This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Efficient LOCC extraction of quantum information encoded in stabilizer codes

Koki Shiraishi [email protected] Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo, Japan    Hayata Yamasaki Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo, Japan    Mio Murao Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo, Japan
Abstract

We construct a protocol for extracting distributed single-qubit quantum information encoded in a stabilizer code of multiple qubits, only by single-qubit local operations and classical communication (LOCC) without global operations or entanglement resources. This protocol achieves efficient extraction within a polynomial time in terms of the number of physical qubits. We apply this protocol to a setting of quantum information splitting where a subset of spatially separated parties cooperate by classical communication to extract quantum information shared among all the parties. For this task, our LOCC extraction protocol allows designing hierarchical information access structures among the parties, where the minimum number of parties required to cooperate depends on the location of extracting the shared quantum information. Extraction of quantum information encoded in the stabilizer code appears widely in distributed quantum information processing, such as quantum secret sharing. Our results allow such distributed quantum information processing without entanglement costs.

I Introduction

Connecting multiple quantum computers by classical and quantum communication channels enables various types of distributed quantum tasks [1, 2], such as quantum secret sharing [3, 4, 5]. In general, distributed quantum tasks require global quantum operation between distant quantum computers. Such global quantum operations are implemented by two-qubit gates across the distant qubits. To perform global two-qubit gates, one has to implement (or simulate) quantum communication between the qubits in different quantum computers, for example, by coherently transporting physical qubits [6] or by consuming preshared entanglement resources [7, 8, 9, 10, 11]. However, such quantum communication is costly to realize especially when quantum computers to be connected are further apart from each other.

For the cases that quantum communication should be avoided as much as possible, it is important to understand what kind of quantum tasks are still achievable without quantum communication. The class of quantum operations implementable without quantum communication is called local operations and classical communication (LOCC) [12, 13, 14] and played a fundamental role in the development of entanglement theory [15, 16, 13]. There are some cases where distributed quantum tasks are achievable only by LOCC, such as distinguishing quantum states by LOCC [17, 18] and recovering shared classical information by LOCC [19, 20, 21]. These tasks aim to extract classical information encoded in a quantum state.

In this paper, we analyze a quantum task to extract single-qubit quantum information distributed among multiple qubits to one of the qubits when we introduce parties each of whom holds only one qubit and can perform LOCC on each qubit [22, 23]. In this task, single-qubit quantum information is represented by an unknown single-qubit state α|0+β|1\alpha\ket{0}+\beta\ket{1} and distributed among multiple qubits as a quantum state α|ψ0+β|ψ1\alpha\ket{\psi_{0}}+\beta\ket{\psi_{1}}, where |ψ0\ket{\psi_{0}} and |ψ1\ket{\psi_{1}} are mutually orthogonal quantum states of the multiple qubits distributed to the parties. Extracting quantum information to a party is defined as a decoding transformation from a quantum state α|ψ0+β|ψ1\alpha\ket{\psi_{0}}+\beta\ket{\psi_{1}} on the multiple qubits to a single-qubit state α|0+β|1\alpha\ket{0}+\beta\ket{1} on a qubit at one of the parties. For example, recovering quantum information in the quantum secret sharing [3, 4, 5] and decoding of the quantum codes [24, 25, 26] can be considered as extracting quantum information.

Quantum information encoded in the generic quantum codes cannot be extracted only by LOCC without entanglement resources in general [23, 22, 27]. However, there are several individual examples where extraction is possible only by LOCC. If the logical basis {|ψ0,|ψ1}\{\ket{\psi_{0}},\ket{\psi_{1}}\} is represented by particular graph states, it has been already known how to extract quantum information by LOCC as a part of the protocol of quantum secret sharing [28, 29, 30, 31]. There are also cases where extraction is possible without entanglement resources but it requires two-way LOCC [27, 32].

We provide a class of cases where LOCC extraction is possible, rather than individual examples by proving that single-qubit quantum information encoded in the stabilizer codes can always be extracted to one of the parties only by LOCC. We construct a protocol to extract single-qubit quantum information to an assigned party with one-way LOCC without entanglement resources when quantum information is encoded in stabilizer codes. Our algorithm to find such a protocol is based on a graph-theoretical representation of the decoding operations using graph states [33]. This algorithm works efficiently within a polynomial time in terms of the number of qubits, due to the efficiency of transforming the graphs.

We further investigate the minimum number of cooperative parties required for LOCC extraction of quantum information encoded in stabilizer codes. In general, some of the parties do not have to be cooperative; that is, LOCC involved only by a cooperative subset of the parties can achieve extraction of quantum information, irrespective to local operations performed by the other uncooperative parties. We find a type of stabilizer codes where the minimum required number of cooperative parties for extraction can be identified. The number of parties that need to cooperate for extraction depends on the assignment of the party to which the information is extracted. The difference in the minimum number of parties for extraction implies a hierarchical structure of distributing quantum information. The larger minimum number of parties indicates quantum information is “more non-locally distributed” as it requires the cooperation of more parties.

This hierarchical structure can be applied to construct a particular type of quantum information splitting (QIS) [34, 35, 36, 37, 38, 39, 29, 31, 30]. The QIS is a technique for sharing quantum information among multiple parties. We consider a type of QIS where the parties cannot perform quantum communication, and the quantum information has to be recovered only with LOCC, which we call LOCC-QIS. In the QIS shown in Refs. [29, 30, 31], the hierarchical structures of authorities to access quantum information are presented. Our analysis generalizes the hierarchical structure to more complex ones among more parties in the LOCC setting and provides a stepping stone to understanding hierarchical QIS protocols in a unified manner using graphs for the graph states.

The rest of this paper is organized as follows. In Sec. II, we introduce definitions of the task of extracting quantum information and present the preliminary materials on quantum information extracting tasks, stabilizer codes, and graph states. In Sec. III, we present our main result, Theorem 5 for extracting single-qubit quantum information encoded in a stabilizer code on multiple qubits to a specified qubit by LOCC. In Sec. IV, we provide applications of the protocol for LOCC-QIS obtained in Theorem 5 to Theorem 6. Our conclusion is given in Sec. V.

II settings and Preliminaries

In this section, we define the task of extraction of quantum information and introduce preliminaries. In Sec. II.1 definitions of our task are given. In Sec. II.2 we state useful lemmas of preceding works for the analysis of the task. In Sec. II.3 we summarize a definition of the stabilizer code, by which the quantum information is encoded in our setting; then, we also provide a summary of graph states, which are used in our analysis.

II.1 Settings

We introduce settings and notations about multipartite systems. We consider nn parties labeled by an integer j{1,,n}j\in\{1,...,n\}, and each party has a quantum system represented by a complex Hilbert space. In this paper, (j)\mathcal{H}^{(j)} denotes the Hilbert space associated with party jj and the nn-partite system shared among the nn parties is represented by the tensor product of (j)\mathcal{H}^{(j)}, i.e., j=1n(j)\bigotimes_{j=1}^{n}\mathcal{H}^{(j)}. Each party jj only performs local quantum operations on (j)\mathcal{H}^{(j)}, and classical communication of the outcome of the measurements on (j)\mathcal{H}^{(j)} between the parties. Quantum operations on the systems held by the other parties and quantum communication between the parties are not allowed. Such a set of quantum operations is called LOCC (local operations and classical communication) [14]. We consider the cases where (j)\mathcal{H}^{(j)} is a qubit, that is, (j)=2\mathcal{H}^{(j)}=\mathbb{C}^{2}. single-qubit quantum information encoded in a nn-qubit system j=1n(j)\bigotimes_{j=1}^{n}\mathcal{H}^{(j)} is represented as a quantum state of a two-dimensional subspace (S)\mathcal{H}^{(S)} of the nn-qubit Hilbert space. We focus on the cases when (S)\mathcal{H}^{(S)} is a stabilizer code space specified by a stabilizer SS, which will be defined in Sec. II.3.

Let \mathcal{H} be a finite-dimensional Hilbert space, ()\mathcal{B}(\mathcal{H}) be the set of bounded linear operators on \mathcal{H}, and 𝒟()\mathcal{D}(\mathcal{H}) be the set of density operators. A quantum state is represented by an element in 𝒟()\mathcal{D}(\mathcal{H}). A quantum state ρ\rho in a two-dimensional Hilbert space can be represented by using an orthonormal basis called the computational basis {|0,|1}\{\ket{0},\ket{1}\} as ρ=a,b=0,1ρab|ab|\rho=\sum_{a,b=0,1}\rho_{ab}\ket{a}\bra{b}. Let {|a(S):a=0,1}\{\ket{a}^{(S)}:a=0,1\} and {|a(j):a=0,1}\{\ket{a}^{(j)}:a=0,1\} be the bases of (S)\mathcal{H}^{(S)} and (j)\mathcal{H}^{(j)}, respectively. The basis {|a(S):a=0,1}\{\ket{a}^{(S)}:a=0,1\} of the code space is called the logical basis. Then extraction of quantum information to party jj is defined as the task to transform ρ(S)=a,b=0,1ρab|ab|(S)\rho^{(S)}=\sum_{a,b=0,1}\rho_{ab}\ket{a}\bra{b}^{(S)} shared over nn parties to ρ(j)=a,b=0,1ρab|ab|(j)\rho^{(j)}=\sum_{a,b=0,1}\rho_{ab}\ket{a}\bra{b}^{(j)} of party jj by performing a quantum operation over the multipartite system. This quantum operation is represented by a completely positive and trace-preserving (CPTP) map from (k=1n(k))\mathcal{B}(\bigotimes_{k=1}^{n}\mathcal{H}^{(k)}) to ((j))\mathcal{B}(\mathcal{H}^{(j)}) [40]. By extraction of quantum information, the quantum information spread over the multipartite system is localized to party jj, and the quantum information becomes accessible by local operations on (j)\mathcal{H}^{(j)}.

Our interest is the condition when extraction of quantum information is achievable by LOCC. In the following, a CPTP map that represents LOCC is called an LOCC map. Now, we define the task of extracting quantum information to party jj by LOCC as follows.

Definition 1 (LOCC extraction of quantum information).

Given a party j{1,,n}j\in\{1,\ldots,n\}, let U:k=1n(k)(j)U:\bigotimes_{k=1}^{n}\mathcal{H}^{(k)}\to\mathcal{H}^{(j)} be an isometry map which transforms the logical basis {|a(S):a=0,1}\{\ket{a}^{(S)}:a=0,1\} of (S)\mathcal{H}^{(S)} to the computational basis {|a(j):a=0,1}\{\ket{a}^{(j)}:a=0,1\} of (j)\mathcal{H}^{(j)}. LOCC extraction of quantum information to party jj is a task represented by an LOCC map 𝒞(Sj)\mathcal{C}^{(S\to j)} which satisfies, for any quantum state ρ(S)𝒟((S))\rho^{(S)}\in\mathcal{D}(\mathcal{H}^{(S)}),

𝒞(Sj)(ρ(S))=Uρ(S)U𝒟((j)).\mathcal{C}^{(S\to j)}(\rho^{(S)})=U\rho^{(S)}U^{\dagger}\in\mathcal{D}(\mathcal{H}^{(j)}). (1)

We give an example of LOCC extraction of single-qubit quantum information encoded in two qubits in Appendix A.1.

II.2 Preliminaries of extracting tasks

To complete extraction of quantum information, we have to explicitly construct the LOCC map 𝒞\mathcal{C} that extracts an arbitrary input state ρ(S)𝒟((S))\rho^{(S)}\in\mathcal{D}(\mathcal{H}^{(S)}). In this section, we describe how to simplify this construction of the LOCC map based on Ref. [23].

By purification of quantum states [40], any quantum state ρ𝒟()\rho\in\mathcal{D}(\mathcal{H}) is represented by a pure state in a composite system represented by (R)\mathcal{H}^{(R)}\otimes\mathcal{H}, where (R)\mathcal{H}^{(R)} represents a reference system and dim(R)=dim\dim\mathcal{H}^{(R)}=\dim\mathcal{H}. The introduction of the reference system is useful for analyzing extraction of quantum information. The following lemma shows that extraction of quantum information to party jj is equivalent to a task to transform the maximally entangled state between (R)\mathcal{H}^{(R)} and (S)\mathcal{H}^{(S)} to the maximally entangled state between (R)\mathcal{H}^{(R)} and (j)\mathcal{H}^{(j)}. Here, the maximally entangled state between (R)\mathcal{H}^{(R)} and (S)\mathcal{H}^{(S)} is

|Φ(RS)(|0(R)|0(S)+|1(R)|1(S))/2\ket{\Phi}^{(RS)}\coloneqq(\ket{0}^{(R)}\ket{0}^{(S)}+\ket{1}^{(R)}\ket{1}^{(S)})/\sqrt{2} (2)

and that between (R)\mathcal{H}^{(R)} and (j)\mathcal{H}^{(j)}

|Φ(Rj)(|0(R)|0(j)+|1(R)|1(j))/2.\ket{\Phi}^{(Rj)}\coloneqq(\ket{0}^{(R)}\ket{0}^{(j)}+\ket{1}^{(R)}\ket{1}^{(j)})/\sqrt{2}. (3)

Due to the following lemma, it suffices to construct a map given by

id(R)𝒞(Sj):|ΦΦ|(RS)|ΦΦ|(Rj),\mathrm{id}^{(R)}\otimes\mathcal{C}^{(S\to j)}:~{}\ket{\Phi}\bra{\Phi}^{(RS)}\mapsto\ket{\Phi}\bra{\Phi}^{(Rj)}, (4)

to seek an LOCC map extracting quantum information to party jj.

Lemma 1.

State transformation equivalent to extraction of quantum information, a corollary of Proposition 3 in Ref.  [23]: LOCC extraction of quantum information to party jj defined as Definition 1 is achievable if and only if we have an LOCC map 𝒞(Sj)\mathcal{C}^{(S\to j)}satisfying

id(R)𝒞(Sj)(|ΦΦ|(RS))=|ΦΦ|(Rj),\mathrm{id}^{(R)}\otimes\mathcal{C}^{(S\to j)}\left(\ket{\Phi}\bra{\Phi}^{(RS)}\right)=\ket{\Phi}\bra{\Phi}^{(Rj)}, (5)

where id(R)\mathrm{id}^{(R)} denotes the identity map for operators on (R)\mathcal{H}^{(R)}.

We give an example of the state transformation equivalent to the extraction of single-qubit quantum information encoded in two qubits in Appendix A.2.

II.3 Preliminaries for Stabilizer Code and Graph State

We introduce the stabilizer code and the graph state in this subsection. In the following, the Pauli operators and the identity on a qubit are denoted by X,Y,ZX,Y,Z, and II, respectively. Their matrix representations in the basis {|0,|1}\{\ket{0},\ket{1}\} are,

X=(0110),Y=(0ii0),Z=(1001)andI=(1001).X=\matrixquantity(0&1\\ 1&0),~{}Y=\matrixquantity(0&-i\\ i&0),~{}Z=\matrixquantity(1&0\\ 0&-1)~{}\text{and}~{}I=\matrixquantity(1&0\\ 0&1). (6)

The Hadamard gate is denoted by HH, which satisfies H|0=|+H\ket{0}=\ket{+} and H|1=|H\ket{1}=\ket{-} where |±\ket{\pm} is defined by |±=12(|0±|1)\ket{\pm}=\frac{1}{\sqrt{2}}(\ket{0}\pm\ket{1}).

A stabilizer is defined as an abelian subgroup of a Pauli group, where the Pauli group on nn qubits is defined as the group generated by Pauli operators on each qubit. For any stabilizer SS on nn qubits, there exists an element |ψ\ket{\psi} in j=1n(j)\bigotimes_{j=1}^{n}\mathcal{H}^{(j)} which is stabilized by SS, i.e., s|ψ=|ψs\ket{\psi}=\ket{\psi} for all sSs\in S. If a stabilizer SS is generated by nmn-m independent operators, the set of elements stabilized by SS is a 2m2^{m}-dimensional linear subspace of j=1n(j)\bigotimes_{j=1}^{n}\mathcal{H}^{(j)} and called a stabilizer code. If the stabilizer SS on nn qubits is generated by nn independent generators, the pure state |S\ket{S} stabilized by SS is uniquely determined since the subspace stabilized by SS is one-dimensional. We call this pure state |S\ket{S} the stabilizer state stabilized by SS.

The graph state [33] can be used to analyze tasks of extracting quantum information encoded in the stabilizer code. For a given graph G=(V,E)G=(V,E), the graph state |G\ket{G} is defined as follows assuming GG to be a simple graph. Let G=(V,E)G=(V,E) be a graph with |V|=n|V|=n and qubits (j)(j=1,,n)\mathcal{H}^{(j)}~{}(j=1,\cdots,n) be associated with each vertex jj in V={j}j=1nV=\{j\}_{j=1}^{n}. We use the same index jj to represent the party, the qubit, and the vertex. Graph state |G\ket{G} is a pure state of nn qubits represented by

|G={j,k}ECZ(jk)l=1n|+(l),\ket{G}=\prod_{\{j,k\}\in E}CZ^{(jk)}\bigotimes_{l=1}^{n}\ket{+}^{(l)}, (7)

where CZ(jk)CZ^{(jk)} is the controlled ZZ gate on two qubits jj and kk acting as

CZ(jk)|a(j)|b(k)={|a(j)|b(k)(if a=b=1),|a(j)|b(k)(otherwise).CZ^{(jk)}\ket{a}^{(j)}\ket{b}^{(k)}=\begin{cases}-\ket{a}^{(j)}\ket{b}^{(k)}&(\text{if }a=b=1),\\ \ket{a}^{(j)}\ket{b}^{(k)}&(\text{otherwise}).\end{cases} (8)

The graph state |G\ket{G} can also be defined as the unique pure state of j=1n(j)\bigotimes_{j=1}^{n}\mathcal{H}^{(j)} fixed by the stabilizer generated by nn operators

Sj=X(j)kNjZ(k),(j=1,,n),S_{j}=X^{(j)}\otimes\bigotimes_{k\in N_{j}}Z^{(k)},~{}(j=1,\cdots,n), (9)

where a superscript of a Pauli operator corresponds to the superscript of the Hilbert space to which each Pauli operator acts, and NjN_{j} is the set of vertices kk adjacent to jj, i.e., those satisfying {k,j}E\{k,j\}\in E. Therefore, a graph state is a stabilizer state. In addition, any stabilizer state can be transformed to a graph state by a local Clifford (LC) operation, which is a local unitary operation transforming a Pauli operator to a Pauli operator [33]. We say two quantum states ρ\rho and σ\sigma of a multiqubit system are LC equivalent if there exists a local Clifford operation \mathcal{E} which satisfies (ρ)=σ\mathcal{E}(\rho)=\sigma.

Proposition 2.

LC equivalence between a stabilizer state and a graph state [33]: For any stabilizer state |S\ket{S} of nn qubits, there exists a graph state |G\ket{G} that is LC equivalent to |S\ket{S}, i.e., |SS|=(|GG|)\ket{S}\bra{S}=\mathcal{E}(\ket{G}\bra{G}) for some LC operation \mathcal{E}. This LC operation and the graph state |G\ket{G} can be calculated in (n2)\order{n^{2}} time.

In LOCC extraction of quantum information, a projective measurement in the eigenbasis of a Pauli operator on a party called a local Pauli measurement (LPM), plays an important role as will be shown in Sec. III. The LPMs on quantum states of an nn-qubit stabilizer code can be classically simulated in a polynomial time in terms of nn. This fact is known as the Gottesman-Knill theorem [41, 42]. One could use this property for seeking efficient extraction of quantum information encoded in a stabilizer code, but in this paper, we use the fact that the stabilizer state is LC equivalent to the graph state and that LPMs can be efficiently simulated by representing LPMs as a transformation of the graph such as eliminating vertices and local complementations [33].

The graph obtained by eliminating vertex jj from graph G=(V,E)G=(V,E) is represented by Gj=(V,E)G-j=(V^{\prime},E^{\prime}), where

V=V{j},E=E{{j,k}:{j,k}E}.V^{\prime}=V\setminus\{j\},~{}E^{\prime}=E\setminus\{\{j,k\}:\{j,k\}\in E\}. (10)

The graph obtained by the local complementation on vertex jj of the graph G=(V,E)G=(V,E) is represented by τjG=(V,E)\tau_{j}G=(V,E^{\prime}), where

E=(E{{k,l}:{k,j},{l,j}E,{k,l}E}){{k,l}:{k,j},{l,j}E,{k,l}E}.\begin{split}E^{\prime}=&(E\setminus\{\{k,l\}:\{k,j\},\{l,j\}\in E,\{k,l\}\in E\})\\ &\cup\{\{k,l\}:\{k,j\},\{l,j\}\in E,\{k,l\}\notin E\}.\end{split} (11)
Refer to caption
Figure 1: A graphical description of the local complementation. The orange lines represent the edges added after the local complementation on vertex 11. The dashed line represents the eliminated edge after the local complementation.

We give a graphical description of the local complementation in Fig. 1.

The LPMs on a graph state are represented as follows. Let |X,±(j),|Y,±(j)|X,\pm\rangle^{(j)},~{}|Y,\pm\rangle^{(j)} and |Z,±(j)|Z,\pm\rangle^{(j)} be the eigenstates of X(j),Y(j)X^{(j)},Y^{(j)} and Z(j)Z^{(j)} with eigenvalues ±1\pm 1, respectively, and PX,±(j),PY,±(j)P_{X,\pm}^{(j)},~{}P_{Y,\pm}^{(j)} and PZ,±(j)P_{Z,\pm}^{(j)} be the projection operators to the eigenstates |X,±(j),|Y,±(j)|X,\pm\rangle^{(j)},~{}|Y,\pm\rangle^{(j)} and |Z,±(j)|Z,\pm\rangle^{(j)}, respectively. In particular, the measurement in {|0=|Z,+,|1=|Z,}\{\ket{0}=|Z,+\rangle,\ket{1}=|Z,-\rangle\} on a qubit of the graph states is simply represented by eliminating the vertex as shown in Fig. 2, and a measurement in {|±=|X,±}\{\ket{\pm}=|X,\pm\rangle\} on line-topology graph states is represented as shown in Fig. 3.

Proposition 3.

LPM on a graph state, Proposition 7 in Ref. [33] : A measurement in the eigenbasis of X,Y,ZX,Y,Z on the qubit associated with vertex jj transforms a graph GG to a new graph state |G\ket{G^{\prime}} up to local unitaries Uj,A,±(A=X,Y,Z)U_{j,A,\pm}~{}(A=X,Y,Z). Let NjN_{j} be the neighborhood of jj, and τj\tau_{j} be the local complementation on vertex jj. The state after a measurement in each basis is given by

PZ,±(j)|G=\displaystyle P_{Z,\pm}^{(j)}|G\rangle= 12|Z,±(j)Uj,Z,±|Gj,\displaystyle\frac{1}{\sqrt{2}}|Z,\pm\rangle^{(j)}\otimes U_{j,Z,\pm}|G-j\rangle, (12)
PY,±(j)|G=\displaystyle P_{Y,\pm}^{(j)}|G\rangle= 12|Y,±(j)Uj,Y,±|τj(G)j,\displaystyle\frac{1}{\sqrt{2}}|Y,\pm\rangle^{(j)}\otimes U_{j,Y,\pm}\left|\tau_{j}(G)-j\right\rangle, (13)
PX,±(j)|G=12|X,±(j)Uj,X,±|τk(τjτk(G)j),\displaystyle\begin{split}P_{X,\pm}^{(j)}|G\rangle=&\frac{1}{\sqrt{2}}|X,\pm\rangle^{(j)}\\ &\otimes U_{j,X,\pm}\left|\tau_{k}\left(\tau_{j}\circ\tau_{k}(G)-j\right)\right\rangle,\end{split} (14)

where vertex kk can be any one of the elements of NjN_{j}, and the local unitaries Uj,A,±U_{j,A,\pm} are given by

Uj,Z,+\displaystyle U_{j,Z,+} =1,\displaystyle=1, (15)
Uj,Z,\displaystyle U_{j,Z,-} =Z(Nj)lNjZ(l)\displaystyle=Z^{(N_{j})}\coloneqq\bigotimes_{l\in N_{j}}Z^{(l)} (16)
Uj,Y,+\displaystyle U_{j,Y,+} =lNjiZ(l),\displaystyle=\bigotimes_{l\in N_{j}}\sqrt{-iZ^{(l)}}, (17)
Uj,Y,\displaystyle U_{j,Y,-} =lNj+iZ(l),\displaystyle=\bigotimes_{l\in N_{j}}\sqrt{+iZ^{(l)}}, (18)
Uj,X,+\displaystyle U_{j,X,+} =+iY(k)lNj(Nkk)Z(l),\displaystyle=\sqrt{+iY}^{(k)}\otimes\bigotimes_{l\in N_{j}\setminus\left(N_{k}\cup k\right)}Z^{(l)}, (19)
Uj,X,\displaystyle U_{j,X,-} =iY(k)lNk(Njj)Z(l).\displaystyle=\sqrt{-iY}^{(k)}\otimes\bigotimes_{l\in N_{k}\setminus\left(N_{j}\cup j\right)}Z^{(l)}. (20)

If NjN_{j} is an empty set, the obtained state after the measurement is always |Gj\ket{G-j}.

Refer to caption
Figure 2: A measurement in {|0,|1}\{\ket{0},\ket{1}\} on a qubit on the graph state is represented by the elimination of the vertex corresponding to the measured qubit. The transformation of the graph represents the measurement in {|0(1),|1(1)}\{\ket{0}^{(1)},\ket{1}^{(1)}\} on qubit 11 and the dashed lines represent eliminated edges.
Refer to caption
Figure 3: Measurement in {|±}\{\ket{\pm}\} on a qubit of a line-topology graph state. These sequential transformations of graphs represent the measurement in {|±(3)}\{\ket{\pm}^{(3)}\} on qubit 33 of the graph state corresponding to the line-topology graph with 4 vertices. The last graph at the bottom represents the state after the measurement in {|±(3)}\{\ket{\pm}^{(3)}\} on qubit 33 up to the local Clifford operation. According to Proposition 3, we first perform the local complementation on vertex 44, which does not change the graph. Then, we perform the local complementation on vertex 33, and the edge represented by the curved orange line is added as shown in the third graph. Finally, we eliminate vertex 33, perform the local complementation on vertex 4, and obtain the graph in the last line in the figure. The dashed lines represent edges eliminated after eliminating vertex 33.

Here, we give a corollary of Proposition 3 about a measurement in {|±}\{\ket{\pm}\} on a line-topology graph states, which is illustrated in Fig. 3 and is useful for describing our main result.

Corollary 4.

Measurement in {|±}\{\ket{\pm}\} on a qubit of a line-topology graph state: Let G=(V,E)G=(V,E) be a line-topology graph given by V={j}j=1nV=\{j\}_{j=1}^{n} and E={{j,j+1}}j=1n1E=\{\{j,{j+1}\}\}_{j=1}^{n-1}. A measurement in |±(j)\ket{\pm}^{(j)} on jj maps |G\ket{G} to |±Uj,X,±|G\ket{\pm}\otimes U_{j,X,\pm}\ket{G^{\prime}}, where Uj,X,±U_{j,X,\pm} is the local unitary defined as Proposition 3 and G=(V{j},(E{{j1,j+1}}){{j1,j},{j,j+1}})G^{\prime}=(V\setminus\{j\},(E\cup\{\{j-1,j+1\}\})\setminus\{\{j-1,j\},\{j,j+1\}\}).

III LOCC extraction of stabilizer codes

In this section, we show the necessary and sufficient condition for extracting single-qubit quantum information encoded in a stabilizer code to a fixed party jj by LOCC. This condition is that the code space (S)\mathcal{H}^{(S)} of the stabilizer code cannot be expressed as

(S)=(A¯)|ψ(A),\mathcal{H}^{(S)}=\mathcal{H}^{(\bar{A})}\otimes\ket{\psi}^{(A)}, (21)

where AA is a set of parties including jj, A¯\bar{A} is the complement of AA, (A¯)\mathcal{H}^{(\bar{A})} is a subspace of kA¯(k)\bigotimes_{k\in\bar{A}}\mathcal{H}^{(k)}, and |ψ(A)\ket{\psi}^{(A)} is a state of kA(k)\bigotimes_{k\in{A}}\mathcal{H}^{(k)}. In this case, the quantum state of qubit jj is independent of the encoded quantum information. Therefore, the quantum information is not distributed to party jj at all. It is interesting to note that quantum information shared among multiple qubits using any stabilizer code can always be extracted to some party by LOCC. This is in contrast to general cases (quantum information shared using a non-stabilizer code), as there are known examples in which extraction is not possible by LOCC in general [22] and may require two-way LOCC [32]. For stabilizer codes, there always exists a party included in A¯\bar{A}, which satisfies the necessary and sufficient condition for LOCC extraction. Thus it is always possible to extract quantum information encoded in the stabilizer code using LOCC to some party.

There are two key elements for the proof of the sufficient and necessary condition. First, as shown in Lemma 1, to prove that arbitrary quantum information can be extracted, we will show that the maximum entangled state |Φ(RS)\ket{\Phi}^{(RS)} of the reference system and code space can be mapped to the maximum entangled state |Φ(Rj)\ket{\Phi}^{(Rj)} of the reference system and qubit jj by LOCC without any operations on the reference system. Second, using the fact that the code space is a stabilizer code, we will regard |Φ(RS)\ket{\Phi}^{(RS)} as a graph state up to the LC equivalence; then, the measurement in the eigenbasis of the Pauli operators and the LC operations associated with the outcomes of the measurement can be regarded as a transformation of the corresponding graphs.

Theorem 5.

Let SS be a given stabilizer on nn qubits, k=1n(k)\bigotimes_{k=1}^{n}\mathcal{H}^{(k)}, generated by n1n-1 independent generators and (S)\mathcal{H}^{(S)} be a stabilizer code stabilized by SS. Given a fixed party jj, there exists an LOCC map which performs extraction of single-qubit quantum information encoded in (S)\mathcal{H}^{(S)} to party jj, if and only if there exists no subset A{1,,n}A\subset\{1,\cdots,n\} which includes jj such that each state |a(S)(a=0,1)\ket{a}^{(S)}~{}(a=0,1) in the logical orthonormal basis {|a(S):a=0,1}\{\ket{a}^{(S)}:a=0,1\} of (S)\mathcal{H}^{(S)} is represented by

|a(S)=|a(A¯)|ψ(A),\ket{a}^{(S)}=\ket{a}^{(\bar{A})}\otimes\ket{\psi}^{(A)}, (22)

where {|a(A¯)}\{\ket{a}^{(\bar{A})}\} is a set of mutually orthogonal states of kA(k)\bigotimes_{k\notin A}\mathcal{H}^{(k)}, and |ψ(A)\ket{\psi}^{(A)} is a fixed pure state of kA(k)\bigotimes_{k\in A}\mathcal{H}^{(k)}.

Proof.

The LOCC extraction map for a given stabilizer SS can be obtained according to Algorithm 1. See Appendix B.1 for the details. ∎

Theorem 5 is proved by reducing extraction of quantum information to the problem of considering a graph corresponding to the graph state LC equivalent to |Φ(RS)\ket{\Phi}^{(RS)} and transforming this graph into a connected two-vertex graph representing the reference system and party jj. The transformation of a graph is composed of (i) eliminating the vertices not included in the path from vertex RR to vertex jj, and (ii) the local complementations on the remaining vertices except for vertex RR and vertex jj. This graph transformation is implemented by LPMs and LC operations as shown in Algorithm 1. We note that the parties who need to cooperate in Algorithm 1 are only those who are in the path or adjacent to the path; therefore, not all parties need to cooperate on the LOCC extraction of quantum information.

Algorithm 1 An algorithm for LOCC extraction of quantum information to a fixed party
1:SS: Stabilizer of the stabilizer code, jj: the party to which information is extracted, ρ(S)𝒟((S))\rho^{(S)}\in\mathcal{D}(\mathcal{H}^{(S)}): the input state in Definition 1
2:Calculate logical XX and ZZ operators so as to obtain a classical description of |Φ(RS)\ket{\Phi}^{(RS)} in terms of the stabilizer state. \triangleright This can be done by using the standard form of the stabilizer code [43]. This can be calculated in (n3)\order{n^{3}} time.
3:Find a graph state |G\ket{G} which is LC equivalent to |Φ(RS)\ket{\Phi}^{(RS)} defined in Lemma 1 and {Uk(k)}\{U^{(k)}_{k}\} satisfying |G=k=R,1,,nUk(k)|Φ(RS)\ket{G}=\bigotimes_{k=R,1,\cdots,n}U^{(k)}_{k}\ket{\Phi}^{(RS)}. \triangleright The algorithm for finding a graph GG from a stabilizer state is given in Ref. [44].
4:Find path P=(VP,EP)P=(V_{P},E_{P}) from vertex RR to vertex jj in graph GG. (If such a path does not exist, LOCC extraction of quantum information to jj is impossible.) \triangleright This can be done in (n+|E|)\order{n+|E|} time by the breadth-first search [45].
5:Each party kk who is in VPV_{P} or adjacent to some vertex in VPV_{P} applies Uk(k)U_{k}^{(k)} to their local qubit.
6:Initialize ml=0m_{l}=0 for l=1,2,,|VP|l=1,2,\cdots,|V_{P}|. \triangleright These correspond to the vertices vlv_{l} of PP, where v1=jv_{1}=j, v|VP|=Rv_{|V_{P}|}=R and {vl,vl+1}\{v_{l},v_{l+1}\}’s are the edges of PP.
7:for vv in the set of the vertices adjacent to a vertex of VPV_{P} but not included in VPV_{P} do
8:     Perform measurement in {|0(v),|1(v)}\{\ket{0}^{(v)},\ket{1}^{(v)}\} on party vv.
9:     if the outcome is |1(v)\ket{1}^{(v)} then
10:         for l=1,2,,|VP|l=1,2,\cdots,|V_{P}| do
11:              if vv is adjacent to vlv_{l} then
12:                  mlml+1m_{l}\leftarrow m_{l}+1
13:              end if
14:         end for
15:     end if
16:end for
17:for l=1,,|VP|1l=1,\cdots,|V_{P}|-1 do
18:     The party vlv_{l} performs ZmlZ^{m_{l}}.
19:end for
20:for l=2,,|VP|2l=2,\cdots,|V_{P}|-2 do
21:     Party vlv_{l} performs measurement in {|±(vl)}\{\ket{\pm}^{(v_{l})}\}
22:     if the outcome is |+(vl)\ket{+}^{(v_{l})} then
23:         Party jj performs (iY(j))1/2(iY^{(j)})^{-1/2}.
24:         Party vl+1v_{l+1} performs Z(vl+1)Z^{(v_{l+1})}.
25:     else\triangleright The outcome is |(vl)\ket{-}^{(v_{l})}
26:         Party jj performs (iY(j))1/2(-iY^{(j)})^{-1/2}.
27:     end if
28:end for
29:Party v|VP|1v_{|V_{P}|-1} performs measurement in {|±(v|VP|1)}\{\ket{\pm}^{(v_{|V_{P}|-1})}\}
30:if the outcome is |+(v|VP|1)\ket{+}^{(v_{|V_{P}|-1})} then
31:     Party jj performs HZm|VP|+1(UR)T(iY(j))1/2HZ^{m_{|V_{P}|}+1}(U_{R}^{\dagger})^{T}(iY^{(j)})^{-1/2} on qubit jj.
32:else\triangleright The outcome is |\ket{-}
33:     Party jj performs HZm|VP|(UR)T(iY(j))1/2HZ^{m_{|V_{P}|}}(U_{R}^{\dagger})^{T}(-iY^{(j)})^{-1/2} on qubit jj.
34:end if

To see how Algorithm 1 works, we give an example of the five-qubit code [3, 4] and graphically explain the process of extraction of quantum information using graphs.

Example 1 (Five-qubit code).

We extract quantum information encoded in the five-qubit code [46], which is known to be able to protect against an arbitrary single-qubit error.

Let us consider the task of extracting quantum information to party 11 according to Algorithm 1. The stabilizer SS of the five-qubit code is generated by 44 generators

X(1)Z(2)Z(3)X(4)I(5),I(1)X(2)Z(3)Z(4)X(5),X(1)I(2)X(3)Z(4)Z(5),Z(1)X(2)I(3)X(4)Z(5),\begin{split}X^{(1)}Z^{(2)}Z^{(3)}X^{(4)}I^{(5)},\\ I^{(1)}X^{(2)}Z^{(3)}Z^{(4)}X^{(5)},\\ X^{(1)}I^{(2)}X^{(3)}Z^{(4)}Z^{(5)},\\ Z^{(1)}X^{(2)}I^{(3)}X^{(4)}Z^{(5)},\end{split} (23)

where the tensor product symbol \otimes is omitted for brevity.

The graph GG corresponding to the five-qubit code is given in Fig. 4, which can be calculated according to Appendix B.2. The maximally entangled state between the stabilizer code and the reference is LC equivalent to |G\ket{G} as

|Φ(RS)=H(R)H(4)H(5)|G,\ket{\Phi}^{(RS)}=H^{(R)}H^{(4)}H^{(5)}\ket{G}, (24)

where

|0(S)=14(|00000+|11000+|01100+|00110+|00011+|10001|10100|01010|00101|10010|01001|11110|01111|10111|11011|11101)|1(S)=14(|11111+|00111+|10011+|11001+|11100+|01110|01011|10101|11010|01101|10110|00001|10000|01000|00100|00010).\begin{split}\ket{0}^{(S)}=&\frac{1}{4}(\ket{00000}+\ket{11000}+\ket{01100}+\ket{00110}+\ket{00011}\\ &+\ket{10001}-\ket{10100}-\ket{01010}-\ket{00101}-\ket{10010}\\ &-\ket{01001}-\ket{11110}-\ket{01111}-\ket{10111}-\ket{11011}\\ &-\ket{11101})\\ \ket{1}^{(S)}=&\frac{1}{4}(\ket{11111}+\ket{00111}+\ket{10011}+\ket{11001}+\ket{11100}\\ &+\ket{01110}-\ket{01011}-\ket{10101}-\ket{11010}-\ket{01101}\\ &-\ket{10110}-\ket{00001}-\ket{10000}-\ket{01000}-\ket{00100}\\ &-\ket{00010}).\\ \end{split} (25)

Then, the parties perform the sequence of operations to extract quantum information to party 1, according to Algorithm 1. This process is schematically illustrated in Fig. 4, 5, and 6.

Refer to caption
Figure 4: The graph corresponds to the graph state which is LC equivalent to the stabilizer state |Φ(RS)\ket{\Phi}^{(RS)} of the five-qubit code.
Refer to caption
Figure 5: The graph transformation corresponding to the measurements on 3,4, and 5. The dashed lines represent the eliminated edges after the measurement. Find a path PP from 1 to RR via 2 in the graph G5qubitG_{\text{5qubit}}. Parties 3, 4, and 5 perform measurements in {|0,|1}\{\ket{0},\ket{1}\} and communicate their outcomes to party 1 and 2. Parties 1 and 2 perform the local unitary operation based on the outcomes. The entire process above is represented by the elimination of vertices 3, 4, and 5.
Refer to caption
Figure 6: The graph transformation corresponding to the measurement on 2. The gray objects have been already eliminated in Fig. 5. The dashed lines represent the eliminated edges after the measurement on 2, and the orange line represents the added edge after the measurement on 2. Party 22 performs the measurement in {|±}\{\ket{\pm}\} and communicates its outcome to party 1. This process is represented by the local complementation on vertex 2. The graph state of the final graph in this figure is LC equivalent to |Φ(R1)\ket{\Phi}^{(R1)}. Therefore, party 1 performs a local unitary operation based on the outcomes, and the quantum information is extracted.

We first find a path in the graph from the reference party to a party where information is extracted. We can find the path from vertex 1 to RR via vertex 2 and vertices 3, 4, and 5 are connected to the path. Since parties in the path and adjacent to the path need to cooperate, all the parties need to cooperate to extract quantum information to party 1 in this case. After parties 4 and 5 perform HH on their qubits and parties 3, 4, and 5 perform measurements in {|0,|1}\{\ket{0},\ket{1}\}, suppose that the parties 3, 4, and 5 obtain, e.g., the outcomes |1\ket{1}, |0\ket{0}, and |0\ket{0}, respectively. Then, |Φ(RS)\ket{\Phi}^{(RS)} is transformed to

12[|0(R)(|11(12)+|01(12))+|1(R)(|00(12)|10(12))].\frac{1}{2}\left[\ket{0}^{(R)}(\ket{11}^{(12)}+\ket{01}^{(12)})+\ket{1}^{(R)}(\ket{00}^{(12)}-\ket{10}^{(12)})\right]. (26)

For these outcomes, the numbers of parties who obtained the outcome |1\ket{1} and whose vertex is adjacent to party l=1,2,Rl=1,2,R are given by

m1=1,m2=1,mR=0.m_{1}=1,~{}~{}m_{2}=1,~{}~{}m_{R}=0. (27)

Therefore, parties 1 and 2 perform ZZ gate operation, and the state (26) is transformed to

12[|0(R)(|11(12)|01(12))+|1(R)(|00(12)+|10(12))].\frac{1}{2}\left[\ket{0}^{(R)}(\ket{11}^{(12)}-\ket{01}^{(12)})+\ket{1}^{(R)}(\ket{00}^{(12)}+\ket{10}^{(12)})\right]. (28)

Next, party 2 performs the measurement in {|±}\{\ket{\pm}\}. If the outcome is |+\ket{+}, the state (28) is transformed to

12[|0(R)(|1|0)+|1(R)(|0+|1)].\frac{1}{2}\left[\ket{0}^{(R)}(\ket{1}-\ket{0})+\ket{1}^{(R)}(\ket{0}+\ket{1})\right]. (29)

Since the outcome obtained by party 2 is |+\ket{+}, party 1 performs the local unitary represented as

HZH(iY)1/2,HZH(iY)^{-1/2}, (30)

and the state  (29) is transformed to |Φ(R1)\ket{\Phi}^{(R1)} up to the global phase. This means that the quantum information encoded in the five-qubit code can be extracted to qubit 1 with the above operations.

IV Applications to the quantum information splitting

In this section, we consider applications of Algorithm 1 to the LOCC-QIS, i.e., to share quantum information among multiple parties so that any of the parties cannot extract the shared quantum information on their own but can extract the quantum information only by LOCC. To split and share quantum information is the first step to the quantum secret sharing (QSS) [34, 4, 5], which aims to achieve secure quantum communication if more than a certain number of parties cooperate. The difference between QSS and QIS is that QSS additionally requires that information is kept completely unknown if less than a sufficient number of parties cooperate, while in QIS the information may be partially known. The QIS only requires that the information can be exactly extracted if a sufficient number of parties cooperate. Note that in contrast to the ordinary QIS and QSS settings [34, 4, 5], quantum communication between parties is prohibited in our setting.

In Sec. III, we showed that not every party needs to cooperate to extract quantum information. The number of parties necessary to cooperate depends on to which party the shared quantum information is extracted. In the following, using tree-topology graph states, we propose the LOCC-QIS schemes with a hierarchical structure of authorities to access quantum information shared among multiple parties. The hierarchical structure under the ordinary QIS settings was proposed in Refs. [30, 29, 31] and called hierarchical quantum information splitting (HQIS). Therefore, we call the LOCC-QIS scheme introduced here LOCC-HQIS. We limited ourselves to cases where quantum communication is not possible, but instead, we can design a variety of hierarchical structures corresponding to trees in the graph theory. We will also show that, in a special case, the LOCC-HQIS can be applied to the QSS where the parties can only perform LOCC [19, 20, 21].

IV.1 Notations

We consider LOCC-HQIS using trees G=(V,E)G=(V,E) in the following. The set of vertices VV is divided into VPV_{P} and Vk,l(l=1,2,,mk)V_{k,l}~{}(l=1,2,\ldots,m_{k}) as follows. As shown in Fig. 7, let Gk,l=(Vk,l,Ek,l)(k=1,,|VP|,l=1,,mk)G_{k,l}=(V_{k,l},E_{k,l})~{}(k=1,\ldots,|V_{P}|,l=1,\ldots,m_{k}) denote the llth subgraph connected to vertex kk, which has only one vertex uk,lu_{k,l} adjacent to vertex vkVPv_{k}\in V_{P} and is not included in PP. The path P=(VP,EP)P=(V_{P},E_{P}) is explicitly represented by

VP\displaystyle V_{P} ={vk}k=1|VP|,v1=R,v|VP|=j,\displaystyle=\{v_{k}\}_{k=1}^{|V_{P}|},~{}v_{1}=R,~{}v_{|V_{P}|}=j, (31)
EP\displaystyle E_{P} ={{vk,vk+1}}k=1|VP|1.\displaystyle=\{\{v_{k},v_{k+1}\}\}_{k=1}^{|V_{P}|-1}. (32)

These subgraphs are taken to satisfy the relations given by

V=VP(k=1|VP|l=1mkVk,l),V=V_{P}\cup\left(\bigcup_{k=1}^{|V_{P}|}\bigcup_{l=1}^{m_{k}}V_{k,l}\right), (33)
E=EP(k=1|VP|l=1mkEk,l{{uk,l,vk}}),E=E_{P}\cup\left(\bigcup_{k=1}^{|V_{P}|}\bigcup_{l=1}^{m_{k}}E_{k,l}\cup\{\{u_{k,l},v_{k}\}\}\right), (34)

where no pair of VPV_{P} and Gk,lG_{k,l} has intersection, and mkm_{k} denotes the number of vertices adjacent to kk but not in VPV_{P}.

Refer to caption
Figure 7: The graph corresponding to the tree-topology graph state. The circles represent the vertices of the path from vertex jj to vertex RR and the boxes represent subgraphs Gk,l=(Vk,l,Ek,l)G_{k,l}=(V_{k,l},E_{k,l}) for k=1,,|VP|k=1,\ldots,|V_{P}| and l=1,,mkl=1,\ldots,m_{k}. The dots represent that there are omitted vertices and edges.

IV.2 A property of protocol for extracting quantum information useful for HQIS

For the stabilizer codes represented by graph states corresponding to trees, Algorithm 1 is optimal for providing the minimal number of parties needed to cooperate. That is, we can identify the hierarchical information access structure of an LOCC-HQIS scheme using such a stabilizer code as presented in the following theorem.

Theorem 6.

Let G=(V,E)G=(V,E) be a tree of a graph state |G\ket{G} that is LC equivalent to the maximally entangled state |Φ(RS)\ket{\Phi}^{(RS)} between the reference system and the stabilizer code. The minimum number of parties that need to cooperate for LOCC extraction of quantum information to party jj equals to

|{k|kV,{k,l}E,lVP}|.\left|\big{\{}k|k\in V,\{k,l\}\in E,l\in V_{P}\big{\}}\right|. (35)

This minimum number of parties is achievable by Algorithm 1; that is, Algorithm 1 is optimal for a tree GG in terms of the number of parties needed for extracting quantum information.

Proof.

In the proof, we show the following two facts.

  1. 1.

    If any one of the parties corresponding to a vertex in VPV_{P} does not cooperate, the extraction of quantum information to party jj is impossible.

  2. 2.

    If all the parties corresponding to the vertices in one of the subgraphs {Gm,l}m,l{\{G_{m,l}\}}_{m,l} do not cooperate, the extraction of quantum information to party jj is impossible.

We show the impossibility of the above two by using the monotonicity of distillable entanglement. If these facts hold, the number of parties needed for the extraction of quantum information must be more than or equal to N=|{k|kV,{k,l}E,lVP}|N=\left|\big{\{}k|k\in V,\{k,l\}\in E,l\in V_{P}\big{\}}\right|. Then, Algorithm 1 assures the existence of such an algorithm performed with NN parties.

See Appendix B.3 for the details. ∎

IV.3 Application of extraction of quantum information using tree states to HQIS

Based on the result shown in the previous subsection, we give four examples of LOCC-HQIS schemes using the stabilizer codes whose corresponding maximally entangled states (Eq. (2)) are given by the tree-topology graph states. First, in Example 2, we consider a scheme using a line-topology graph state as the simplest LOCC-HQIS scheme. Next, in Example 3, we consider a scheme using tree-topology graph states. We also describe that a multiparty HQIS [31] and an (n,n)(n,n)-threshold scheme using the Greenberger\UTF2013Horne\UTF2013Zeilinger (GHZ) states [28] in Examples 4 and 5, respectively, are special examples where the hierarchical structures do not change even when the quantum communication is prohibited. Note that in general the hierarchical structure changes depending on whether quantum communication is allowed or not.

In the following example of the line-topology graph with (n+1)(n+1) vertices, the party labeled by k(<n)k(<n) needs other kk parties’ cooperation to extract the shared quantum information.

Example 2 (LOCC-HQIS with the line-topology graph with 55 vertices).

Let us consider a graph state on 5 qubits associated with the line-topology graph shown in Fig. 8.

Refer to caption
Figure 8: The line-topology graph with 5 vertices. In this case, parties j=1,2,3j=1,2,3 need j+1j+1 parties’ cooperation and party 4 needs all 4 parties’ cooperation to extract the quantum information. Therefore, in the LOCC-QSS corresponding to this graph state, the authorities of parties in terms of the number of parties needed to extract the shared quantum information are in the increasing order of the integers associated with parties.

This graph state is also the stabilizer state of the stabilizer generated by the following 5 independent generators

X(R)Z(1)I(2)I(3)I(4),Z(R)X(1)Z(2)I(3)I(4),I(R)Z(1)X(2)Z(3)I(4),I(R)I(1)Z(2)X(3)Z(4),I(R)I(1)I(2)Z(3)X(4).\begin{split}X^{(R)}Z^{(1)}I^{(2)}I^{(3)}I^{(4)},\\ Z^{(R)}X^{(1)}Z^{(2)}I^{(3)}I^{(4)},\\ I^{(R)}Z^{(1)}X^{(2)}Z^{(3)}I^{(4)},\\ I^{(R)}I^{(1)}Z^{(2)}X^{(3)}Z^{(4)},\\ I^{(R)}I^{(1)}I^{(2)}Z^{(3)}X^{(4)}.\end{split} (36)

This state can be represented by |Φ(RS)|\Phi\rangle^{(RS)} by regarding it as the maximum entangled state between (R)\mathcal{H}^{(R)} and the stabilizer code by the stabilizer SS generated by Z(1)X(2)Z(3)I(4)Z^{(1)}X^{(2)}Z^{(3)}I^{(4)}, I(1)Z(2)X(3)Z(4)I^{(1)}Z^{(2)}X^{(3)}Z^{(4)} and I(1)I(2)Z(3)X(4)I^{(1)}I^{(2)}Z^{(3)}X^{(4)}, where its logical ZZ operator is X(1)Z(2)I(3)I(4)X^{(1)}Z^{(2)}I^{(3)}I^{(4)}.

Now, we consider the extraction of single-qubit quantum information encoded in the stabilizer code (S)\mathcal{H}^{(S)} of 4 qubits. According to Theorem 6, we can calculate the minimum number of parties needed to cooperate to extract quantum information to jj. In the case of extracting to party 1, it only needs the cooperation of party 2, regardless of what is performed on parties 3 and 4. Party 2 performs the measurement in {|0(2),|1(2)}\{\ket{0}^{(2)},\ket{1}^{(2)}\} and communicates the measurement outcome to party 1, and then 1 performs a local Clifford operation conditioned on the outcome. By contrast, in the case of extracting to party 22, party 22 needs the cooperation of both party 1 and party 3. Similarly, party 33 needs the cooperation of all the other parties, and party 44 needs it as well. Therefore, this scheme has a hierarchical information access structure. This scheme can be straightforwardly generalized to line-topology graphs with nn vertices for any n=2,3,4,5,n=2,3,4,5,\ldots.

More complex information access structures can be considered by using trees as shown in the following example.

Example 3 (LOCC-HQIS with the tree with 5 vertices).

Let us consider the tree with 5 vertices shown in Fig. 9.

Refer to caption
Figure 9: A tree with 5 vertices. In the LOCC-HQIS using this graph, to extract quantum information, parties 11 and 44 need the cooperation of all the other parties, and party 22(33) needs the cooperation of parties 33(22) and 11.

According to Theorem 6, in the LOCC-HQIS using the graph represented by Fig. 9, to extract quantum information, party 11 or 44 needs the cooperation of all the other parties, and party 22(33) needs the cooperation of parties 33(22) and 11, respectively.

The multiparty HQIS proposed in Ref. [31] can also be considered as an LOCC-HQIS scheme corresponding to the tree shown in Fig. 10.

Example 4 (The multiparty HQIS among 3+23+2 agents).

The tree shown in Fig. 10 corresponds to the multiparty HQIS among 3+23+2 agents presented in Ref. [31]. In this scheme, the parties B1,B2B_{1},B_{2} and B3B_{3} need only the other parties labeled BB to extract the quantum information while C1C_{1} and C2C_{2} need all the other 4 parties under the LOCC setting. Such a hierarchical structure is exactly the same as that shown in Ref. [31] when quantum communication is allowed.

Refer to caption
Figure 10: A graph corresponding to the multiparty HQIS [31]. BjB_{j} can extract the shared quantum information with all the other BB-labeled parties and one party of CC-labeled parties. However, CjC_{j} needs not only all the other CC-labeled parties’ cooperations but also all the BB-labeled parties’. That is, BB-labeled parties have stronger authorities than CC-labeled parties.

We can also consider the (n,n)(n,n)-threshold QSS schemes using GHZ states proposed in Ref. [28] in terms of the graph representation.

Example 5 (The (n,n)(n,n)-threshold LOCC-QSS using GHZ states [28]).

The tree shown in Fig. 11 corresponds to the (n,n)(n,n)-threshold QSS using the GHZ states [47]. In this scheme, every party needs all the other parties’ cooperation to extract the quantum information. This scheme is relevant to the GHZ states since |Φ(RS)\ket{\Phi}^{(RS)} is represented by

|Φ(RS)=12{|0(R)(|000(12n)+|111(12n))+|1(R)(|000(12n)|111(12n))}.\begin{split}&\ket{\Phi}^{(RS)}\\ =&\frac{1}{\sqrt{2}}\{\ket{0}^{(R)}(\ket{00\cdots 0}^{(12\cdots n)}+\ket{11\cdots 1}^{(12\cdots n)})\\ &+\ket{1}^{(R)}(\ket{00\cdots 0}^{(12\cdots n)}-\ket{11\cdots 1}^{(12\cdots n)})\}.\end{split} (37)

The logical states of this case in the stabilizer code are GHZ states. The state |Φ(RS)\ket{\Phi}^{(RS)} is LC equivalent to the GHZ state on n+1n+1 qubits shown in Fig. 11.

Refer to caption
Figure 11: A graph corresponding to the (n,n)(n,n)-threshold QSS using the GHZ states.

From the graph represented in Fig. 11, according to Theorem 6, we can see that all the parties are needed to cooperate for the LOCC extraction of quantum information wherever the information is extracted. The LOCC-QIS scheme corresponding to the GHZ state also works as an (n,n)(n,n)-threshold LOCC-QSS scheme, since no information is accessible if one of the parties does not collaborate even when quantum communication is allowed as shown in Ref. [28].

As shown in these examples, our results can serve as a unified theoretical tool for studying the QIS and QSS schemes, especially based on the tree-topology graphs. Using our results in Theorem 6, we can design QIS and QSS schemes with various hierarchical information access structures.

V conclusion

In this paper, we analyzed the task of extracting single-qubit quantum information encoded in the stabilizer code of multiple qubits by introducing parties associated with each qubit. We showed a protocol of LOCC extraction of quantum information to a fixed party given as desired in (n3)\order{n^{3}} time in terms of the number of qubits nn in Theorem 5, whenever possible. The algorithm to find the protocol for extraction of quantum information is given in Algorithm 1. As a consequence of Theorem 5, the quantum information encoded in the stabilizer code can always be extracted to some party by LOCC in (n3)\order{n^{3}} time. This algorithm gives an efficient way to decode stabilizer codes, even if we can perform only LOCC rather than multiqubit gates.

Our analysis showed that to extract quantum information, not all parties need to cooperate. The number of parties needed to cooperate depends on which party quantum information is decoded into. Theorem 6 reveals this dependency in cases where the stabilizer code can be represented as a tree-topology graph state up to LC equivalence. Investigating examples, we also showed that this result can be applied to the LOCC-HQIS schemes including the schemes proposed in the past such as the multiparty HQIS [31], which have the hierarchical information access structures among parties in terms of the minimum numbers of parties needed to cooperate. For future works, it is open to investigating the hierarchical structure in the stabilizer codes not corresponding to the tree-topology graphs and characterizing distributed quantum information by these structures.

For future works, it is open to showing if the extraction of more than one-qubit quantum information encoded in the stabilizer code is performed only by LOCC in polynomial time in terms of the number of qubits. Extraction of multi-qubit information is defined as an isometry map which transforms the multi-qubit logical basis |ab(S)\ket{ab\ldots}^{(S)} to the computational basis |a(j)|b(k)\ket{a}^{(j)}\ket{b}^{(k)}\ldots of given multiple qubits for extraction. The stabilizer codes with more than one logical qubits have applications to low-overhead fault-tolerant quantum computation [48, 49, 50]. The problem of LOCC extraction of multiple-qubit information from stabilizer codes can be viewed as the problem of extracting multiple Bell states between the reference system consisting of multiple qubits and extraction qubits from a given graph state by LOCC without accessing the reference qubits, similarly to the case of LOCC extraction of single-qubit information.

However, the possibility of extraction of multi-qubit information cannot be determined solely from the connectivity in the graph between the reference vertices (qubits) and the vertices (qubits) where information is extracted unlike the single-qubit case as explained in Appendix C, and therefore, further study is needed to deal with multi-qubit information. The problem to determine the ability to extract multiple Bell states from a given general graph state by LOCC is NP complete. [51]. Nevertheless, there is still a possibility that the problem can be solved efficiently by utilizing the fact that the initial graph state is restricted to the maximum entanglement state between the reference qubits and code space in LOCC extraction, or by imposing an additional restriction to the initial graph state to describe a particular class of stabilizer codes.

For further applications, it would be interesting to investigate the applicability of our LOCC decoding algorithm to implementing faulty non-Clifford measurement used for preparing a magic state encoded in a quantum error-correcting code in fault-tolerant quantum computation (FTQC) [52, 53]. In the faulty non-Clifford measurement, one needs to extract an encoded state of a logical qubit into one of the physical qubits in a similar way to our protocol while the error analysis is also needed for the feasibility of FTQC. Our algorithm may lead to insight into conditions of magic-state-preparation protocols that work for general stabilizer codes.

Acknowledement

KS is supported by Forefront Physics and Mathematics Program to Drive Transformation (FoPM), a World-leading Innovative Graduate Study (WINGS) Program, the University of Tokyo. MM is supported by MEXT Quantum Leap Flagship Program (MEXT QLEAP) JPMXS0118069605, and Japan Society for the Promotion of Science (JSPS) KAKENHI Grant No. 21H03394. HY acknowledges JST PRESTO Grant Number JPMJPR201A and MEXT Quantum Leap Flagship Program (MEXT QLEAP) JPMXS0118069605, JPMXS0120351339.

Appendix A Examples

A.1 A simple example of extraction of quantum information encoded in two qubits

We consider single-qubit information encoded in a two-qubit system (1)(2)=22\mathcal{H}^{(1)}\otimes\mathcal{H}^{(2)}=\mathbb{C}^{2}\otimes\mathbb{C}^{2} according to the logical basis states of (S)\mathcal{H}^{(S)} given by

|a(S)=|a(1)|a(2)(a=0,1),\ket{a}^{(S)}=\ket{a}^{(1)}\ket{a}^{(2)}~{}(a=0,1), (38)

where |a(1)(1)\ket{a}^{(1)}\in\mathcal{H}^{(1)} and |a(2)(2)\ket{a}^{(2)}\in\mathcal{H}^{(2)} are the computational basis states and a tensor product sign \otimes for pure states is omitted for brevity. Let |±(2)\ket{\pm}^{(2)} be the eigenstates of X(2)|01|(2)+|10|(2)X^{(2)}\coloneqq\ket{0}\bra{1}^{(2)}+\ket{1}\bra{0}^{(2)} with the eigenvalues ±1\pm 1, respectively. To extract quantum information encoded in ρ(S)𝒟((S))\rho^{(S)}\in\mathcal{D}(\mathcal{H}^{(S)}) to ρ(1)𝒟((1))\rho^{(1)}\in\mathcal{D}(\mathcal{H}^{(1)}) of party 11, party 22 performs a measurement in {|±(2)}\{\ket{\pm}^{(2)}\} and communicate the outcome of the measurement to party 11 as shown in the following.

Since ρ(S)\rho^{(S)} can be represented by

ρ(S)=\displaystyle\rho^{(S)}= a,b=0,1ρab|ab|(1)|ab|(2)\displaystyle\sum_{a,b=0,1}\rho_{ab}\ket{a}\bra{b}^{(1)}\otimes\ket{a}\bra{b}^{(2)}
=\displaystyle= 12(a,b=0,1ρab|ab|(1)|++|(2)\displaystyle\frac{1}{2}\Big{(}\sum_{a,b=0,1}\rho_{ab}\ket{a}\bra{b}^{(1)}\otimes\ket{+}\bra{+}^{(2)}
+a,b=0,1(1)bρab|ab|(1)|+|(2)\displaystyle+\sum_{a,b=0,1}(-1)^{b}\rho_{ab}\ket{a}\bra{b}^{(1)}\otimes\ket{+}\bra{-}^{(2)}
+a,b=0,1(1)aρab|ab|(1)|+|(2)\displaystyle+\sum_{a,b=0,1}(-1)^{a}\rho_{ab}\ket{a}\bra{b}^{(1)}\otimes\ket{-}\bra{+}^{(2)}
+a,b=0,1(1)a+bρab|ab|(1)||(2)),\displaystyle+\sum_{a,b=0,1}(-1)^{a+b}\rho_{ab}\ket{a}\bra{b}^{(1)}\otimes\ket{-}\bra{-}^{(2)}\Big{)}, (39)

the state after the measurement on (2)\mathcal{H}^{(2)} in {|±(2)}\{\ket{\pm}^{(2)}\} with the outcome |+(2)\ket{+}^{(2)} is given by

a,b=0,1ρab|ab|(1),\sum_{a,b=0,1}\rho_{ab}\ket{a}\bra{b}^{(1)}, (40)

and with the outcome |(2)\ket{-}^{(2)} is given by

a,b=0,1(1)a+bρab|ab|(1).\sum_{a,b=0,1}(-1)^{a+b}\rho_{ab}\ket{a}\bra{b}^{(1)}. (41)

If the outcome is |+(2)\ket{+}^{(2)}, the state is extracted to party 11, and if the outcome is |(2)\ket{-}^{(2)}, the state can be extracted to party 11 by performing the ZZ gate on qubit 11, where Z(1)|00|(1)|11|(1)Z^{(1)}\coloneqq\ket{0}\bra{0}^{(1)}-\ket{1}\bra{1}^{(1)}. This protocol only uses LOCC, and thus the protocol implements an LOCC map for extracting quantum information.

A.2 A simple example of a state transformation equivalent to an extraction

According to Lemma 1, LOCC extraction of quantum information in Appendix A.1 is equivalent to the state transformation by LOCC from

|Φ(RS)=(|0(R)|0(1)|0(2)+|1(R)|1(1)|1(2))/2|\Phi\rangle^{(RS)}=(\ket{0}^{(R)}\ket{0}^{(1)}\ket{0}^{(2)}+\ket{1}^{(R)}\ket{1}^{(1)}\ket{1}^{(2)})/\sqrt{2} (42)

to

|Φ(R1)=(|0(R)|0(1)+|1(R)|1(1))/2.|\Phi\rangle^{(R1)}=(\ket{0}^{(R)}\ket{0}^{(1)}+\ket{1}^{(R)}\ket{1}^{(1)})/\sqrt{2}. (43)

This transformation can be achieved by the following LOCC protocol. First, party 2 performs a measurement in {|±(2)}\{\ket{\pm}^{(2)}\} and communicates the outcome to party 1. Then |Φ(RS)|\Phi\rangle^{(RS)} is transformed to

12(|0(R)|0(1)±|1(R)|1(1))\frac{1}{\sqrt{2}}(\ket{0}^{(R)}\ket{0}^{(1)}\pm\ket{1}^{(R)}\ket{1}^{(1)}) (44)

where the ±\pm sign of |1(R)|1(1)\ket{1}^{(R)}\ket{1}^{(1)} corresponds to the outcome |±\ket{\pm} of the measurement. If the outcome is |+\ket{+}, the state is transformed to |Φ(R1)|\Phi\rangle^{(R1)}. If the outcome of the measurement is |\ket{-}, party 1 performs the ZZ gate. Then we have |Φ(R1)|\Phi\rangle^{(R1)}. The sequence of operations in this protocol is the same as the one in Appendix A.1.

Appendix B Proofs

B.1 Proof of Theorem 5

We state a useful lemma about quantum state merging [22] to prove Theorem 5. The task in Theorem 5 can be regarded as extracting quantum information to (j)\mathcal{H}^{(j)} from the bipartite system (j)(kj)((kj)=kj(k))\mathcal{H}^{(j)}\otimes\mathcal{H}^{(k\neq j)}~{}(\mathcal{H}^{(k\neq j)}=\bigotimes_{k\neq j}\mathcal{H}^{(k)}). The following Lemma 7 gives a necessary condition for LOCC extraction from a bipartite system (A)(B)\mathcal{H}^{(A)}\otimes\mathcal{H}^{(B)} to (B)\mathcal{H}^{(B)}.

Lemma 7.

Corollary 6 in Ref. [22]: Consider a tripartite pure state

|Φ12(|0(R)|ψ0(AB)+|1(R)|ψ1(AB))(R)(A)(B),\begin{split}\ket{\Phi}&\coloneqq\frac{1}{\sqrt{2}}(\ket{0}^{(R)}\ket{\psi_{0}}^{(AB)}+\ket{1}^{(R)}\ket{\psi_{1}}^{(AB)})\\ &\in\mathcal{H}^{(R)}\otimes\mathcal{H}^{(A)}\otimes\mathcal{H}^{(B)},\end{split} (45)

where |ψ0(AB)\ket{\psi_{0}}^{(AB)} and |ψ1(AB)\ket{\psi_{1}}^{(AB)} are orthogonal pure states of (A)(B)\mathcal{H}^{(A)}\otimes\mathcal{H}^{(B)}. If |Φ\ket{\Phi} is represented by

|Φ=12(|0(R)|0(A)+|1(R)|1(A))|ψ(B),\ket{\Phi}=\frac{1}{\sqrt{2}}\left(\ket{0}^{(R)}\ket{0}^{(A)}+\ket{1}^{(R)}\ket{1}^{(A)}\right)\otimes\ket{\psi}^{(B)}, (46)

where |j(R)(j=0,1)\ket{j}^{(R)}~{}(j=0,1) (|j(A)(j=0,1))(\ket{j}^{(A)}~{}(j=0,1)) are orthogonal pure states in (R)\mathcal{H}^{(R)} ((A))(\mathcal{H}^{(A)}) and |ψ\ket{\psi} is a pure state in (B)\mathcal{H}^{(B)}, there exists no LOCC map which transforms |Φ\ket{\Phi} to (|0(R)|0(B)+|1(R)|1(B))/2(\ket{0}^{(R)}\ket{0}^{(B)}+\ket{1}^{(R)}\ket{1}^{(B)})/\sqrt{2}.

In the following, after introducing some notations, we will show Algorithm 1 indeed provides an LOCC map which performs extraction of single-qubit quantum information.

Proof of Theorem 5.

As shown in Lemma 1, to construct an LOCC extracting map 𝒞(Sj)\mathcal{C}^{(S\to j)} to party jj, it suffices to construct an LOCC map which transforms |ΦΦ|(RS)\ket{\Phi}\bra{\Phi}^{(RS)} to |ΦΦ|(Rj)\ket{\Phi}\bra{\Phi}^{(Rj)} with its action on the reference system being the identity,

id(R)𝒞(Sj)|ΦΦ|(RS)=|ΦΦ|(Rj)\mathrm{id}^{(R)}\otimes\mathcal{C}^{(S\to j)}\ket{\Phi}\bra{\Phi}^{(RS)}=\ket{\Phi}\bra{\Phi}^{(Rj)} (47)

where |Φ(RS)\ket{\Phi}^{(RS)} and |Φ(Rj)\ket{\Phi}^{(Rj)} are maximally entangled states defined in Eq. (2) and (3). This |Φ(RS)\ket{\Phi}^{(RS)} is a stabilizer state since |Φ(RS)\ket{\Phi}^{(RS)} is a stabilizer state stabilized by the stabilizer generated by I(R)SI^{(R)}\otimes S, Z(R)Z~(S)Z^{(R)}\otimes\tilde{Z}^{(S)} and X(R)X~(S)X^{(R)}\otimes\tilde{X}^{(S)}, where X~(S)(Z~(S))\tilde{X}^{(S)}(\tilde{Z}^{(S)}) is the logical X(Z)X(Z) operator on (S)\mathcal{H}^{(S)}.

According to Proposition 2, |Φ(RS)\ket{\Phi}^{(RS)} is LC equivalent to some graph state |G\ket{G}, that is,

|G(R,1,,n)=(UR(R)U1(1)Un(n))|Φ(RS)\ket{G}^{(R,1,\ldots,n)}=\left(U^{(R)}_{R}\otimes U^{(1)}_{1}\otimes\cdots\otimes U^{(n)}_{n}\right)\ket{\Phi}^{(RS)} (48)

where Uk(k)U^{(k)}_{k} is a local Clifford map on qubit kk.

Now the problem of LOCC construction of 𝒞(Sj)\mathcal{C}^{(S\to j)} is reduced to the transformation of a graph state |Φ(RS)\ket{\Phi}^{(RS)} to another graph state |Φ(Rj)\ket{\Phi}^{(Rj)}, which can be considered by using Proposition 3 about LPMs on graph states. The conversion procedure can be summarized as follows (i) ZZ-measurements at parties other than the path from RR to jj on the graph and correction at parties adjacent to that party except RR. (ii) XX-measurements at parties other than RR and jj in the path from RR to jj and corrections at parties adjacent to that party except for RR (iii) LC operation on the party jj to cancel the Clifford operation on the reference, which is intact.

If the vertices RR and jj, which correspond to the reference system and party jj respectively, are not connected by a path on the graph, then jj does not satisfy the condition in Theorem 5, and LOCC extraction of quantum information is impossible according to Lemma 7. Thus, if party jj satisfies the condition, RR and jj are connected by a path P=(VP,EP)P=(V_{P},E_{P}) from vertex RR to vertex jj. Let vlVP={vl:l=1,2,,|VP|}v_{l}\in V_{P}=\{v_{l}:l=1,2,\cdots,|V_{P}|\} denote the vertices of PP, where v1=jv_{1}=j, v|VP|=Rv_{|V_{P}|}=R and {vl,vl+1}EP\{v_{l},v_{l+1}\}\in E_{P} for each ll is an edge of PP. Let AA be the set of vertices adjacent to some vertex of VPV_{P}, which may include VPV_{P} itself, i.e.,

AvlVPNvl,A\coloneqq\bigcup_{v_{l}\in V_{P}}N_{v_{l}}, (49)

where NvlN_{v_{l}} is the set of adjacent vertices to vlv_{l} as in Eq. (9).

In Algorithm 1, given a state (48), the parties kk of AA perform U(k)U^{(k)}, and we obtain

(kAU(k))|Φ(RS)=(UR(R))W(VA)|G(R1n),\Big{(}\bigotimes_{k\in A}U^{(k)}\Big{)}\ket{\Phi}^{(RS)}=(U^{(R)}_{R})^{\dagger}\otimes W^{(V\setminus A)}\ket{G}^{(R1...n)}, (50)

where W(VA)=kVAUk(k)W^{(V\setminus A)}=\bigotimes_{k\in V\setminus A}{U_{k}^{(k)}}^{\dagger} is the unitary acting on the parties corresponding to the parties not included in AA. Let AA^{\prime} be the set of the parties of AA which does not correspond to a vertex of VPV_{P}, i.e., A=AVPA^{\prime}=A\setminus V_{P}. Then, each party kk of AA^{\prime} performs measurement in {|0(k),|1(k)}\{\ket{0}^{(k)},\ket{1}^{(k)}\}, and communicates the outcome of measurement to the parties to all the vertices of VPV_{P} adjacent to vertex kk except for v|VP|=Rv_{|V_{P}|}=R. Since qubit RR is a reference qubit, party RR is just a virtual one and cannot perform any operation. Let mlm_{l} denote the number of parties who communicate the outcome |1\ket{1} to party vlv_{l} for each ll. Then, according to Proposition 3, we obtain

(l=1|VP|(Z(vl))ml)(UR(R))|P,\left(\bigotimes_{l=1}^{|V_{P}|}(Z^{(v_{l})})^{m_{l}}\right)(U^{(R)}_{R})^{\dagger}\ket{P}, (51)

where vertices in the superscripts represent their corresponding parties. Thus, each party vlv_{l} except for v|VP|=Rv_{|V_{P}|}=R performs (Z(vl))ml(Z^{(v_{l})})^{m_{l}}, and we obtain

(UR(R))(Z(R))m|VP||P.(U^{(R)}_{R})^{\dagger}(Z^{(R)})^{m_{|V_{P}|}}\ket{P}. (52)

Next, we consider transforming PP by the local complementation shown in Fig. 3 in Corollary 4, which corresponds to measurement in {|±}\{\ket{\pm}\} and LU operations. Party v2v_{2} performs the measurement in {|±(v2)}\{\ket{\pm}^{(v_{2})}\}. Then, according to Proposition 3, if the outcome is |+(v2)\ket{+}^{(v_{2})}, we obtain

(UR(R))(Z(R))m|VP|Z(v3)iY(v1)|P,(U^{(R)}_{R})^{\dagger}(Z^{(R)})^{m_{|V_{P}|}}\otimes Z^{(v_{3})}\otimes\sqrt{iY}^{(v_{1})}\ket{P}, (53)

and if the outcome is |(v2)\ket{-}^{(v_{2})}, we obtain

(UR(R))(Z(R))m|VP|iY(v1)|P.(U^{(R)}_{R})^{\dagger}(Z^{(R)})^{m_{|V_{P}|}}\otimes\sqrt{-iY}^{(v_{1})}\ket{P}. (54)

Therefore, if the outcome is |+(v2)\ket{+}^{(v_{2})}, party v1v_{1} and party v3v_{3} perform (iY(v1))1(\sqrt{iY}^{(v_{1})})^{-1} and Z(v3)Z^{(v_{3})}, respectively. If the outcome is |(v2)\ket{-}^{(v_{2})}, party v1v_{1} performs (iY(v1))1(\sqrt{-iY}^{(v_{1}}))^{-1}. Then, we obtain

(UR(R))(Z(R))m|VP||P,(U^{(R)}_{R})^{\dagger}(Z^{(R)})^{m_{|V_{P}|}}\ket{P^{\prime}}, (55)

where

P=(VP{v2},(EP{{v1,v2},{v2,v3}}){{v1,v3}}).P^{\prime}=\left(V_{P}\setminus\{v_{2}\},(E_{P}\setminus\{\{v_{1},v_{2}\},\{v_{2},v_{3}\}\})\cup\{\{v_{1},v_{3}\}\}\right). (56)

By recursively performing the above operation for l=2,3,,|VP|2l=2,3,\cdots,|V_{P}|-2, we obtain

(UR(R))(Z(R))m|VP||P′′,(U^{(R)}_{R})^{\dagger}(Z^{(R)})^{m_{|V_{P}|}}\ket{P^{\prime\prime}}, (57)

where

P′′=({v1,v|VP|1,v|VP|},{{v1,v|VP|1},{v|VP|1,v|VP|}}).\begin{split}P^{\prime\prime}=(&\{v_{1},v_{|V_{P}|-1},v_{|V_{P}|}\},\\ &\{\{v_{1},v_{|V_{P}|-1}\},\{v_{|V_{P}|-1},v_{|V_{P}|}\}\}).\end{split} (58)

The case of l=|VP|1l=|V_{P}|-1 is exceptional because we cannot perform a local unitary operation on the reference system. Finally, party v|VP|1v_{|V_{P}|-1} performs the measurement in {|±v|VP|1}\{\ket{\pm}^{v_{|V_{P}|-1}}\}, and, according to Proposition 3, we obtain

(UR(R))(Z(R))m|VP|+1\displaystyle(U^{(R)}_{R})^{\dagger}(Z^{(R)})^{m_{|V_{P}|}+1}\otimes iY(v1)|G\displaystyle\sqrt{iY}^{(v_{1})}\ket{G^{\prime}} (59)
(if the outcome is |+v|VP|1),\displaystyle(\text{if the outcome is $\ket{+}^{v_{|V_{P}|-1}}$}),
(UR(R))(Z(R))m|VP|\displaystyle(U^{(R)}_{R})^{\dagger}(Z^{(R)})^{m_{|V_{P}|}}\otimes iY(v1)|G\displaystyle\sqrt{-iY}^{(v_{1})}\ket{G^{\prime}} (60)
(if the outcome is |v|VP|1),\displaystyle(\text{if the outcome is $\ket{-}^{v_{|V_{P}|-1}}$}),

where GG^{\prime} is a connected graph with the two vertices RR and v1=jv_{1}=j. Thus, by applying an appropriate LU operation on (j)\mathcal{H}^{(j)} depending on the outcome, we obtain |Φ(Rj)\ket{\Phi}^{(Rj)} in both cases of the outcomes. ∎

B.2 How to calculate the graph state corresponding to the five-qubit code in Example 1

We show how to calculate the graph state corresponding to the five-qubit code. Let SS^{\prime} be the stabilizer generated by SIRS\otimes I^{R}, X~XR\tilde{X}\otimes X^{R} and Z~ZR\tilde{Z}\otimes Z^{R}. The logical XX and ZZ are respectively represented by X~=X(1)X(2)X(3)X(4)X(5)\tilde{X}=X^{(1)}X^{(2)}X^{(3)}X^{(4)}X^{(5)} and Z~=Z(1)Z(2)Z(3)Z(4)Z(5)\tilde{Z}=Z^{(1)}Z^{(2)}Z^{(3)}Z^{(4)}Z^{(5)}. Logical ZZ and XX operators on this stabilizer code can be calculated using a standard check matrix as mentioned in Chap. 4 in Ref. [43].

Then, |Φ(RS)\ket{\Phi}^{(RS)} is the stabilizer state, and its stabilizer, SS^{\prime}, is generated by the following 6 generators

g1=X(1)Z(2)Z(3)X(4)I(5)I(R),g2=I(1)X(2)Z(3)Z(4)X(5)I(R),g3=X(1)I(2)X(3)Z(4)Z(5)I(R),g4=Z(1)X(2)I(3)X(4)Z(5)I(R),g5=X(1)X(2)X(3)X(4)X(5)X(R),g6=Z(1)Z(2)Z(3)Z(4)Z(5)Z(R).\begin{split}g_{1}&=X^{(1)}Z^{(2)}Z^{(3)}X^{(4)}I^{(5)}I^{(R)},\\ g_{2}&=I^{(1)}X^{(2)}Z^{(3)}Z^{(4)}X^{(5)}I^{(R)},\\ g_{3}&=X^{(1)}I^{(2)}X^{(3)}Z^{(4)}Z^{(5)}I^{(R)},\\ g_{4}&=Z^{(1)}X^{(2)}I^{(3)}X^{(4)}Z^{(5)}I^{(R)},\\ g_{5}&=X^{(1)}X^{(2)}X^{(3)}X^{(4)}X^{(5)}X^{(R)},\\ g_{6}&=Z^{(1)}Z^{(2)}Z^{(3)}Z^{(4)}Z^{(5)}Z^{(R)}.\end{split} (61)

We can transform this set of generators to a (nonunique) canonical one with the transformation as follows [44]. The goal of the transformation is to obtain a set of generators where the Pauli operator acting on the jj-th qubit of generator gjg_{j} is XX, and the others are ZZ or II. For this transformation, we can multiply a generator by another generator gjgjgk(kj)g_{j}\leftarrow g_{j}g_{k}~{}(k\neq j), and apply the local Clifford operation such as the Hadamard gate gjH(1)gjH(1)(for allj)g_{j}\leftarrow H^{(1)}g_{j}H^{(1)}~{}(\text{for all}~{}j).

We first look at the Pauli operators acting on qubit 1 of the generator g1g_{1}, which is XX. In addition, we arbitrarily choose a Pauli operator other than XX, here, ZZ. Then, for the other generators, if the Pauli operator on qubit 1 of the generator gjg_{j} is XX or YY, we update the generator to gjg1gjg_{j}\leftarrow g_{1}g_{j}, and if the Pauli operator on qubit 1 of the generator gjg_{j} is same as the Pauli operator which we chose, then gjg_{j} remains same. With the above transformation, the generators are transformed to

g1=X(1)Z(2)Z(3)X(4)I(5)I(R),g2=I(1)X(2)Z(3)Z(4)X(5)I(R),g3=I(1)Z(2)Y(3)Y(4)Z(5)I(R),g4=Z(1)X(2)I(3)X(4)Z(5)I(R),g5=I(1)Y(2)Y(3)I(4)X(5)X(R),g6=Z(1)Z(2)Z(3)Z(4)Z(5)Z(R).\begin{split}g_{1}&=X^{(1)}Z^{(2)}Z^{(3)}X^{(4)}I^{(5)}I^{(R)},\\ g_{2}&=I^{(1)}X^{(2)}Z^{(3)}Z^{(4)}X^{(5)}I^{(R)},\\ g_{3}&=I^{(1)}Z^{(2)}Y^{(3)}Y^{(4)}Z^{(5)}I^{(R)},\\ g_{4}&=Z^{(1)}X^{(2)}I^{(3)}X^{(4)}Z^{(5)}I^{(R)},\\ g_{5}&=I^{(1)}Y^{(2)}Y^{(3)}I^{(4)}X^{(5)}X^{(R)},\\ g_{6}&=Z^{(1)}Z^{(2)}Z^{(3)}Z^{(4)}Z^{(5)}Z^{(R)}.\end{split} (62)

Next, we repeatedly perform the above transformation looking at qubit k=2,,5,6(=R)k=2,\cdots,5,6(=R) of the generator gkg_{k}. Then, the generators are transformed to

g1=X(1)Z(2)Z(3)X(4)I(5)I(R),g2=Z(1)X(2)Z(3)I(4)I(5)X(R),g3=Z(1)Z(2)X(3)I(4)X(5)I(R),g4=Z(1)I(2)I(3)Z(4)X(5)I(R),g5=I(1)I(2)Z(3)X(4)Z(5)X(R),g6=I(1)Z(2)I(3)X(4)X(5)Z(R).\begin{split}g_{1}&=X^{(1)}Z^{(2)}Z^{(3)}X^{(4)}I^{(5)}I^{(R)},\\ g_{2}&=Z^{(1)}X^{(2)}Z^{(3)}I^{(4)}I^{(5)}X^{(R)},\\ g_{3}&=Z^{(1)}Z^{(2)}X^{(3)}I^{(4)}X^{(5)}I^{(R)},\\ g_{4}&=Z^{(1)}I^{(2)}I^{(3)}Z^{(4)}X^{(5)}I^{(R)},\\ g_{5}&=I^{(1)}I^{(2)}Z^{(3)}X^{(4)}Z^{(5)}X^{(R)},\\ g_{6}&=-I^{(1)}Z^{(2)}I^{(3)}X^{(4)}X^{(5)}Z^{(R)}.\end{split} (63)

We can show from this form of generators that |Φ(RS)\ket{\Phi}^{(RS)} is LC equivalent to the graph state |Gfive-qubit\ket{G_{\text{five-qubit}}} whose graph is given in Fig. 4 as

|Φ(RS)=H(R)H(4)H(5)|G.\ket{\Phi}^{(RS)}=H^{(R)}\otimes H^{(4)}\otimes H^{(5)}\ket{G}. (64)

This is because H(R)H(4)H(5)|Φ(RS)H^{(R)}H^{(4)}H^{(5)}\ket{\Phi}^{(RS)} is stabilized by the stabilizer generated by the following generators, with gj=H(R)H(4)H(5)gjH(R)H(4)H(5)g^{\prime}_{j}=H^{(R)}H^{(4)}H^{(5)}g_{j}H^{(R)}H^{(4)}H^{(5)},

g1=X(1)Z(2)Z(3)Z(4)I(5)I(R),g2=Z(1)X(2)Z(3)I(4)I(5)Z(R),g3=Z(1)Z(2)X(3)I(4)Z(5)I(R),g4=Z(1)I(2)I(3)X(4)Z(5)I(R),g5=I(1)I(2)Z(3)Z(4)X(5)Z(R),g6=I(1)Z(2)I(3)Z(4)Z(5)X(R),\begin{split}g_{1}^{\prime}&=X^{(1)}Z^{(2)}Z^{(3)}Z^{(4)}I^{(5)}I^{(R)},\\ g_{2}^{\prime}&=Z^{(1)}X^{(2)}Z^{(3)}I^{(4)}I^{(5)}Z^{(R)},\\ g_{3}^{\prime}&=Z^{(1)}Z^{(2)}X^{(3)}I^{(4)}Z^{(5)}I^{(R)},\\ g_{4}^{\prime}&=Z^{(1)}I^{(2)}I^{(3)}X^{(4)}Z^{(5)}I^{(R)},\\ g_{5}^{\prime}&=I^{(1)}I^{(2)}Z^{(3)}Z^{(4)}X^{(5)}Z^{(R)},\\ g_{6}^{\prime}&=-I^{(1)}Z^{(2)}I^{(3)}Z^{(4)}Z^{(5)}X^{(R)},\end{split} (65)

According to Proposition 2 in Ref. [33], the graph state |Gfive-qubit|{G_{\text{five-qubit}}}\rangle is the stabilizer state of the stabilizer generated by gj=X(j)kNjZ(k)g_{j}^{\prime}=X^{(j)}\otimes\bigotimes_{k\in N_{j}}Z^{(k)}.

B.3 Proof of Theorem 6

Proof of Theorem 6.

We consider whether a non-cooperative party can block the extraction to party jj by performing a measurement in a wrong basis, communicating a wrong measurement result, or not communicating the measurement result. As discussed in the main text, we show the following statements.

  1. 1.

    If any one of the parties corresponding to a vertex in VPV_{P} does not cooperate, extraction of quantum information to party jj is impossible.

  2. 2.

    If all the parties corresponding to the vertices in one of the subgraphs {Gm,l}m,l{\{G_{m,l}\}}_{m,l} do not cooperate, the extraction of quantum information to party jj is impossible.

To show that LOCC extraction of quantum information is impossible in each case, we consider the reduced state of |GG|\ket{G}\bra{G} on the system corresponding to the cooperative parties. We show that the reduced state cannot be transformed to |ΦΦ|(Rj)\ket{\Phi}\bra{\Phi}^{(Rj)} by LOCC using the monotonicity of an entanglement measure under LOCC. Since the reduced state can be considered to be a classical probability mixture of the state after the projective measurement in an orthonormal basis of the system that is traced out, we can use Proposition 3 about LPMs on the graph states.

Refer to caption
Figure 12: The dotted lines represent the eliminated vertex and edges after the measurement in {|0,|1}\{\ket{0},\ket{1}\} on qubit (vl){(v_{l})}. The graph after the measurement can be divided into three subgraphs GA,GBG_{A},G_{B}, and GCG_{C} shaded in orange, gray, and blue, respectively. Since GA,GBG_{A},G_{B}, and GCG_{C} are not connected, the state after the measurement has no entanglement between RR and jj.
Refer to caption
Figure 13: The graph obtained by the local complementation on vlv_{l} of the graph shown in Fig. 7. The orange lines represent the edges added by the local complementation on vlv_{l}.
Refer to caption
Figure 14: The graph obtained by the local complementation on G1,lG_{1,l} of the graph shown in Fig. 13. The orange dashed lines represent the edges eliminated by the local complementation on G1,lG_{1,l}.
Refer to caption
Figure 15: The graph obtained by eliminating G1,lG_{1,l} and the local complementation on vlv_{l}. This graph corresponds to the state after the measurement in {|±}\{\ket{\pm}\} on G1,lG_{1,l}. This graph after the measurement in {|±(G1,l)}\{\ket{\pm}^{(G_{1,l})}\} is obtained by the operation written in Proposition 3 as follows, (1) Local complementation at PmP_{m} shown in Fig. 13, (2) Local complementation at Gm(1)G_{m}^{(1)} shown in Fig. 14, (3) Eliminating Gm(1)G_{m}^{(1)}, and (4) Local complementation at PmP_{m} shown in Fig. 15. The graph after the measurement can be divided into three subgraphs GA,GDG_{A},G_{D}, and GCG_{C} shaded in orange, gray, and blue, respectively. Since GA,GDG_{A},G_{D} and GCG_{C} are not connected with each other, the state after the measurement has no entanglement between RR and jj.

Let us consider the first case where party vkVPv_{k}\in V_{P} does not cooperate. Here, as said above, instead of tracing out (vk)\mathcal{H}^{(v_{k})}, we consider the measurement on (vk)\mathcal{H}^{(v_{k})} since it gives the same reduced state on the composite system of the parties other than (vk)\mathcal{H}^{(v_{k})}. After the measurement in {|0(vk),|1(vk)}\{\ket{0}^{(v_{k})},\ket{1}^{(v_{k})}\} on qubit vkv_{k}, if the outcome is |0(vk)\ket{0}^{(v_{k})}, the state of the system vV{vk}(v)\bigotimes_{v\in V\setminus\{v_{k}\}}\mathcal{H}^{(v)} is represented by |GvkGvk|\ket{G-v_{k}}\bra{G-v_{k}}, and if the outcome is |1(vk)\ket{1}^{(v_{k})}, the state is represented by Uvk,Z,|GvkGvk|Uvk,Z,U_{v_{k},Z,-}\ket{G-v_{k}}\bra{G-v_{k}}U_{v_{k},Z,-}^{\dagger}, where

Uvk,Z,=Z(uk,1)Z(uk,ml)Z(vk1)Z(vk+1).U_{v_{k},Z,-}=Z^{(u_{k,1})}\cdots Z^{(u_{k,m_{l}})}Z^{(v_{k-1})}Z^{(v_{k+1})}. (66)

Since the graph corresponding to the state after the measurement in {|0(vk),|1(vk)}\{\ket{0}^{(v_{k})},\ket{1}^{(v_{k})}\} on qubit vkv_{k} is represented by Fig. 12 according to Proposition 3, we obtain

|Gvk=|GA|GB|GC,\ket{G-v_{k}}=|G_{A}\rangle\otimes|G_{B}\rangle\otimes|G_{C}\rangle, (67)

where GAG_{A}, GBG_{B}, and GCG_{C} are the graphs in Fig. 12 that are not connected with each other. Thus the state after the measurement in {|0(vk),|1(vk)}\{\ket{0}^{(v_{k})},\ket{1}^{(v_{k})}\} is represented by

ρ=12a=0,1{((Z(vk1))a|GAGA|(Z(vk1))a)((Uvk,Z,)a|GBGB|(Uvk,Z,)a)((Z(vk+1))a|GCGC|(Z(vk+1))a)},\begin{split}\rho=\frac{1}{2}\sum_{a=0,1}\{&((Z^{(v_{k-1})})^{a}\ket{G_{A}}\bra{G_{A}}(Z^{(v_{k-1})})^{a})\\ &\otimes({(U_{v_{k},Z,-}^{\prime})}^{a}\ket{G_{B}}\bra{G_{B}}({U_{v_{k},Z,-}^{\prime}}^{\dagger})^{a})\\ &\otimes((Z^{(v_{k+1})})^{a}\ket{G_{C}}\bra{G_{C}}(Z^{(v_{k+1})})^{a})\},\end{split} (68)

where Uvk,Z,Z(uk,1)Z(uk,mk)U_{v_{k},Z,-}^{\prime}\coloneqq Z^{(u_{k,1})}\cdots Z^{(u_{k,m_{k}})}.

In the following, we use the distillable entanglement ED()E_{D}(\cdot) as an entanglement measure to quantify the bipartite entanglement. The distillable entanglement in the bipartite system consisting of the subsystems AA and BB is defined as [13]

ED(ρ)=sup{r:limn[inf||Λ((ρ(AB))n)Φ2rn(AB)1]=0},\begin{split}E_{D}(\rho)=&\sup\left\{r:\right.\\ &\left.\lim_{n\rightarrow\infty}\left[\inf||\Lambda\left((\rho^{(AB)})^{\otimes n}\right)-\Phi_{2^{rn}}^{(AB)}\|_{1}\right]=0\right\},\end{split} (69)

where Φ2rn(AB)=(|ΦΦ|(AB))rn\Phi_{2^{rn}}^{(AB)}=(\ket{\Phi}\bra{\Phi}^{(AB)})^{\otimes rn} and ||||1||\cdot||_{1} is the trace norm. Let us consider the system as a bipartite system composed of the system corresponding to GCG_{C} and the composite system of two systems corresponding to GAG_{A} and GBG_{B} respectively. With respect to this bipartition, we obtain ED(ρ)=0E_{D}(\rho)=0 since ρ\rho is separable.

According to Lemma 1, if extraction of quantum information is possible, we can transform ρ\rho into |ΦΦ|(Rj)\ket{\Phi}\bra{\Phi}^{(Rj)} by LOCC. Since ED(ρ)=0E_{D}(\rho)=0, ED(|ΦΦ|(Rj))=1E_{D}(\ket{\Phi}\bra{\Phi}^{(Rj)})=1 and entanglement measure is not increased by LOCC, ρ\rho cannot be transformed into |ΦΦ|(Rj)\ket{\Phi}\bra{\Phi}^{(Rj)} by LOCC. Therefore, extraction of quantum information is impossible without the cooperation of the party corresponding to vkv_{k}.

Secondly, we consider the case where none of the parties corresponding to the vertices in a subgraph Gk,lG_{k,l} cooperates. Let us define the orthonormal states of the system consisting of qubits in Vk,lV_{k,l},

|0(Vk,l)\displaystyle\ket{0}^{(V_{k,l})} =|0(uk,l)|Gk,luk,l,\displaystyle=\ket{0}^{(u_{k,l})}\otimes|G_{k,l}-u_{k,l}\rangle, (70)
|1(Vk,l)\displaystyle\ket{1}^{(V_{k,l})} =|1(uk,l)Z(Vk,l{uk,l})|Gk,luk,l.\displaystyle=\ket{1}^{(u_{k,l})}\otimes Z^{\left(V_{k,l}\setminus\{u_{k,l}\}\right)}|G_{k,l}-u_{k,l}\rangle. (71)

Since the domain of the reduced state of |GG|\ket{G}\bra{G} on the system corresponding to Vk,lV_{k,l} is spanned by the two states given by Eqs. (70) and (71), we can regard the system corresponding to Vk,lV_{k,l} as a qubit. Then, |G\ket{G} can be regarded as the graph state corresponding to the graph in Fig. 7 by regarding the boxes as vertices.

Without loss of generality, let us consider the case of tracing out the system consisting of Vk,1V_{k,1}. In the same way as in the first case, we consider the measurement in {|±(Vk,1)=(|0(Vk,1)±|1(Vk,1))/2}\{\ket{\pm}^{(V_{k,1})}=(\ket{0}^{(V_{k,1})}\pm\ket{1}^{(V_{k,1})})/\sqrt{2}\} on the qubit corresponding to Vk,1V_{k,1} instead of tracing out the system Vk,1V_{k,1}. The measurement in {|±(Vk,1)}\{\ket{\pm}^{(V_{k,1})}\} on the qubit corresponding to Vk,1V_{k,1} can be represented by the transformation of graphs shown in Fig. 1314, and 15. The state obtained by the measurement in {|±(Vk,1)}\{\ket{\pm}^{(V_{k,1})}\} corresponds to the graph shown in Fig. 15. Then, in the same way as in the first case, the state after the measurement ρ\rho is represented by

ρ=12a=0,1{[(Z(vk1))a|GAGA|(Z(vk1))a][(1)aiY(vk)(Uvk,Z,′′)a|GDGD|(Uvk,Z,′′)a(1)aiY(vk)][(Z(vk+1))a|GCGC|(Z(vk+1))a]},\begin{split}\rho&=\frac{1}{2}\sum_{a=0,1}\Big{\{}\left[(Z^{(v_{k-1})})^{a}\ket{G_{A}}\bra{G_{A}}(Z^{(v_{k-1})})^{a}\right]\\ &\otimes\left[\sqrt{(-1)^{a}iY^{(v_{k})}}{(U_{v_{k},Z,-}^{\prime\prime})}^{a}\ket{G_{D}}\bra{G_{D}}({U_{v_{k},Z,-}^{\prime\prime}}^{\dagger})^{a}\sqrt{(-1)^{a}iY^{(v_{k})}}^{\dagger}\right]\otimes\left[(Z^{(v_{k+1})})^{a}\ket{G_{C}}\bra{G_{C}}(Z^{(v_{k+1})})^{a}\right]\Big{\}},\end{split} (72)

where Uvk,Z,′′Z(uk,2)Z(uk,mk){U_{v_{k},Z,-}^{\prime\prime}}\coloneqq Z^{(u_{k,2})}\cdots Z^{(u_{k,m_{k}})}. We can see that ρ\rho is separable and hence ED(ρ)=0E_{D}(\rho)=0. Thus, ρ\rho cannot be transformed into |Φ(Rj)Φ|(Rj)\ket{\Phi}^{(Rj)}\bra{\Phi}^{(Rj)} by LOCC. In the same way as the vkv_{k}, extraction of quantum information to jj is impossible if all the parties in Vk,1V_{k,1} do not cooperate, which completes the proof. ∎

Appendix C Two-qubit extraction is not simple

Extending the analysis of LOCC extraction of single-qubit information to that of multi-qubit quantum information is not straightforward since the multi-qubit case involves an additional network untying problem. To exhibit this property, let us consider the following graph shown on the left-hand side in Fig. 16, which represents the maximally entangled state between the two-qubit reference and the stabilizer code with two logical qubits.

Consider extracting information into two qubits, v3v_{3} and v4v_{4}. As explained in Lemma 1, LOCC extraction to v3v_{3} and v4v_{4} is equivalent to obtain the maximally entangled state between R1,R2{R_{1},R_{2}} and v3,v4{v_{3},v_{4}}, which holds two-ebits of entanglement. In the single-qubit case, we only need to check the connectivity between the reference and the party to be extracted. As R1R_{1}, R2R_{2}, v3v_{3}, and v4v_{4} are connected, LOCC extraction seems to be possible from the analysis of only the connectivity of the graph. However, two-qubit information cannot be extracted by LOCC in this case because the graph state is actually not maximally entangled for the bipartition drawn in Fig. 16, since this graph state is LC equivalent to the graph state on the right-hand side in Fig. 16, which can only hold one-ebit of entanglement for this bipartition. As LOCC cannot generate entanglement, we cannot obtain the maximally entangled state between R1,R2{R_{1},R_{2}} and v3,v4{v_{3},v_{4}} from the initial graph state.

In general, to determine if LOCC extraction is possible and to give the protocol for LOCC extraction, it is necessary to check all the exponential numbers of graphs that can be transformed by local complementation. Finding a class of stabilizer code with multiple logical qubits for efficient LOCC extraction may be possible, but further investigation should be a future task.

Refer to caption
Figure 16: (Left) The graph state corresponding to the maximally entangled state between two reference qubits and a stabilizer code that encodes two qubits. (Right) The graph state that is LC equivalent to the graph state shown on the left-hand side. We can see from the right that the state cannot be maximally entangled for the bipartition drawn by the orange dotted lines. Therefore, two-qubit information cannot be extracted to v3v_{3} and v4v_{4} by LOCC.

References