7] L. Wang, G. W. Wornell, and L. Zheng, “Fundamental limits of communication with low probability of detection,” IEEE Trans. Inf. Theory, vol. 62, no. 6, pp. 3493–3503, Jun. 2016.
- [8] A. Sheikholeslami, B. A. Bash, D. Towsley, D. Goeckel, and S. Guha, “Covert communication over classical-quantum channels,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Barcelona, Spain, Jul. 2016, arXiv:1601.06826 [quant-ph].
- [9] L. Wang, “Optimal throughput for covert communication over a classical-quantum channel,” in Proc. Inform. Theory Workshop (ITW), Cambridge, UK, Sep. 2016, pp. 364–368, arXiv:1603.05823 [cs.IT].
- [10] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed. John Wiley & Sons, Hoboken, NJ, 2002.
- [11] M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information. New York, NY, USA: Cambridge University Press, 2000.
- [12] M. Wilde, Quantum Information Theory, 2nd ed. Cambridge University Press, 2016, arXiv:1106.1445v7.
- [13] M. Tahmasbi and M. R. Bloch, “Framework for covert and secret key expansion over classical-quantum channels,” Phys. Rev. A, vol. 99, p. 052329, May 2019.
- [14] ——, “First and second order asymptotics in covert communication,” IEEE Trans. Inf. Theory, vol. 65, no. 4, pp. 2190–2212, Apr. 2019.
- [15] S. Guha, Q. Zhuang, and B. A. Bash, “Infinite-fold enhancement in communications capacity using pre-shared entanglement,” in Proc. IEEE Int. Symp. Inform. Theory (ISIT), Jun. 2020, arXiv:2001.03934 [quant-ph].
- [16] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, Introduction to Algorithms, 2nd ed. Cambridge, Massachusetts: MIT Press, 2001.
- [17] G. S. Agarwal, Quantum Optics. Cambridge, UK: Cambridge University Press, 2012.
- [18] M. O. Scully and M. S. Zubairy, Quantum Optics. Cambridge, UK: Cambridge University Press, 1997.
- [19] M. Orszag, Quantum Optics, 3rd ed. Berlin, Germany: Springer, 2016.
- [20] J. H. Shapiro, “6.453 Quantum Optical Communication,” Massachusetts Institute of Technology: MIT OpenCouseWare, Fall 2016, http://ocw.mit.edu.
- [21] T. S. Han and S. Verdu, “Approximation theory of output statistics,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 752–772, May 1993.
- [22] T. S. Han, Information-Spectrum Methods in Information Theory. Berlin, Germany: Springer Verlag, 2003.
- [23] Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–2359, May 2010.
- [24] M. Hayashi and H. Nagaoka, “General formulas for capacity of classical-quantum channels,” IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1753–1768, Jul. 2003.
- [25] H. Nagaoka and M. Hayashi, “An information-spectrum approach to classical and quantum hypothesis testing for simple hypotheses,” IEEE Trans. Inf. Theory, vol. 53, no. 2, pp. 534–549, Feb. 2007.
- [26] S. K. Oskouei, S. Mancini, and M. M. Wilde, “Union bound for quantum information processing,” Proc. Roy. Soc. A, vol. 475, no. 2221, p. 20180612, 2019.
- [27] M. M. Wilde, “Position-based coding and convex splitting for private communication over quantum channels,” Quantum Inf. Process., vol. 16, no. 10, p. 264, Sep. 2017.
- [28] F. Buscemi and N. Datta, “The quantum capacity of channels with arbitrarily correlated noise,” IEEE Trans. Inf. Theory, vol. 56, no. 3, pp. 1447–1460, 2010.
- [29] L. Wang and R. Renner, “One-shot classical-quantum capacity and hypothesis testing,” Phys. Rev. Lett., vol. 108, p. 200501, May 2012.
- [30] S. Lang, Undergraduate Analysis, 2nd ed. New York, NY: Springer-Verlag, 1997.
- [31] E. Kaur and M. M. Wilde, “Upper bounds on secret-key agreement over lossy thermal bosonic channels,” Phys. Rev. A, vol. 96, p. 062318, Dec. 2017.
- [32] A. S. Holevo, “Bounds for the quantity of information transmitted by a quantum communication channel,” Problems Inf. Transmiss., vol. 9, pp. 177–183, 1973.
- [33] V. Giovannetti, R. García-Patrón, N. Cerf, and A. Holevo, “Ultimate classical communication rates of quantum optical channels,” Nat. Photon., vol. 8, no. 10, pp. 796–800, 2014.
- [34] F. Lacerda, J. M. Renes, and V. B. Scholz, “Coherent-state constellations and polar codes for thermal gaussian channels,” Phys. Rev. A, vol. 95, p. 062343, Jun. 2017.
- [35] C. H. Bennett, P. W. Shor, J. A. Smolin, and A. V. Thapliyal, “Entanglement-assisted capacity of a quantum channel and the reverse shannon theorem,” IEEE Trans. Inform. Theory, vol. 48, no. 10, pp. 2637–2655, Oct. 2002.
- [36] V. Giovannetti, S. Lloyd, L. Maccone, and P. W. Shor, “Broadband channel capacities,” Phys. Rev. A, vol. 68, p. 062323, Dec. 2003.
- [37] Q. Zhuang, Z. Zhang, and J. H. Shapiro, “Optimum mixed-state discrimination for noisy entanglement-enhanced sensing,” Phys. Rev. Lett., vol. 118, p. 040801, Jan. 2017.
- [38] H. Shi, Z. Zhang, and Q. Zhuang, “Practical route to entanglement-assisted communication over noisy bosonic channels,” Phys. Rev. Applied, vol. 13, p. 034029, Mar. 2020.
- [39] S. Guha, “Structured optical receivers to attain superadditive capacity and the holevo limit,” Phys. Rev. Lett., vol. 106, no. 24, p. 240502, Jun. 2011.
- [40] H. E. Haber, “Notes on the matrix exponential and logarithm,” http://scipp.ucsc.edu/~haber/webpage/MatrixExpLog.pdf, accessed Dec. 14, 2019, May 2019.
- [41] C. W. Helstrom, Quantum Detection and Estimation Theory. New York, NY, USA: Academic Press, Inc., 1976.
- [42] M. M. Wilde, M. Tomamichel, S. Lloyd, and M. Berta, “Gaussian hypothesis testing and quantum illumination,” Phys. Rev. Lett., vol. 119, p. 120501, Sep. 2017.
- [43] M. M. Wilde, S. Khatri, E. Kaur, and S. Guha, “Second-order coding rates for key distillation in quantum key distribution,” arXiv:1910.03883 [quant-ph], 2019.
- [44] L. Isserlis, “On a formula for the product-moment coefficient of any order of a normal frequency distribution in any number of variables,” Biometrika, vol. 12, no. 1/2, pp. 134–139, 1918.