arXiv:1806.07276v2 [quant-ph] 24 Dec 2020

18
adhan¯ a Vol. , No., , pp.– DOI © Indian Academy of Sciences Inner bounds via simultaneous decoding in quantum network information theory PRANAB SEN 1,* 1 School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India. Email: [email protected] Abstract. We prove new inner bounds for several multiterminal channels with classical inputs and quantum outputs. Our inner bounds are all proved in the one-shot setting and are natural analogues of the best classical inner bounds for the respective channels. For some of these channels, similar quantum inner bounds were unknown even in the asymptotic independent and identically distributed setting. We prove our inner bounds by appealing to a new classical-quantum joint typicality lemma established in a companion paper [1]. This lemma allows us to lift to the quantum setting many inner bound proofs for classical multiterminal channels that use intersections and unions of typical sets. Keywords. quantum simultaneous decoder; one-shot inner bounds; broadcast channel; interference channel; network information theory 1 Introduction An important technical tool used in proving inner bounds in classical network information theory is the so-called condi- tional joint typicality lemma [2]. What is equally important but often not emphasised are the implicit union and intersec- tion arguments used in the inner bound proofs. For quantum channels, proving a joint typicality lemma that can withstand union and intersection arguments was a big bottleneck. As a result of this bottleneck, many inner bounds in classical network information theory were hitherto not known to be extendable to the quantum setting. Most inner bounds in information theory were first proved in the traditional setting of many independent and identically distributed (iid) uses of a classical communication channel. Recently, attention has shifted to proving inner bounds in the one-shot setting where the classical or quantum channel can be used only once. This is the most general setting. The aim is to prove good one-shot inner bounds which ideally yield the best known inner bounds when restricted to the asymp- totic iid and asymptotic non-iid (information spectrum) set- tings. In the one-shot setting, the importance of union and intersection arguments increases and they often need to be made explicit. This is because the technique of time sharing often used in the asymptotic iid setting does not apply in the one-shot setting. In other words, the one-shot setting forces us to look for so-called simultaneous decoders for multiter- minal channels. The inner bound analyses for simultaneous decoders generally use union and intersection arguments. Fawzi et al [3] and Sen [4] did construct a simultane- ous decoder for the two sender multiple access channel with classical inputs and quantum output (cq-MAC) but their con- structions, which were given in the asymptotic iid setting, are not known to work in the one-shot setting. Qi, Wang and Wilde [5] constructed a one-shot simultaneous decoder for the cq-MAC with an arbitrary number of senders, but their achievable rates restricted to the asymptotic iid setting are inferior to the optimal rates obtained by Winter [6] using suc- cessive cancellation. Thus, for more than two senders a si- multaneous decoder for the cq-MAC achieving optimal rates was hitherto unknown even in the asymptotic iid setting. A simultaneous decoder for the MAC with three senders is used as a crucial ingredient in the proof of the Han-Kobayashi in- ner bound for the interference channel [7], even in the asymp- totic iid classical setting. Thus, the lack of a simultaneous de- coder for the asymptotic iid quantum setting is a bottleneck, which was sidestepped by Sen [4] by constructing a simulta- neous decoder for a restricted type of three sender cq-MAC which suced to prove the Han-Kobayashi inner bound in the asymptotic iid setting for sending classical information over a quantum interference channel. Hirche, Morgan and Wilde [8] also proved the Han-Kobayashi inner bound for sending classical information over a quantum interference channel in the asymptotic iid setting. They did so using successive cancellation and polar coding. However, both Sen’s and Hirche et al’s techniques are tied to the asymp- totic iid setting and do not give any non-trivial inner bound for the interference channel in the one-shot setting. Addi- tionally, those techniques do not seem to give any non-trivial inner bound for the entanglement assisted interference chan- nel even in the asymptotic iid quantum setting. Very recently, in a companion paper Sen [1] proved a one-shot quantum joint typicality lemma that possesses strong union and intersection properties. Using that lemma, he also constructed a one-shot simultaneous decoder for the cq-MAC with an arbitrary number of senders. In this paper 1 , we use the quantum joint typicality lemma from [1] to obtain for the first time non-trivial one-shot inner bounds for sending clas- sical information over several multiterminal quantum chan- nels. The channels that we consider are the broadcast chan- nel and interference channel, both without and with entangle- 1 Journal version of [9] 1 arXiv:1806.07276v2 [quant-ph] 24 Dec 2020

Transcript of arXiv:1806.07276v2 [quant-ph] 24 Dec 2020

Sadhana Vol. , No., , pp.–DOI

© Indian Academy of Sciences

Inner bounds via simultaneous decoding in quantum network information theory

PRANAB SEN1,*

1 School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India.Email: [email protected]

Abstract. We prove new inner bounds for several multiterminal channels with classical inputs and quantumoutputs. Our inner bounds are all proved in the one-shot setting and are natural analogues of the best classical innerbounds for the respective channels. For some of these channels, similar quantum inner bounds were unknown evenin the asymptotic independent and identically distributed setting. We prove our inner bounds by appealing to a newclassical-quantum joint typicality lemma established in a companion paper [1]. This lemma allows us to lift to thequantum setting many inner bound proofs for classical multiterminal channels that use intersections and unions oftypical sets.

Keywords. quantum simultaneous decoder; one-shot inner bounds; broadcast channel; interference channel;network information theory

1 Introduction

An important technical tool used in proving inner bounds inclassical network information theory is the so-called condi-tional joint typicality lemma [2]. What is equally importantbut often not emphasised are the implicit union and intersec-tion arguments used in the inner bound proofs. For quantumchannels, proving a joint typicality lemma that can withstandunion and intersection arguments was a big bottleneck. Asa result of this bottleneck, many inner bounds in classicalnetwork information theory were hitherto not known to beextendable to the quantum setting.

Most inner bounds in information theory were first provedin the traditional setting of many independent and identicallydistributed (iid) uses of a classical communication channel.Recently, attention has shifted to proving inner bounds in theone-shot setting where the classical or quantum channel canbe used only once. This is the most general setting. The aimis to prove good one-shot inner bounds which ideally yieldthe best known inner bounds when restricted to the asymp-totic iid and asymptotic non-iid (information spectrum) set-tings. In the one-shot setting, the importance of union andintersection arguments increases and they often need to bemade explicit. This is because the technique of time sharingoften used in the asymptotic iid setting does not apply in theone-shot setting. In other words, the one-shot setting forcesus to look for so-called simultaneous decoders for multiter-minal channels. The inner bound analyses for simultaneousdecoders generally use union and intersection arguments.

Fawzi et al [3] and Sen [4] did construct a simultane-ous decoder for the two sender multiple access channel withclassical inputs and quantum output (cq-MAC) but their con-structions, which were given in the asymptotic iid setting,are not known to work in the one-shot setting. Qi, Wang andWilde [5] constructed a one-shot simultaneous decoder forthe cq-MAC with an arbitrary number of senders, but theirachievable rates restricted to the asymptotic iid setting are

inferior to the optimal rates obtained by Winter [6] using suc-cessive cancellation. Thus, for more than two senders a si-multaneous decoder for the cq-MAC achieving optimal rateswas hitherto unknown even in the asymptotic iid setting. Asimultaneous decoder for the MAC with three senders is usedas a crucial ingredient in the proof of the Han-Kobayashi in-ner bound for the interference channel [7], even in the asymp-totic iid classical setting. Thus, the lack of a simultaneous de-coder for the asymptotic iid quantum setting is a bottleneck,which was sidestepped by Sen [4] by constructing a simulta-neous decoder for a restricted type of three sender cq-MACwhich sufficed to prove the Han-Kobayashi inner bound inthe asymptotic iid setting for sending classical informationover a quantum interference channel. Hirche, Morgan andWilde [8] also proved the Han-Kobayashi inner bound forsending classical information over a quantum interferencechannel in the asymptotic iid setting. They did so usingsuccessive cancellation and polar coding. However, bothSen’s and Hirche et al’s techniques are tied to the asymp-totic iid setting and do not give any non-trivial inner boundfor the interference channel in the one-shot setting. Addi-tionally, those techniques do not seem to give any non-trivialinner bound for the entanglement assisted interference chan-nel even in the asymptotic iid quantum setting.

Very recently, in a companion paper Sen [1] proved aone-shot quantum joint typicality lemma that possesses strongunion and intersection properties. Using that lemma, he alsoconstructed a one-shot simultaneous decoder for the cq-MACwith an arbitrary number of senders. In this paper1, we usethe quantum joint typicality lemma from [1] to obtain for thefirst time non-trivial one-shot inner bounds for sending clas-sical information over several multiterminal quantum chan-nels. The channels that we consider are the broadcast chan-nel and interference channel, both without and with entangle-

1Journal version of [9]

1

arX

iv:1

806.

0727

6v2

[qu

ant-

ph]

24

Dec

202

0

2 Pranab Sen

ment assistance. For both channels our one-shot quantum in-ner bounds are the natural analogues of the best known clas-sical asymptotic iid inner bounds, and reduce to them in theiid limit.

1.1 Organisation of the paper

In the next section, we state some preliminary facts whichwill be useful throughout the paper. In Section 3, we statetwo simple versions of Sen’s quantum joint typicality lemma[1] which suffice for the applications in this paper. In Sec-tion 4, we prove a one-shot Marton inner bound with com-mon message [10] for sending classical information throughunassisted as well as entanglement assisted quantum broad-cast channel. Section 5 proves the achievability of the Han-Kobayashi [7] and Chong-Motani-Garg-El Gamal [11] innerbounds for one-shot use of a cq-interference channel. Fi-nally, we make some concluding remarks and list some openproblems in Section 6.

2 Preliminaries

All Hilbert spaces in this paper are finite dimensional. Thesymbol⊕ always denotes the orthogonal direct sum of Hilbertspaces. For a subspace X of a Hilbert spaceH , let ΠHX denotethe orthogonal projection inH onto X. When clear from thecontext, we may use ΠX instead of ΠHX for brevity of nota-tion.

By a quantum state or a density matrix in a Hilbert spaceH , we mean a Hermitian, positive semidefinite linear opera-tor on H with trace equal to one. By a POVM element Π inH , we mean a Hermitian positive semidefinite linear opera-tor on H with eigenvalues between 0 and 1. Stated in termsof inequalities on Hermitian operators, l0 ≤ Π ≤ 11, where l0,11 denote the zero and identity operators onH .

Let ‖v‖2 denote the `2-norm of a vector v ∈ H . For anoperator A on H , we use ‖A‖1 to denote the Schatten `1-norm, also known as trace norm, of A, which is nothing butthe sum of singular values of A. We use ‖A‖∞ to denote theSchatten `∞-norm, also known as operator norm, of A, whichis nothing but the largest singular value of A. For operatorsA, B onH , we have the inequality

|Tr [AB]| ≤ ‖AB‖1 ≤ min{‖A‖1 ‖B‖∞ , ‖A‖∞ ‖B‖1}.

Let X be a finite set. By a classical-quantum (hereaftercalled cq for short) state on XH we mean a quantum state ofthe form ρXH =

∑x∈X px|x〉〈x|X ⊗ ρHx , where x ranges over

computational basis vectors of X viewed as a Hilbert space,{px}x∈X is a probability distribution on X and the operatorsρx for all x ∈ X are quantum states in H . We will also usethe terminology that ρ is classical on X and quantum on H .In this paper, superscripts in the notation for a quantum statewill denote the Hilbert space in which it lies. A similar con-vention will be used for classical probability distributions.

In this paper all our quantum operations will be trace non-increasing completely positive superoperators, generalisingunitary evolution, POVM measurement and tracing out sub-systems. For brevity, we will use the term superoperator to

denote such operations. An expression like CA1A2→B1B2B3 willdenote a superoperator taking operators on A1 ⊗ A2 to opera-tors on B1⊗B2⊗B3. We use IA to denote the identity superop-erator on A. When there is a need for very precise notation,we will use expressions like (CA1A2→B(ρA1A2 ))B to denote the(possibly subnormalised) quantum state in B obtained by ap-plying the superoperator C to quantum state ρA1A2 .

For a positive integer c, we will use [c] to denote the set{1, 2, . . . , c}. If c = 0, we define [c] := {}. We shall studysystems that are classical on X⊗[c] and quantum onH . If x isa computational basis vector ofX⊗[c], for a subset S ⊆ [c], xS

will denote its restriction to the system X⊗S . Thus, x ≡ x[c].We also use xS to denote computational basis vectors of X⊗S

without reference to the systems in [c]\S . The notation (·)⊗S

denotes a tensor product only for the coordinates in S . Wewill use the notation (S 1, . . . , S l) ⊆ [c] to denote a collectionof subsets S 1, . . . , S l, l > 0 of [c]. Note that order does notmatter in describing a collection of subsets of [c].

We will need Winter’s gentle measurement lemma [12].

Fact 1 ([13]) Let Λ be a POVM element and ρ be a quantumstate such that Tr [Λρ] ≥ 1 − ε. Then,

∥∥∥ρ − Λ1/2ρΛ1/2∥∥∥

1 ≤

2√ε.

We recall the definition of the hypothesis testing relativeentropy given by Wang and Renner [14]. Very similar quan-tities were defined and used in earlier works [15, 16].

Definition 1 Let α, β be two quantum states in the sameHilbert space. Let 0 ≤ ε < 1. Then the hypothesis testingrelative entropy of α with respect to β is defined by

DεH(α‖β) := max

Π:Tr [Πα]≥1−ε− log Tr [Πβ],

where the maximisation is over all POVM elements Π actingon the Hilbert space.

The definition quantifies the minimum probability of ‘accept-ing’ β by a POVM element Π that ‘accepts’ α with probabil-ity at least 1 − ε. From the definition, it is easy to see that ifε < ε′, Dε

H(α‖β) < Dε′

H(α‖β). We now define the hypothesistesting mutual information of a bipartite quantum state ρAB.

Definition 2 Let 0 ≤ ε < 1. Let ρAB be a quantum state in abipartite system AB. The hypothesis testing mutual informa-tion is defined as IεH(A : B)ρ := Dε

H(ρAB‖ρA ⊗ ρB).

For a cq-state, we can define the hypothesis testing condi-tional mutual information.

Definition 3 Let 0 ≤ ε < 1. Let ρABC be a state which is clas-sical on A and quantum on BC. It can be expressed as ρABC =∑

a p(a)|a〉〈a|A⊗ρBCa .Consider a stateσABC which is classical

on A and quantum on BC defined as σABC =∑

a p(a)|a〉〈a|A⊗ρB

a ⊗ ρCa . The hypothesis testing conditional mutual informa-

tion is defined as IεH(B : C|A)ρ := DεH(ρABC‖σABC).

Let 0 ≤ ε ≤ 1. Let P, Q be probablity distributions on thesame sample space X. For non-negative vectors v1, v2 sup-ported on X, we use the notation v1 ≤ v2 to denote v1(x) ≤

Inner bounds via simultaneous decoding in quantum network information theory 3

v2(x) for all sample points x ∈ X. We now define the smoothmax relative entropy of P with respect to Q. The defini-tion below is obtained by taking the classical version of thequantity defined by Datta [17], coupled with the observationthat there exists a minimising P′ in the definition satisfyingP′ ≤ P. This condition will be useful when we prove a one-shot mutual covering lemma in Fact 2.

Definition 4 The ε-smooth max relative entropy of P withrespect to Q is defined as

Dε∞(P‖Q) := min

0≤P′≤P:‖P−P′‖1≤εmaxx∈X

logP′(x)Q(x)

,

where 00 := 1. Note that Dε

∞(P‖Q) can be +∞ if the supportof P is not contained in the support of Q and ε is small.

For completeness, we recall Datta’s definition of ε-smoothmax relative entropy of quantum state ρwith respect to quan-tum state σ:

Dε∞(ρ‖σ) := min

ρ′:‖ρ−ρ′‖1≤εmin

λ∈R:ρ≤2λσλ.

Note that Dε∞(ρ‖σ) can be +∞ if the support of ρ is not con-

tained in the support of σ and ε is small.For a joint probability distribution P on the sample space

X × Y × Z, we define the smooth max conditional mutualinformation as follows.

Definition 5 The ε-smooth max mutual information betweenrandom variables X and Y conditioned on Z under the jointdistribution P is defined as

Iε∞(X : Y |Z)P := Dε∞(PXYZ‖PZ × (PX |Z) × (PY |Z)),

where the superscripts denote the sample spaces of the re-spective probability distributions, and PZ × (PX |Z) × (PY |Z)denote the probability distribution on X × Y × Z obtainedby first taking a sample according to the marginal on Z fol-lowed by independently taking a pair of samples according tothe marginals onY andZ conditioned on the chosen samplefromZ.

We now define the so-called ‘restricted smooth condi-tional max mutual information’ for a quantum state ρZXY

which is classical on Z and quantum on X and Y . Our defini-tion is the conditional version of a quantity defined in [18].

Definition 6 The ε-smooth restricted conditional max mu-tual information between X and Y conditioned on Z underthe state ρXYZ , where X, Y are quantum and Z is classical, isdefined as

Iε,δ∞ (X : Y |Z)ρ := Dε,δ∞ (ρXYZ‖ρZ ⊗ ρX |Z ⊗ ρY |Z),

where the classical quantum state ρZ ⊗ ρX |Z ⊗ ρY |Z is ob-tained by taking a sample z according to the marginal prob-ability distribution ρZ followed by the tensor product of themarginal quantum states ρX |z and ρY |z obtained by condi-tioning on z, and the smoothing in the definition of Dε,δ

∞ (·‖·)is done only over classical quantum states (ρ′)XYZ ε-close toρXYZ satistying (ρ′)XZ ≤ (1 + δ)ρXZ and (ρ′)YZ ≤ (1 + δ)ρYZ .

We next state a one-shot mutual covering lemma whichstrengthens the one-shot mutual covering lemma of Radhakr-ishnan et al [19, Lemma 3]. Our mutual covering lemma isclosely related to the bipartite convex split lemma of Anshu,Jain and Warsi [18] specialised to the classical setting. Westate it in this form so that it may be useful for other problemsin network information theory. For the broadcast channel, itallows us to give a clean one-shot proof of Marton’s innerbound with the added advantage of decoding Alice’s ‘inputrandom variables’ exactly and not just ‘up to the band’ as inthe traditional forms of Marton’s inner bound.

Fact 2 (One-shot mutual covering lemma) Let (U0,U1,U2)be a triple of random variables in the sample spaceU0×U1×

U2 with joint distribution function PU0U1U2 . Let 0 < ε < 1.Define I∞ := Iε∞(U1 : U2|U0)P. Let r1, r2 be positive integerssuch that

r1 + r2 ≥ I∞ + 2 log1ε.

We now define two probability distributions on the setU0 × (U1)2r1

× (U2)2r2× [2r1 ] × [2r2 ] as follows.

1. For the first distribution (P1)U0(U1)2r1 (U2)2r2 K1K2 , definea new pair of random variables (K1,K2) taking uni-formly random values in [2r1 ] × [2r2 ]. Choose first asample u0 according to the marginal PU0 . Choose in-dependently a sample (k1, k2) from (K1,K2). Let

~U1−k1|u0

:= (U1(1) × · · · × U1(k1 − 1) × U1(k1 + 1)× · · · × U1(2r1 ))|u0

be (2r1 − 1) independent copies of the random variableU1|(U0 = u0). Similarly, define

~U2−k2|u0

:= (U2(1) × · · · × U2(k2 − 1) × U2(k2 + 1)× · · · × U2(2r2 ))|u0

to be (2r2 − 1) independent copies of the random vari-able U2|(U0 = u0). Let (U1(k1),U2(k2))|u0 denote thedistribution PU1U2 |(U0 = u0) on the (k1, k2)th copy.This completes the definition of the probability distri-bution (P1)U0(U1)2r1 (U2)2r2 K1K2 denoted in brief by

(P1)U0(U1)2r1 (U2)2r2 K1K2

:= K1K2U0((U1(k1),U2(k2))|U0)( ~U1−K1|U0)( ~U2

−K2|U0).

2. For the second distribution (P2)U0(U1)2r1 (U2)2r2 K1K2 , choosefirst a sample u0 according to the marginal PU0 . Let

~U1|u0 := (U1(1) × · · · × U1(2r1 ))|u0

be 2r1 independent copies of the random variable U1|(U0 =

u0). conditioned on the sample from U0. Similarly, de-fine

~U2|u0 := (U2(1) × · · · × U2(2r2 ))|u0

4 Pranab Sen

to be 2r2 independent copies of the random variableU2|(U0 = u0). A pair (k1, k2) ∈ [2r1 ]× [2r2 ] is now cho-sen conditioned on the other random variables withexactly the same conditioning as in the distribution(P1)U0(U1)2r1 (U2)2r2 K1K2 . We shall denote the completedistribution so obtained by (P2)U0(U1)2r1 (U2)2r2 K1K2 anddenote it in brief by

(P2)U0(U1)2r1 (U2)2r2 K1K2

:= U0( ~U1|U0)( ~U2|U0)((K1,K2)|U0 ~U1 ~U2).

Then,∥∥∥∥(P1)U0(U1)2r1 (U2)2r2 K1K2 − (P2)U0(U1)2r1 (U2)2r2 K1K2

∥∥∥∥1≤ 4ε.

Proof: First, condition on a sample u0 from the marginalPU0 . Consider now the distributions (P1)(U1)2r1 (U2)2r2

|(U0 =

u0), (P2)(U1)2r1 (U2)2r2|(U0 = u0). Suppose one can show that∥∥∥∥(P1)(U1)2r1 (U2)2r2

|(U0 = u0) − (P2)(U1)2r1 (U2)2r2|(U0 = u0)

∥∥∥∥1≤ 4ε.

This will imply that∥∥∥∥(P1)U0(U1)2r1 (U2)2r2− (P2)U0(U1)2r1 (U2)2r2

∥∥∥∥1≤ 4ε.

Now observe that the conditioning of (K1,K2) on the otherrandom variables is exactly the same in the two distribu-tions (P1)U0(U1)2r1 (U2)2r2 K1K2 , (P2)U0(U1)2r1 (U2)2r2 K1K2 . This im-plies that∥∥∥∥(P1)U0(U1)2r1 (U2)2r2 K1K2 − (P2)U0(U1)2r1 (U2)2r2 K1K2

∥∥∥∥1

=∥∥∥∥(P1)U0(U1)2r1 (U2)2r2

− (P2)U0(U1)2r1 (U2)2r2∥∥∥∥

1≤ 4ε.

It only remains to show that∥∥∥∥(P1)(U1)2r1 (U2)2r2|(U0 = u0) − (P2)(U1)2r1 (U2)2r2

|(U0 = u0)∥∥∥∥

1≤ 4ε.

For this, apply the bipartite convex split lemma of Anshu,Jain and Warsi with the observation that for classical proba-bility distributions the ‘smoothing’ subdistribution (P′)U0U1U2

of Definition 5 satisfies (P′)U0U1U2 ≤ PU0U1U2 which impliesthat δ = 0 in Lemma 3 of [18]. The above inequality thenfollows easily.

This completes the proof of our one-shot mutual coveringlemma. �

We shall use the so-called pretty good measurement (PGM)[20, 21], also known as square root measurement, in order toconstruct our decoders. Given a set of POVM elements Πm,m ∈ [M], the pretty good measurement is a POVM definedas follows:

Λm :=

∑m′

Πm′

−1/2

Πm

∑m′

Πm′

−1/2

We will use the famous Hayashi-Nagaoka [22] operator in-equality in order to analyse the decoding error of the PGMPOVM.

Fact 3

11 − Λm ≤ 2(11 − Πm) + 4∑

m′:m′,m

Πm′ .

3 The quantum joint typicality lemma

We now state the versions of the classical-quantum joint typ-icality lemma from [1] which suffice for the applications inthis paper.

Fact 4 (cq joint typ. lem., intersec. case) Let H , L be twoHilbert spaces and X be a finite set. We will also use X todenote the Hilbert space with computational basis elementsindexed by the set X. Let c be a non-negative integer. Let Adenote a quantum register with Hilbert space H . For everyx ∈ Xc, let ρx be a quantum state in A. Consider the extendedquantum system

A′ := (H ⊗ C2) ⊕⊕

S :{},S⊆[c]

(H ⊗ C2) ⊗ L⊗|S |.

Also define the augmented classical system X′ := X ⊗ L.Below, x, l denote computational basis vectors of X[c],

L⊗[c]. Let p(·) be a probability distribution on the vectors x.Define the classical quantum state

ρX[c]A :=∑

xp(x)|x〉〈x|X[c] ⊗ ρA

x .

Let 11L⊗c

|L|cdenote the completely mixed state on c tensor copies

of L. View ρAx ⊗ (|0〉〈0|)C

2as a state in A′ under the natural

embedding viz. the embedding is into the first summand of A′

defined above. Similarly, view ρX[c]A ⊗ (|0〉〈0|)(C2) ⊗ 11L⊗c

|L|cas a

state in X′[c]A′ under the natural embedding.

Let 0 ≤ ε, δ ≤ 1. Let (S 1, S 2, S 3) be disjoint subsets of[c] such that S 1∪S 2∪S 3 = [c]. We allow S 1 or S 3 or both tobe empty, and denote the triple by (S 1, S 2, S 3) a [c]. ChooseL to have dimension |L| = 313 |H|4

24(1−ε)6 . Then, there is a state ρ′

and a POVM element Π′ in X′[c]A′ such that:

1. The state ρ′ and POVM element Π′ are classical onX⊗[c] ⊗L[c] and quantum on A′. More precisely, ρ′, Π′

can be expressed as

(ρ′)X′[c]A

= |L|−c∑x,l

p(x)|x〉〈x|X[c] ⊗ |l〉〈l|L[c] ⊗ (ρ′)A′x,l,δ,

(Π′)X′[c]A

=∑x,l

|x〉〈x|X[c] ⊗ |l〉〈l|L[c] ⊗ (Π′)A′x,l,δ,

where (ρ′)A′x,l,δ, (Π′)A′

x,l,δ are quantum states and POVMelements respectively for all computational basis vec-tors x ∈ X⊗[c], l ∈ L⊗[c];

2. ∥∥∥∥∥∥(ρ′)X′[c]A

− ρX[c]A ⊗ (|0〉〈0|)C2⊗

11L⊗c

|L|c

∥∥∥∥∥∥1≤ 2

c+12 +1δ;

3.

Tr [(Π′)X′[c]A

(ρ′)X′[c]A

] ≥ 1 − δ−222c+53cε − 2

c+12 +1δ;

Inner bounds via simultaneous decoding in quantum network information theory 5

4. Let S ⊆ [c]. Let xS , lS be computational basis vec-tors in X⊗S , L⊗S . In the following definition, let x′

S, l′

Srange over all computational basis vectors of X⊗([c]\S ),L⊗([c]\S ). Define a state in A′,

(ρ′)A′xS ,lS ,δ := |L|−|S |

∑x′

S,l′

S

p(x′S |xS )(ρ′)A′xS x′

S,lS l′

S,δ.

Analogously define

ρAxS

:=∑x′

S

p(x′S |xS )ρAxS x′

S.

Let (S 1, S 2, S 3) a [c]. Define

(ρ′)X′[c]A

(S 1,S 2,S 3)

:= |L|−c∑xS 1

p(xS 1 )|xS 1〉〈xS 1 |XS 1 ⊗ |lS 1〉〈lS 1 |

LS 1

∑xS 2

p(xS 2 |xS 1 )|xS 2〉〈xS 2 |XS 2

⊗ |lS 2〉〈lS 2 |LS 2

)⊗

∑xS 3

p(xS 3 |xS 1 )|xS 3〉〈xS 3 |XS 3

⊗ |lS 3〉〈lS 3 |LS 3 ⊗ (ρ′)A′

xS 1∪S 3 ,lS 1∪S 3 ,δ

),

ρX[c]A(S 1,S 2,S 3)

:=∑xS 1

p(xS 1 )|xS 1〉〈xS 1 |XS 1

∑xS 2

p(xS 2 |xS 1 )|xS 2〉〈xS 2 |XS 2

∑xS 3

p(xS 3 |xS 1 )|xS 3〉〈xS 3 |XS 3 ⊗ ρA

xS 1∪S 3

.Then,

Tr [(Π′)X′[c]A

(ρ′)X′[c]A

(S 1,S 2,S 3)] ≤ 2−IεH (XS 2 :AXS 3 |XS 1 )ρ ,

where IεH(XS 2 : AXS 3 |XS 1 )ρ := DεH(ρX[c]A‖ρ

X[c]A(S 1,S 2,S 3)).

Informally speaking, the above lemma guarantees the exis-tence of a single POVM element Π′ with robust propertiesthat serves as an ‘intersection’ of the individual POVM ele-ments achieving the hypothesis testing relative entropy quan-tities arising from the state ρX[c]A by considering all possiblecollections of subsets of [c].

We next state a more general classical quantum joint typi-cality lemma that guarantees the existence of a single POVMelement Π′ with robust properties that serves as a ‘union ofintersection’ of individual POVM elements.

Fact 5 (cq joint typ. lem., gen. case) Let H , L be Hilbertspaces and X be a finite set. We will also use X to denote

the Hilbert space with computational basis elements indexedby the set X. Let c be a non-negative integer. Let A denotea quantum register with Hilbert space H . For every x ∈ Xc,let ρx be a quantum state in A. Let t be a positive integer. Letxt denote a t-tuple of elements of Xc; we shall denote its ithelement by xt(i). Consider the extended quantum system Awhere A � A′ ⊗ C2 ⊗ Ct+1, and A′ is defined as

A′ := (H ⊗ C2) ⊕⊕

S :i∈S⊆[c] ·∪[k]

(H ⊗ C2) ⊗ L⊗|S |.

Also define the augmented classical system X := X ⊗ L.Below, x, l denote computational basis vectors of X[c],

L⊗[c]. Let p(·) denote a probability distribution on the vectorsx. Let p(1; ·), . . . , p(t; ·) denote probability distributions on xt

such that the marginal of p(i; xt) on the ith element is p(xt(i)).For i ∈ [t], define the classical quantum states

ρ(X[c])t A(i) :=∑

xt

p(i; xt)|xt〉〈xt |(X[c])t⊗ ρA

xt(i).

Let 11L⊗c

|L|cdenote the completely mixed state on c tensor copies

ofL. View ρAx ⊗(|0〉〈0|)C

2⊗(|0〉〈0|)C

2⊗(|0〉〈0|)C

t+1as a state in

A under the natural embedding viz. the embedding is into thefirst summand of A′ defined above tensored with C2 ⊗ Ct+1.

Similarly, view ρ(X[c])t A(i) ⊗ (|0〉〈0|)C2⊗ 11L

⊗ct

|L|ct ⊗ (|0〉〈0|)C2⊗

(|0〉〈0|)Ct+1

as a state in (X[c])⊗tA under the natural embed-ding.

Let 0 ≤ α, ε, δ ≤ 1. Choose L to have dimension |L| =313 |H|4

24(1−ε)6 . Then, there are states ρ′(1), . . . , ρ′(t) and a POVM

element Π in (X[c])⊗tA such that:

1. The states ρ′(1), . . . , ρ′(t) and POVM element Π areclassical on X⊗[ct] ⊗ L[ct] and quantum on A. Moreprecisely, ρ′(i), i ∈ [t], Π can be expressed as

(ρ′(i))(X[c])t A

= |L|−ct∑xt ,lt

p(i; xt)|xt〉〈xt |(X[c])⊗t⊗ |lt〉〈lt |(L[c])⊗t

⊗ (ρ′)A′xt(i),lt(i),δ ⊗ (|0〉〈0|)C

2⊗ (|0〉〈0|)C

t+1,

(Π)(X[c])t A

=∑xt ,lt|xt〉〈xt |(X[c])⊗t

⊗ |lt〉〈lt |(L[c])⊗t⊗ (Π)A

xt ,lt ,δ,

where (ρ′)A′x,l,δ are quantum states for all computational

basis vectors x ∈ X⊗[c], l ∈ L⊗[c] and (Π)Axt ,lt ,δ are

POVM elements for all computational basis vectorsxt ∈ X⊗[ct], lt ∈ L⊗[ct];

2. For all i ∈ [t],∥∥∥∥(ρ′(i))(X[c])t A

− (ρ(i))(X[c])t A ⊗ (|0〉〈0|)C2⊗ 11L

⊗ct

|L|ct

⊗(|0〉〈0|)C2⊗ (|0〉〈0|)C

t+1∥∥∥1 ≤ 2

c+12 +1δ;

6 Pranab Sen

Figure 1. Quantum broadcast channel without entanglement assistance.

3. For all i ∈ [t],

Tr [(Π)(X[c])t A(ρ′(i))(X[c])t A] ≥ 1−δ−222c+53cε−2

c+12 +1δ−α;

4. Let S ⊆ [c]. Let xS , lS be computational basis vec-tors in X⊗S , L⊗S . In the following definition, let x′

S, l′

Srange over all computational basis vectors of X⊗([c]\S ),L⊗([c]\S ). Define states in A′,

(ρ′)A′xS ,lS ,δ := |L|−|S |

∑x′

S,l′

S

p(x′S |xS )(ρ′)A′xS x′

S,lS l′

S,δ.

Analogously define

ρAxS

:=∑x′

S

p(x′S |xS )ρAxS x′

S.

For i ∈ [t], S ⊆ [c], let qi;S (·) be a probability distribu-tion on xt. Define

(ρ′)(X[c])t Ai;S

:= |L|−ct∑

xt

qi;S (xt)|xt〉〈xt |X⊗[ct]⊗ |lt〉〈lt |L

⊗[ct]

⊗ (ρ′)A′xt(i)S ,lt(i)S ,δ

,

ρ(X[c])t Ai;S

:=∑

xt

qi;S (xt)|xt〉〈xt |X⊗[ct]⊗ ρA

xt(i)S.

Then,

Tr [(Π)(X[c])t A(ρ′)(X[c])t Ai;S ]

≤1 − αα

t∑j=1

2−DεH (ρ( j)(X[c] )t A

‖ρ(X[c] )t Ai;S ).

4 Broadcast channel

We now prove a one-shot Marton inner bound with commonmessage for sending classical information through a quan-tum broadcast channel. Such a result was not known earlier

for a quantum broadcast channel even in the asymptotic iidsetting. The analogous inner bound in the one-shot classicalsetting was proved by Radhakrishnan, Sen and Warsi [19](see also Liu et al [23]). Radhakrishnan, Sen and Warsialso proved Marton’s inner bound, but without common mes-sage, in the one shot quantum setting. The version withcommon message subsumes the version without, as well asthe superposition coding technique for a broadcast channel[24, 25, 26]. This problem was also studied earlier by Hircheand Morgan [27] for a two user binary input classical quan-tum broadcast channel. Recently, Anshu, Jain and Warsi [28]proved nearly matching one-shot inner and outer bounds forthe quantum broadcast channel without common message.However, their bounds are not known to reduce to the stan-dard Marton bounds in the asymptotic iid limit.

In the problem of sending classical information with com-mon message through a quantum broadcast channel (q-BC),the sender Alice has three classical messages m0 ∈ [2R0 ],m1 ∈ [2R1 ], m2 ∈ [2R2 ], and she wants to send (m0,m1) toBob and (m0,m2) to Charlie. The parties have at their dis-posal a quantum channel C : X → Y1Y2 with input Hilbertspace X and output Hilbert spaces Y1, Y2. Alice encodes(m0,m1,m2) into a quantum state σX

m0,m1,m2∈ X and inputs it

to C. The channel C applies a superoperator to σm0,m1,m2 andoutputs a quantum state ρY1Y2

m0,m1,m2 := (CX→Y1Y2 (σXm0,m1,m2

))Y1Y2

jointly supported in the Hilbert space Y1 ⊗ Y2. Bob andCharlie apply their respective decoding superoperators inde-pendently on ρYZ

m0,m1,m2in order to produce their respective

guesses (m0, m1), ( ˆm0, ˆm2) of the messages m0, m1, m2. SeeFigure 1. Let 0 ≤ ε ≤ 1. Consider the uniform probabilitydistribution over the message sets. We want that

Pr[(m0, m1, ˆm0, ˆm2) , (m0,m1,m0,m2)] ≤ ε,

where the probability is over the choice of the messages andactions of the encoder, channel and decoders. If there existssuch encoding and decoding schemes for a particular channelC, we say there exists an (R0,R1,R2, ε)-quantum broadcastchannel code for sending classical information through C.

It is possible to extend the classical proof of the one-shot Marton’s inner bound with common message of Rad-hakrishnan, Sen and Warsi [19] to the quantum setting by

Inner bounds via simultaneous decoding in quantum network information theory 7

using Fact 4 to obtain the quantum analogues of intersectionoperations used to define the setsA13,A24 just before Equa-tion (42) of their paper. In this paper however, we give a dif-ferent proof following the style of Anshu, Jain and Warsi [18]which we believe to be more transparent and intuitive.

We now state our one-shot Marton’s inner bound withcommon message for transmitting classical information overa quantum broadcast channel.

Theorem 1 (One-shot Marton, common message) Let C bea quantum broadcast channel. LetU0,U1,U2 be three newsample spaces and (U0,U1,U2) be a jointly distributed ran-dom variable on the sample spaceU0 ×U1 ×U2. For everyelement (u0, u1, u2) ∈ U1 × U2, let σX

u0,u1,u2be a quantum

state in the input Hilbert space X of C. Consider the classi-cal quantum state

ρU0U1U2Y1Y2

:=∑

(u0,u1,u2)∈U0×U1×U2

pU0U1U2 (u0, u1, u2)

|u0, u1, u2〉〈u0, u1, u2|U0U1U2 ⊗ C(σX

u0,u1,u2)Y1Y2 .

Let R0, R1, R2, ε, be such that

R0 + R1 ≤ IεH(U0U1 : Y1) − 2 − log1ε

R0 + R2 ≤ IεH(U0U2 : Y2) − 2 − log1ε

R0 + R1 + R2 ≤ IεH(U0U2 : Y2) + IεH(U1 : Y1|U0)

− Iε∞(U1 : U2|U0) − 4 − 4 log1ε

R0 + R1 + R2 ≤ IεH(U0U1 : Y1) + IεH(U2 : Y2|U0)

− Iε∞(U1 : U2|U0) − 4 − 4 log1ε

2R0 + R1 + R2 ≤ IεH(U0U1 : Y1) + IεH(U0U2 : Y2)

− Iε∞(U1 : U2|U0) − 4 − 4 log1ε,

where the mutual information quantitites above are computedwith respect to the cq-state ρU0U1U2Y1Y2 . Then there existsan (R0,R1,R2, 27ε1/6)-quantum broadcast channel code forsending classical information through C.

Proof: We follow the structure of Marton’s common mes-sage inner bound proof as in Radhakrishnan et al [19] withthe difference that we use the one-shot mutual covering lemmaof Fact 2 instead. Let R0, R1, R2, r1, r2, ε, be such that

R0 + R1 + r1 ≤ IεH(U0U1 : Y1) − 2 − log1ε

R0 + R2 + r2 ≤ IεH(U0U2 : Y2) − 2 − log1ε

R1 + r1 ≤ IεH(U1 : Y1|U0) − 2 − log1ε

R2 + r2 ≤ IεH(U2 : Y2|U0) − 2 − log1ε

r1 + r2 = Iε∞(U1 : U2|U0) + 2 log1ε,

where the mutual information quantitites above are computedwith respect to the cq-state ρU0U1U2Y1Y2 . Suppose we showthat there is a (R0,R1,R2, 27ε1/6)-quantum broadcast channelcode for sending classical information through C. StandardFourier-Motzkin elimination can be used to get rid of r1 andr2 and obtain the inner bound in the statement of the theorem.

Codebook:The codebook C has 2R0 pages. Each page consists of atwo dimensional array of ‘symbols’ arranged in 2R1+r1 rowsand 2R2+r2 columns. We will index ‘entries’ of C by the4-tuple (m0,m1, k1,m2, k2) where mi ∈ 2Ri , k j ∈ 2r j . Thecodebook is generated randomly as follows. First sampleu0(1), . . . , u0(2R0 ) independently according to pU0 . We willassociate u0(m0) with the m0th page of C. Now, to generatethe contents of the m0th page, sample

u1(m0, 1), . . . , u1(m0, 2R1+r1 ), u2(m0, 1), . . . , u2(m0, 2R2+r2 )

independently according to pU1 |u0(m0), pU2 |u0(m0). The code-book entry C(m0,m1, k1,m2, k2) is the triple

(u0(m0), u1(m0,m1, k1), u2(m0,m2, k2),

where (mi, ki) can be thought of as an element in [2Ri+ri ]. For(m0,m1) ∈ [2R0 ] × [2R1 ], define the ‘row band’ C(m0,m1)of samples u1(m0, (m1 − 1)2r1 + 1), . . . , u1(m0,m12r1 ). Simi-larly, one can define the ‘column band’ C(m0,m2) for each(m0,m2) ∈ [2R0 ] × [2R2 ]. For a triple (m0,m1,m2), we callthe corresponding page, row and column bands together asthe ‘rectangle’. For each rectangle, we can now sample the‘indicator pair’ (k1, k2)(m0,m1,m2) ∈ [2r1 ] × [2r2 ] accordingto the random variable (K1,K2) conditioned on the contentsof the rectangle as described in the distribution P2 of Fact 2.The full description of the random codebookC consists of thepages, symbols and indicator pairs. Given the codebook C,consider its augmentation C′ obtained by additionally choos-ing independent and uniform samples l0, l1, l2 of computa-tional basis vectors of L to populate all the pages and therows and columns of C. We shall henceforth work with theaugmented codebook C′, which is revealed to Alice, Bob andCharlie.

Encoding:To send message triple (m0,m1,m2), Alice picks up the entryC(m0,m1, k1,m2, k2) where (k1, k2) is the indicator pair forthe rectangle (m0,m1,m2). She then inputs the quantum stateσX

u0(m0),u1(m0,m1,k1),u2(m0,m2,k2) into the channel C.

Decoding:Consider the marginal cq-state ρU0U1Y1 . Express it as

ρU0U1Y1 =∑u0,u1

p(u0, u1)|u0, u1〉〈u0, u1|U0U1 ⊗ ρY1

u0,u1.

Define the cq-states ρU0U1Y1({U0},{U1},{})

, ρU0U1Y1({},{U0,U1},{})

as in Claim 4of Fact 4. Fix 0 < δ < 1. Fact 4 tells us that there is anaugmentation of the classical systems U0, U1 to U′0 := U0 ⊗

L, U′1 := U1 ⊗ L an extension Y ′1 of the quantum systemY1 i.e. Y1 ⊗ C2 ≤ Y ′1, a cq-state (ρ′)U′0U′1Y ′1 and a cq-POVMelement (Π′)U′0U′1Y ′1 such that

8 Pranab Sen

1. (ρ′)U′0U′1Y ′1 = |L|−2 ∑u0,u1,l0,l1 p(u0, u1)|u0, u1〉〈u0, u1|

U0U1⊗

|l0, l1〉〈l0, l1|L⊗2⊗ (ρ′)Y ′1

u0,l0,u1,l1, for some quantum states

(ρ′)Y ′1u0,l0,u1,l1

;

2. For some POVM elements (Π′)Y ′1u0,l0,u1,l1,δ

,

(Π′)U′0U′1Y ′1

=∑

u0,u1,l0,l1

|u0, u1〉〈u0, u1|U0U1 ⊗ |l0, l1〉〈l0, l1|L

⊗2

⊗ (Π′)Y ′1u0,l0,u1,l1,δ

;

3.∥∥∥∥∥(ρ′)U′0U′1Y ′1 − ρU0U1Y1 ⊗ |0〉〈0|C

2⊗ 11L

⊗2

|L|2

∥∥∥∥∥1≤ 8δ;

4. Tr [(Π′)U′0U′1Y ′1 (ρ′)U′0U′1Y ′1 ] ≥ 1 − 28 · 3 · δ−2ε − 8δ;

5. Define (ρ′)U′0U′1Y ′1({U′0},{U

′1},{})

, (ρ′)U′0U′1Y ′1({},{U′0,U

′1},{})

analogous to the

states ρU0U1Y1({U0},{U1},{})

, ρU0U1Y1({},{U0,U1},{})

. Then,

Tr [(Π′)U′0U′1Y ′1 (ρ′)U′0U′1Y ′1({U′0},{U

′1},{})

] ≤ 2−IεH (U1:Y1 |U0)ρ ,

Tr [(Π′)U′0U′1Y ′1 (ρ′)U′0U′1Y ′1({},{U′0,U

′1},{})

] ≤ 2−IεH (U0U1:Y1)ρ .

For (m0,m1, k1) ∈ [2R0 ] × [2R1+r1 ], define the POVM ele-ment Λ

Y1m0,m1,k1

as follows: Attach an ancilla of |0〉〈0|C2

to reg-

ister Y1 and then apply POVM element ΛY ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1).

Here ΛY ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1) is a POVM element from the PGM

constructed, for the augmented codebook C′, from the set ofpositive operators

{(Π′)Y ′1(u0,l0)(m′0),(u1,l1)(m′0,m

′1,k′1),δ : m′0 ∈ 2R0 , (m′1, k

′1) ∈ [2R1+r1 ]},

which in turn is provided by Claim 2 above. Observe thatΛ

Y1m0,m1,k1

depends only on (u0, l0)(m′0), (u1, l1)(m′0,m′1, k′1), m′0 ∈

2R0 , (m′1, k′1) ∈ [2R1+r1 ] of C′. Similarly for (m0,m2, k2) ∈

[2R0 ] × [2R2+r2 ], we can define the POVM element ΛY2m0,m2,k2

.Bob applies his POVM to the contents of Y1 and outputs theresult (m0, m1, k1) as his guess for (m0,m1, k1). Similarly,Charlie outputs ( ˆm0, ˆm2,

ˆk2) as his guess for (m0,m2, k2). Boband Charlie thus attempt to do the tougher job of decodingtheir respective actual symbols inputted into the channel in-stead of just ‘decoding up to the band’.

Error probablity:Suppose Alice transmits (m0,m1,m2). We consider the ex-pected decoding error of Bob over the choice of a randomaugmented codebook C′. We first observe that by Fact 2,at the cost of an additive decoding error of 2ε, we can pre-tend that we have the distribution (P1)U0(U1)2r1 (U2)2r2 K1K2 in-stead of the actual distribution (P2)U0(U1)2r1 (U2)2r2 K1K2 insiderectangle (m1,m2) of page m0 of C. In other words, we canpretend that we first choose a uniformly random (k1, k2) ∈[2r1 ]× [2r2 ], put the cq-state ρU0U1U2Y1 between cell (k1, k2) ofrectangle (m1,m2) of page m0 and Bob’s output register Y1,

and independent copies of U1|U0, U2|U0 in the other rowsand columns of page m0. In other pages, we continue to haveindependent samples from the random variables U0, U1|U0,U2|U0. In all rectangles other than rectangle (m1,m2) of pagem0, we choose the indicator pairs as described above duringthe construction of the codebook C. We call the modifiedconstruction of the codebook as Cm0,m1,m2,k1,k2 and its aug-mentation as (C′)m0,m1,m2,k1,k2 . This explains the inequality inStep (a) below. Next by Fact 4, at further cost of an addi-tive decoding error of 4δ we shall pretend that we have thecq-state (ρ′)U′0U′1Y ′1 instead of ρU0U1Y1 between cell (k1, k2) ofrectangle (m1,m2) of page m0 and register Y ′1. Combiningthis with Fact 3 explains the inequality in Step (b) below.The inequality in Step (c) below follows by an applicationof Fact 4. We thus finally manage to bound Bob’s expecteddecoding error.

For a stateσXu0(m0),u1(m0,m1,k1),u2(m0,m2,k2) inputted to the chan-

nel C, let ρY1u0(m0),u1(m0,m1,k1),u2(m0,m2,k2) denote its output state at

Bob’s end. We can bound Bob’s expected decoding error asfollows:

EC′

[Pr[Bob’s error]]

= EC′

[Tr [(11Y1 − ΛY1m0,m1,k1

)ρY1u0(m0),u1(m0,m1,k1),u2(m0,m2,k2)]]

a≤ 2ε +

2−r1−r2∑k1,k2

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[

Tr [(11Y1 − ΛY1m0,m1,k1

)

ρY1u0(m0),u1(m0,m1,k1),u2(m0,m2,k2)]]

= 2ε +

2−r1−r2∑k1,k2

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[

Tr [(11Y1 − ΛY1m0,m1,k1

)

ρY1u0(m0),u1(m0,m1,k1)]]

= 2ε +

2−r1−r2∑k1,k2

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[

Tr [(11Y ′1 − ΛY ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1))

(ρY1u0(m0),u1(m0,m1,k1) ⊗ |0〉〈0|

C2)]]

≤ 2ε +

2−r1−r2∑k1,k2

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[

Tr [(11Y ′1 − ΛY ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1))

(ρ′)Y ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1)]

+ 2−r1−r2∑k1,k2

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[

12

∥∥∥∥(ρ′)Y ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1)

− ρY1u0(m0),u1(m0,m1,k1) ⊗ |0〉〈0|

C2∥∥∥∥

1

= 2ε +

Inner bounds via simultaneous decoding in quantum network information theory 9

Figure 2. Quantum broadcast channel with entanglement assistance.

2−r1−r2∑k1,k2

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[

Tr [(11Y ′1 − ΛY ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1))

(ρ′)Y ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1)]

+12

∥∥∥∥∥∥∥(ρ′)U′0U′1Y ′1 − ρU0U1Y1 ⊗ |0〉〈0|C2⊗

11L⊗2

|L|2

∥∥∥∥∥∥∥1

b≤ 2ε + 4δ

+ 2−r1−r2 · 2∑k1,k2

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[

Tr [(11Y ′1 − (Π′)Y ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1))

(ρ′)Y ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1)]

+ 2−r1−r2 · 4∑k1,k2

∑(m′1,k

′1):(m′1,k

′1),(m1,k1)

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[Tr [(Π′)Y ′1(u0,l0)(m0),(u′1,l

′1)(m0,m′1,k

′1)

(ρ′)Y ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1)]]

+ 2−r1−r2 · 4∑k1,k2

∑m′0,m

′1,k′1:m′0,m0

E(C′)m0 ,m1 ,m2 ,k1 ,k2

[Tr [(Π′)Y ′1(u′0,l

′0)(m′0),(u′1,l

′1)(m′0,m

′1,k′1)

(ρ′)Y ′1(u0,l0)(m0),(u1,l1)(m0,m1,k1)]]

= 2ε + 4δ+ 2|L|−2

∑u0,u1,l0,l1

p(u0, u1) Tr [(11Y ′1 − (Π′)Y ′1u0,u1,l0,l1

)

(ρ′)Y ′1u0,u1,l0,l1

]

+ 4 · (2R1+r1 − 1)|L|−3

∑u0,l0,u1,l1,u′1,l

′1

p(u0)p(u1|u0)p(u′1|u0)

Tr [(Π′)Y ′1u0,u′1,l0,l

′1(ρ′)Y ′1

u0,u1,l0,l1]

+ 4 · (2R0 − 1)2R1+r1 |L|−4∑u0,l0,u′0,l

′0,u1,l1,u′1,l

′1

p(u0, u1)p(u′0, u′1)

Tr [(Π′)Y ′1u′0,u

′1,l′0,l′1(ρ′)Y ′1

u0,u1,l0,l1]

= 2ε + 4δ + 2 Tr [(11U′0U′1Y ′1 − (Π′)U′0U′1Y ′1 )(ρ′)U′0U′1Y ′1 ]

+ 4 · (2R1+r1 − 1) Tr [(Π′)U′0U′1Y ′1 (ρ′)U′0U′1Y ′1({U′0},{U

′1},{})

]

+ 4 · (2R0 − 1)2R1+r1 Tr [(Π′)U′0U′1Y ′1 (ρ′)U′0U′1Y ′1({},{U′0,U

′1},{})

]c≤ 2ε + 4δ + 29 · 3 · δ−2ε + 16δ

+ 2R1+r1+2−IεH (U1:Y1 |U0) + 2R0+R1+r1+2−IεH (U0U1:Y1).

Setting δ := ε1/3, we get that E C′ [Pr[Bob’s error]] ≤ 211ε1/3.Similarly, E C′ [Pr[Charlie’s error]] ≤ 211ε1/3. Thus, there

is an augmented codebook C′ such that sum of Bob’s andCharlie’s average decoding errors is at most 212ε1/3. The av-erage probability that at least one of Bob or Charlie err for C′

is thus seen to be at most 27ε1/6 using Fact 1. This finishesthe proof of one-shot Marton’s inner bound with commonmessage. �

A similar proof as above combined with position basedcoding technique of Anshu, Jain and Warsi [18] can be usedto obtain a one-shot Marton’s inner bound with common mes-sage for sending classical information through an entangle-ment assisted broadcast channel (see Figure 2). Earlier, An-shu, Jain and Warsi [18] had shown the achievability of aone-shot Marton’s bound without common message.

Theorem 2 (Ent. assist. one-shot Marton, com. msg.) LetC : X → Y1Y2 be a quantum broadcast channel. LetU0,U1,

10 Pranab Sen

U2 be three new Hilbert spaces and ψU0U1U2X be a quantumstate which is classical on U0. Consider the classical quan-tum state

ρU0U1U2Y1Y2

:=∑u0

p(u0)|u0〉〈u0|U0 ⊗

((CX→Y1Y2 ⊗ IU1U2 )(ψU1U2Xu0

))U1U2Y1Y2 .

Let R0, R1, R2, ε be such that

R0 + R1 ≤ IεH(U0U1 : Y1) − 2 − log1ε

R0 + R2 ≤ IεH(U0U2 : Y2) − 2 − log1ε

R0 + R1 + R2 ≤ IεH(U0U2 : Y2) + IεH(U1 : Y1|U0)

− Iε,ε2

∞ (U1 : U2|U0) − 4 − 4 log1ε

R0 + R1 + R2 ≤ IεH(U0U1 : Y1) + IεH(U2 : Y2|U0)

− Iε,ε2

∞ (U1 : U2|U0) − 4 − 4 log1ε

2R0 + R1 + R2 ≤ IεH(U0U1 : Y1) + IεH(U0U2 : Y2)

− Iε,ε2

∞ (U1 : U2|U0) − 4 − 4 log1ε,

where the mutual information quantitites above are computedwith respect to the cq-state ρU0U1U2Y1Y2 . Then there existsan (R0,R1,R2, 27ε1/10)-quantum broadcast channel code forsending classical information through C with entanglementassistance.

Proof: Let R0, R1, R2, r1, r2, ε be such that

R0 + R1 + r1 ≤ IεH(U0U1 : Y1) − 2 − log1ε

R0 + R2 + r2 ≤ IεH(U0U2 : Y2) − 2 − log1ε

R1 + r1 ≤ IεH(U1 : Y1|U0) − 2 − log1ε

R2 + r2 ≤ IεH(U2 : Y2|U0) − 2 − log1ε

r1 + r2 = Iε,ε2

∞ (U1 : U2|U0) + 2 log1ε,

where the mutual information quantitites above are computedwith respect to the cq-state ρU0U1U2Y1Y2 . Suppose we showthat there is a (R0,R1,R2, 27ε1/10)-quantum broadcast chan-nel code for sending classical information through C. Stan-dard Fourier-Motzkin elimination can be used to get rid ofr1 and r2 and obtain the inner bound in the statement of thetheorem.

Codebook:The codebook C is now classical-quantum. It has 2R0 pagesand is generated randomly as follows. First sample

u0(1), . . . , u0(2R0 )

independently according to ψU0 . We will associate u0(m0)with the m0th page of C. Now, to generate the contents of the

m0th page, take independent copies

ψU1(m0,1)U′1(m0,1)|m0, . . . , ψU1(m0,2R1+r1 )U′1(m0,2R1+r1 )|m0,

ψU2(m0,1)U′2(m0,1)|m0, . . . , ψU2(m0,2R2+r2 )U′2(m0,2R2+r2 )|m0,

of the states ψU1U′1 |m0, ψU2U′2 |m0, where ψU1U′1 |m0 is a purifi-cation of ψU1 |m0, the marginal state on U1 obtained by con-ditioning the register U0 in ψU0U1 to take the value m0, andψU2U′2 |m0 is defined similarly. The registers

U′1(m0, 1), . . . ,U′1(m0, 2R1+r1 )

are with Bob,

U′2(m0, 1), . . . ,U′2(m0, 2R2+r2 )

with Charlie, and

U1(m0, 1), . . . ,U1(m0, 2R1+r1 ),U2(m0, 1), . . . ,U2(m0, 2R2+r2 )

with Alice. The states

ψU1(m0,1)U′1(m0,1)|m0, . . . , ψU1(m0,2R1+r1 )U′1(m0,2R1+r1 )|m0

form the prior entanglement between Alice and Bob, and thestates

ψU2(m0,1)U′2(m0,1)|m0, . . . , ψU2(m0,2R2+r2 )U′2(m0,2R2+r2 )|m0

form the prior entanglement between Alice and Charlie. For(m0,m1) ∈ [2R0 ] × [2R1 ], define the ‘row band’ C(m0,m1) tobe the states

ψU1(m0,(m1−1)2r1 +1)U′1(m0,(m1−1)2r1 +1)|m0,. . . , ψU1(m0,m12r1 )U′1(m0,m12r1 )|m0

page m0. Similarly, one can define the ‘column band’C(m0,m2)for each (m0,m2) ∈ [2R0 ]×[2R2 ]. For a triple (m0,m1,m2), wecall the corresponding page, row and column bands togetheras the ‘rectangle’.

For each rectangle, we can now sample the ‘indicatorpair’ (k1, k2)(m0,m1,m2) ∈ [2r1 ] × [2r2 ] according to the ran-dom variable (K1,K2) arising from an application of the bi-partite convex split lemma of [18] used with underlying stateψU1U2X |m0. The sampling process creates as side effect aquantum register that we call a ‘candidate channel input reg-ister’ X(m0,m1, k1,m2, k2). The resulting state on the regis-ters

X(m0,m1, k1,m2, k2)U1(m0, (m1 − 1)2r1 + 1)U′1(m0, (m1 − 1)2r1 + 1)

U2(m0, (m2 − 1)2r2 + 1)U′2(m0, (m2 − 1)2r2 + 1)

is (8ε)-close to a purification ψU1U′1U2U′2X |m0 of ψU1U2X |m0.For more details, see [18]. The full description of the ran-dom codebook C consists of the pages, prior entanglement,indicator pairs and candidate channel input registers. Giventhe codebook C, consider its augmentation C′ obtained byadditionally choosing independent and uniform samples l0,l1, l2 of computational basis vectors of L to populate all the

Inner bounds via simultaneous decoding in quantum network information theory 11

pages and the rows and columns of C. We shall henceforthwork with the augmented codebook C′, which is revealed toAlice, Bob and Charlie.

Encoding:To send message triple (m0,m1,m2), Alice picks up the in-dicator pair (k1, k2) for the rectangle (m0,m1,m2). She theninputs the register X(m0,m1, k1,m2, k2) into the channel C.

Decoding:Consider the marginal cq-state ρU0U1Y1 . Express it as

ρU0U1Y1 =∑u0

p(u0)|u0〉〈u0|U0 ⊗ ρU1Y1

u0.

Define the cq-states

ρU0U1Y1[{U0},({U1},{Y1})]

:=∑u0

p(u0)|u0〉〈u0|U0 ⊗ ρU1

u0⊗ ρY1

u0,

ρU0U1Y1[{},({U0,U1},{Y1})]

:=

∑u0

p(u0)|u0〉〈u0|U0 ⊗ ρU1

u0

⊗ ρY1 .

Fix 0 < δ < 1. The full version of the intersection case ofthe classical quantum joint typicality lemma, viz. Lemma 1from [1], tells us that there is an augmentation of the classicalsystem U0 to U′0 := U0⊗L, augmentations U′1 := U1⊗C2⊗L,Y ′1 := Y1 ⊗C2 ⊗L of the quantum systems U1, Y1, a cq-state(ρ′)U′0U′1Y ′1 and a cq-POVM element (Π′)U′0U′1Y ′1 such that

1.

(ρ′)U′0U′1Y ′1

= |L|−3∑

u0,l0,l1,l1

p(u0)|u0〉〈u0|U0 ⊗ |l0, l1, l1〉〈l0, l1, l1|L

⊗3

⊗ (ρ′)U′1Y ′1u0,l0,l1,l1

,

for some quantum states (ρ′)U′1Y ′1u0,l0,l1,l1

;

2. For some POVM elements (Π′)Y ′1u0,l0,l1,l1,δ

,

(Π′)U′0U′1Y ′1

=∑

u0,l0,l1,l1

|u0〉〈u0|U0U1 ⊗ |l0, l1, l1〉〈l0, l1, l1|L

⊗3

⊗ (Π′)Y ′1u0,l0,l1,l1,δ

;

3.∥∥∥∥∥(ρ′)U′0U′1Y ′1 − ρU0U1Y1 ⊗ |0〉〈0|C

2⊗ 11L

⊗3

|L|3

∥∥∥∥∥1≤ 8δ;

4. Tr [(Π′)U′0U′1Y ′1 (ρ′)U′0U′1Y ′1 ] ≥ 1 − 28 · 3 · δ−4ε − 8δ;

5. Define (ρ′)U′0U′1Y ′1[{U′0},({U

′1},{Y

′1})]

, (ρ′)U′0U′1Y ′1[{},({U′0,U

′1},{Y

′1})]

analogous to

the states ρU0U1Y1[{U0},({U1},{Y1})]

, ρU0U1Y1[{},({U0,U1},{Y1})]

. Then,

Tr [(Π′)U′0U′1Y ′1 (ρ′)U′0U′1Y ′1[{U′0},({U

′1},{Y

′1})]

] ≤ 2−IεH (U1:Y1 |U0)ρ ,

Tr [(Π′)U′0U′1Y ′1 (ρ′)U′0U′1Y ′1[{},({U′0,U

′1},{Y

′1})]

] ≤ 2−IεH (U0U1:Y1)ρ .

For (m0,m1, k1) ∈ [2R0 ] × [2R1+r1 ], define the POVM ele-ment Λ

Y1m0,m1,k1

according to the position based decoding strat-egy of [18] using the positive operators

{(Π′)Y ′1(u0,l0)(m′0),(l1,l1)(m′0,m

′1,k′1),δ

: m′0 ∈ 2R0 , (m′1, k′1) ∈ [2R1+r1 ]},

which in turn is provided by Claim 2 above. Observe thatΛ

Y1m0,m1,k1

depends only on (u0, l0)(m′0), (l1, l1)(m′0,m′1, k′1), m′0 ∈

2R0 , (m′1, k′1) ∈ [2R1+r1 ] of C′. Similarly for (m0,m2, k2) ∈

[2R0 ] × [2R2+r2 ], we can define the POVM element ΛY2m0,m2,k2

.Bob applies his POVM to the contents of Y1 and outputs theresult (m0, m1, k1) as his guess for (m0,m1, k1). Similarly,Charlie outputs ( ˆm0, ˆm2,

ˆk2) as his guess for (m0,m2, k2). Boband Charlie thus attempt to do the tougher job of decodingtheir respective actual symbols inputted into the channel in-stead of just ‘decoding up to the band’.

Error probablity:The error probability calculation is very similar to that in theproof of Theorem 1 above. This is because the error anal-ysis in the bipartite convex split lemma and position baseddecoding of [18] is very similar to the error analysis in ourmutual covering lemma (Fact 2) and in pretty good measure-ment based decoding.

Setting δ := ε1/5, we get that E C′ [Pr[Bob’s error]] ≤211ε1/5.

Similarly, E C′ [Pr[Charlie’s error]] ≤ 211ε1/5. Thus, thereis an augmented codebook C′ such that sum of Bob’s andCharlie’s average decoding errors is at most 212ε1/5. The av-erage probability that at least one of Bob or Charlie err for C′

is thus seen to be at most 27ε1/10 using Fact 1. This finishesthe proof of the entanglement assisted one-shot Marton’s in-ner bound with common message. �

Remark:The above theorem is unsatisfactory as the state ψU0U1U2X

used therein is classical on U0. This is because the innerbound expression in the theorem contains one-shot mutualinformation terms that condition on U0. No proper defini-tion of these terms is known when U0 is quantum. This de-ficiency is further reflected in the statements of the classical-quantum joint typicality lemmas in Facts 4 and 5 as well asin their full versions in [1], all of which can only conditionon classical registers. On a different vein, observe that theregister U0 captures the common message in the protocol. Itis unclear how to define a common message for a broadcastchannel in the case of transmission of quantum information,whereas the personal messages have straightforward quan-tum analogues. This may also be another reason why we areunable to make U0 quantum in the statement of the theorem.Making ψU0U1U2X fully quantum thus remains an open prob-lem.

5 Interference channel

We now prove one-shot inner bounds for sending classicalinformation through a quantum interference channel (q-IC).

12 Pranab Sen

Figure 3. Quantum interference channel without entanglement assistance.

In this problem, there are two senders A1, A2 and their cor-responding receivers B1, B2. Sender A1 would like to senda classical message m1 ∈ [2R1 ] to B1. Similarly, A2 wouldlike to send m2 ∈ [2R2 ] to B2. The parties have at theirdisposal a quantum channel C : X1X2 → Y1Y2 with inputHilbert spaces X1, X2 and output Hilbert spaces Y1, Y2.Sender A1 encodes m1 into a quantum state σX1

m0 ∈ X1 andinputs it to C. Similarly, A2 encodes m2 into a quantum stateσX2

m2 ∈ X2 and inputs it to C. The channel outputs a quantumstate ρY1Y2

m1,m2 := (CX1X2→Y1Y2 (σX1m1 ⊗ σ

X2m2 ))Y1Y2 jointly supported

in the Hilbert spaceY1⊗Y2. Receivers B1, B2 apply their re-spective decoding superoperators independently on ρY1Y2

m1,m2 inorder to produce their respective guesses m1, m2 of the mes-sages m1, m2. See Figure 3. Let 0 ≤ ε ≤ 1. Consider theuniform probability distribution over the message sets. Wewant that Pr[(m1, m2) , (m1,m2)] ≤ ε, where the probabilityis over the choice of the messages and actions of the encoder,channel and decoders. If there exist such encoding and de-coding schemes for a particular channel C, we say that thereexists an (R1,R2, ε)-quantum interference channel code forsending classical information through C.

We now state and prove our one-shot Chong-Motani-Garg-El Gamal style inner bound for sending classical informationthrough an unassisted quantum interference channel. Ourinner bound reduces to the standard Chong-Motani-Garg-ElGamal inner bound for the asymtotic iid setting, which is alsoknown to be equivalent to the famous Han-Kobayashi innerbound [11]. However, in the one-shot setting it is unclear ifthe two inner bounds are the same.

Theorem 3 (One-shot Chong-Motani-Garg-El Gamal) LetC : X′1X′2 → Y1Y2 be a quantum interference channel. Let Q,U1, X1, U2, X2 be four new sample spaces. Let the 4-tuple(Q,U1, X1,U2, X2) be a jointly distributed random variablewith probability mass function p(q)p(u1, x1|q)p(u2, x2|q). Forevery element x1 ∈ X1, x2 ∈ X2, let σX′1

x1 , σX′2x2 be quantum

states in the input Hilbert spaces X′1, X′2 of C. Consider theclassical quantum state

ρQU1X1U2X2Y1Y2

:=∑

q,u1,x1,u2,x2

p(q)p(u1, x1|q)p(u2, x2|q)

|q, u1, x1, u2, x2〉〈q, u1, x1, u2, x2|QU1X1U2X2

⊗ (C(σX′1x1 ⊗ σ

X′2x2 ))Y1Y2 .

Let R1, R2, ε, be such that

R1 ≤ IεH(X1 : Y1|U2Q) − 2 − log1ε

R1 ≤ IεH(X1 : Y1|U1U2Q) + IεH(X2U1 : Y2|U2Q)

− 2 − log1ε

R2 ≤ IεH(X2 : Y2|U1Q) − 2 − log1ε

R2 ≤ IεH(X2 : Y2|U1U2Q) + IεH(X1U2 : Y1|U1Q)

− 2 − log1ε

R1 + R2 ≤ IεH(X1U2 : Y1|Q) + IεH(X2 : Y2|U1U2Q)

− 2 − log1ε

R1 + R2 ≤ IεH(X2U1 : Y2|Q) + IεH(X1 : Y1|U1U2Q)

− 2 − log1ε

R1 + R2 ≤ IεH(X1U2 : Y1|U1Q) + IεH(X2U1 : Y2|U2Q)

− 2 − log1ε

2R1 + R2 ≤ IεH(X1U2 : Y1|Q) + IεH(X1 : Y1|U1U2Q)

+ IεH(X2U1 : Y2|U2Q) − 2 − log1ε

R1 + 2R2 ≤ IεH(X2U1 : Y2|Q) + IεH(X2 : Y2|U1U2Q)

+ IεH(X1U2 : Y1|U1Q) − 2 − log1ε,

where the mutual information quantitites above are computedwith respect to the cq-state ρQU1X1U2X2Y1Y2 . Then there existsan (R1,R2, 2214

ε1/6)-quantum interference channel code forsending classical information through C.

Proof: We follow the proof outline as given in El Gamal-

Inner bounds via simultaneous decoding in quantum network information theory 13

Kim’s book [2]. We use ‘rate splitting’ to divide A1’s mes-sage m1 ∈ [2R1 ] into a ‘public part’ m′1 ∈ [2R′1 ] and a ‘per-sonal part’ m′′1 ∈ [2R1−R′1 ]. Similarly, we divide A2’s messagem2 ∈ [2R2 ] into a ‘public part’ m′2 ∈ [2R′2 ] and a ‘personalpart’ m′′2 ∈ [2R2−R′2 ]. The public messages must be recoveredby both receivers whereas the personal messages need onlyto be recovered by the intended receiver. The messages aresent by a one-shot version of superposition coding wherebythe ‘cloud centres’ u1, u2 carry the public messages m′1, m′2and the ‘satellite symbols’ x1, x2, which will be decoded af-ter first recovering u1, u2, carry the personal messages m′′1 ,m′′2 .

We now show that a rate quadruple (R′1,R1 − R′1,R′2,R2 −

R′2) is achievable if it satisfies the following inequalities.

R1 − R′1 ≤ IεH(X1 : Y1|U1U2Q) − 2 − log1ε

R1 ≤ IεH(X1 : Y1|U2Q) − 2 − log1ε

R1 − R′1 + R′2 ≤ IεH(X1U2 : Y1|U1Q) − 2 − log1ε

R1 + R′2 ≤ IεH(X1U2 : Y1|Q) − 2 − log1ε

R2 − R′2 ≤ IεH(X2 : Y2|U1U2Q) − 2 − log1ε

R2 ≤ IεH(X2 : Y2|U1Q) − 2 − log1ε

R2 − R′2 + R′1 ≤ IεH(X2U1 : Y2|U2Q) − 2 − log1ε

R2 + R′1 ≤ IεH(X2U1 : Y2|Q) − 2 − log1ε

where the mutual information quantitites above are computedwith respect to the cq-state ρQU1X1U2X2Y1Y2 . Standard Fourier-Motzkin elimination now gives us the rate region in the state-ment of the theorem. Note that in the one-shot case it is notclear if the second upper bounds on R1 and R2, in the rate re-gion described in the theorem statement, can be eliminated,unlike the asymptotic iid case. This is because their elimi-nation in the asymptotic iid case relies on the chain rule forShannon mutual information, which is not known to hold forthe hypothesis testing mutual information used in the one-shot setting.

Codebook:First generate a sample q from the distribution p(q). For eachpublic message m′1 ∈ [2R′1 ] independently generate a sam-ple u1(m′1) from the distribution p(u1|q). Similarly, for eachpublic message m′2 ∈ [2R′2 ] independently generate a sam-ple u2(m′2) from the distribution p(u2|q). Now for each pub-lic message m′1, independently generate samples x1(m′1,m

′′1 )

from the distribution p(x1|u1q) for all personal messages m′′1 ∈[2R1−R′1 ]. Similarly for each public message m′2, indepen-dently generate samples x2(m′2,m

′′2 ) from the probability dis-

tribution p(x2|u2q) for all personal messages m′′2 ∈ [2R2−R′2 ].These samples together consititute the random codebook C.Given the codebookC, consider its augmentationC′ obtained

by additionally choosing independent and uniform samplesl0, l′1, l′′1 , l′2, l′′2 of computational basis vectors of L to popu-late all the entries of C′. We shall henceforth work with theaugmented codebook C′, which is revealed to A1, A2, B1, B2.

Encoding:To send message m1 = (m′1,m

′′1 ), A1 picks up the symbol

x1(m′1,m′′1 ) from the codebookC and inputs the stateσX′1

x1(m′1,m′′1 )

into the channel C. Similarly, to send message m2 = (m′2,m′′2 ),

A2 picks up the symbol x2(m′2,m′′2 ) from the codebook C and

inputs the state σX′2x2(m′2,m

′′2 ) into the channel C.

Decoding:The receiver B1 decodes the tuple (m′′1 ,m

′1) using simultane-

ous non-unique decoding. To do this, he has to apply a ‘unionof intersection’ of POVM elements which in turn is providedby Fact 5. The ‘union’ is over all choices of m′2 ∈ [2R′2 ]. Inthe asymptotic iid setting it turns out that non-unique decod-ing is not required in order to get the Chong-Motani-Garg-El Gamal rate region. Sen [4] showed that we can furtherrequire B1 to recover m′2 and still obtain the same rate re-gion. However the argument in [4] fails in the one-shot set-ting since it relies on chain rule of Shannon mutual informa-tion which is not known to hold for the hypothesis testingmutual information. Chain rules for smooth one-shot mu-tual information quantities are typically inequalities and fre-quently involve two or more types of quantities in the sameexpression. Hence using them often leads to unsatisfactorybounds for channel coding problems. Therefore we use non-unique decoding in the one-shot setting as it possibly leadsto a larger inner bound.

Consider the marginal cq-state ρQU1X1U2Y1 . Express it as

ρQU1X1U2Y1

=∑

q,u1,x1,u2

p(q)p(u1, x1|q)p(u2|q)

|q, u1, x1, u2〉〈q, u1, x1, u2|QU1X1U2 ⊗ ρY1

q,u1,x1,u2,

where in fact ρY1q,u1,x1,u2 = ρY1

x1,u2 i.e. ρY1q,u1,x1,u2 is independent of

q and u1.Let t := 2R′2 . For m2 ∈ [t], define the cq-state

ρQU1X1(U2)tY1 (m2)

:=∑

q,u1,x1,ut2

p(q)p(u1, x1|q)p(ut2|q)

|q, u1, x1, ut2〉〈q, u1, x1, ut

2|QU1X1(U2)t

⊗ ρY1q,u1,x1,ut

2(m2).

These states will play the role of ρ′(1), . . . , ρ′(t) in Fact 5.Define the cq-states

ρQU1X1U2Y1({QU1U2},{X1},{})

, ρU0U1X1U2Y1({QU2},{U1X1},{})

, ρU0U1X1U2Y1({QU1},{U2X1},{})

, ρU0U1X1U2Y1({Q},{U2U1X1},{})

,

as in Claim 4 of Fact 4. We can now define the cq-state

ρQU1X1(U2)tY1({QU1U2},{X1},{})

(m2)

:=∑

q,u1,ut2

p(q)p(u1|q)p(ut2|q)|q, u1, ut

2〉〈q, u1, ut2|

QU1(U2)t

14 Pranab Sen

⊗ (∑

x1

p(x1|qu1)|x1〉〈x1|X1 ) ⊗ ρY1

q,u1,ut2(m2).

In other words, ρQU1X1(U2)tY1({QU1U2},{X1},{})

(m2) is the cq-state obtained by

‘naturally extending’ U2 to (U2)t and ‘embedding’ ρQU1X1U2Y1({QU1U2},{X1},{})

at ‘m2th position’. Similarly, we can define the quantum stateρQU1X1(U2)tY1

({QU2},{U1X1},{})(m2).

Fix 0 < α, δ < 1. Fact 5 tells us that there is an augmen-tation of the classical systems Q, U1, X1, U2 to Q := Q ⊗ L,U1 := U1⊗L, X1 := X1⊗L, U2 := U2⊗L, an extension Y1 ofthe quantum system Y1 i.e. Y1⊗C2⊗C2⊗Ct+1 ≤ Y1, cq-states(ρ′)QU1 X1(U2)t Y1 (m2) and a cq-POVM element (Π)QU1 X1(U2)t Y1

such that

1.

(ρ′)QU1 X1(U2)t Y1 (m2)= |L|−(t+3) ·∑

q,u1,x1,ut2,l

p(q)p(u1, x1|q)p(ut2|q)

|q, u1, x1, ut2〉〈q, u1, x1, ut

2|QU1X1(U2)t

⊗ |l〉〈l|L⊗(t+3)⊗ (ρ′)Y ′1

q,u1,x1,ut2(m2),lL⊗4

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1,

for some quantum states (ρ′)Y ′1q,u1,x1,u2,lL⊗4 ;

2.

(Π)QU1 X1(U2)t Y1

=∑

q,u1,x1,ut2,l

|q, u1, x1, ut2〉〈q, u1, x1, ut

2|QU1X1(U2)t

⊗ |l〉〈l|L⊗(t+3)⊗ (Π)Y1

q,u1,x1,ut2,l,

for some POVM elements (Π)Y1q,u1,x1,(u2)t ,l;

3. ∥∥∥∥(ρ′)QU1 X1(U2)t Y1 (m2)

− ρQU1X1(U2)tY1 (m2) ⊗ |0〉〈0|C2⊗ 11L

⊗(t+3)

|L|t+3

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1∥∥∥1

≤ 24δ;

4.Tr [(Π)QU1 X1(U2)t Y1 (ρ′)QU1 X1(U2)t Y1 (m2)]≥ 1 − 229

· 34 · δ−2ε − 24δ − α;

5. Define

(ρ′)QU1 X1(U2)t Y1

({QU1U2},{X1},{})(m2), (ρ′)QU1 X1(U2)t Y1

({QU2},{U1 X1},{})(m2)

analogously as the corresponding quantities

ρQU1X1(U2)tY1({QU1U2},{X1},{})

(m2), ρQU1X1(U2)tY1({QU2},{U1X1},{})

(m2)

defined above. Then,

Tr [(Π)QU1 X1(U2)t Y1 (ρ′)QU1 X1(U2)t Y1

({QU1U2},{X1},{})(m2)]

≤1 − αα

∑j,m2

2−DεH (ρQU1X1(U2)tY1 ( j)‖ρQU1X1(U2)tY1

({QU1U2 },{X1 },{})(m2))

+ 2−DεH (ρQU1X1(U2)tY1 (m2)‖ρQU1X1(U2)tY1

({QU1U2 },{X1 },{})(m2))

)≤

1 − αα

(2R′2 2−IεH (X1U2:Y1 |QU1) + 2−IεH (X1:Y1 |QU1U2)),

where the hypothesis mutual information quantities arecomputed with respect to the cq-state ρQU1X1U2X2Y1 . Thelast inequality follows because the POVM element op-timising the hypothesis testing mutual information quan-titiy IεH(X1U2 : Y1|QU1), when applied at the ‘ jth posi-tion’, j , m2, accepts ρQU1X1(U2)tY1 ( j) with probabilityat least 1−ε and accepts ρQU1X1(U2)tY1

({QU1U2},{X1},{})(m2) with prob-

ability at most 2−IεH (X1U2:Y1 |QU1). Similarly, the POVMelement optimising the hypothesis testing mutual in-formation quantitiy IεH(X1 : Y1|QU1U2), when appliedat the ‘m2th position’, accepts ρQU1X1(U2)tY1 (m2) withprobability at least 1−ε and accepts ρQU1X1(U2)tY1

({QU1U2},{X1},{})(m2)

with probability at most 2−IεH (X1:Y1 |QU1U2). Arguing alongthe same lines, we get

Tr [(Π)QU1 X1(U2)t Y1 (ρ′)QU1 X1(U2)t Y1

({QU2},{U1 X1},{})(m2)]

≤1 − αα

(2R′2 2−IεH (X1U1U2:Y1 |Q) + 2−IεH (U1X1:Y1 |QU2)).

For (m′′1 ,m′1) ∈ [2R1−R′1 ]×[2R′1 ], define the POVM element

ΛY1m′′1 ,m

′1

as follows: Attach an ancilla of |0〉〈0|C2⊗ |0〉〈0|C

2⊗

|0〉〈0|Ct+1

to register Y1 and then apply the POVM elementΛ

Y1(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ). Here Λ

Y1(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ). is a POVM

element from the PGM constructed, for the augmented code-book C′, from the set of positive operators{

(Π)Y1

(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m′′1 ),{(u2,l′2)(m′2):m′2∈[2

R′2 ]},δ:

(m′1, m′′1 ) ∈ [2R1−R′1 ] × [2R′1 ]

},

which in turn is provided by Fact 5. Observe that ΛY1m′1,m

′′1

only depends on the entries q, (u1, l′1)(m′1), (x1, l′′1 )(m′1, m′′1 ),

(u2, l′2)(m′2), m′1 ∈ [2R′1 ], m′′1 ∈ [2R1−R′1 ], m′2 ∈ [2R′2 ] of C′.Similarly for (m′′2 ,m

′2) ∈ [2R2−R′2 ] × [2R′2 ], we can define the

POVM element ΛY2m′2,m

′′2. Receiver B1 applies his POVM to

the contents of Y1 and outputs the result m1 := (m′1, m′′1 ) as

his guess for m1 = (m′1,m′′1 ). Similarly, receiver B2 applies

his POVM to the contents of Y2 and outputs the result m2 :=(m′2, m

′′2 ) as his guess for m2 = (m′2,m

′′2 ).

Error probability:Suppose the senders A1, A2 transmit (m1,m2). For a stateσ

X′1x1(m′1,m

′′1 ) ⊗ σ

X′2x2(m′2,m

′′2 ) inputted into the channel C, denoted

Inner bounds via simultaneous decoding in quantum network information theory 15

its output state at B1 by ρY1x1(m′1,m

′′1 ),x2(m′2,m

′′2 ). We bound the ex-

pected decoding error of B1 over the choice of a random aug-mented codebook C′ as follows:

EC′

[Pr[B1’s error]]

= EC′

[Tr [(11Y1 − ΛY1m′1,m

′′1)ρY1

x1(m′1,m′′1 ),x2(m′2,m

′′2 )]]

= EC′

[Tr [(11Y1 − ΛY1m′1,m

′′1)ρY1

q,u1(m′1),x1(m′1,m′′1 ),u2(m′2),x2(m′2,m

′′2 )]]

= EC′

[Tr [(11Y1 − ΛY1m′1,m

′′1)ρY1

q,u1(m′1),x1(m′1,m′′1 ),u2(m′2)]]

= EC′

[Tr [(11Y1 − ΛY1(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ))

(ρY1q,u1(m′1),x1(m′1,m

′′1 ),u2(m′2) ⊗ |0〉〈0|

C2

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1)]]

≤ EC′

[Tr [(11Y1 − ΛY1(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ))

((ρ′)Y ′1(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ),(u2,l′2)(m′2)

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1)]]

+ EC′

[12

∥∥∥∥(ρ′)Y ′1(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ),(u2,l′2)(m′2)

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1

− ρY1q,u1(m′1),x1(m′1,m

′′1 ),u2(m′2) ⊗ |0〉〈0|

C2

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1∥∥∥∥

1

]a≤ 2 E

C′[Tr [(11Y1 −

(Π)Y1

(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m′′1 ),{(u2,l′2)(m2):m2∈[2

R′2 ]},δ)

((ρ′)Y ′1(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ),(u2,l′2)(m′2)

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1)]]

+ 4∑

m′′1 ,m′′1

EC′

[

Tr [(Π)Y1

(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m′′1 ),{(u2,l′2)(m2):m2∈[2

R′2 ]},δ

((ρ′)Y ′1(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ),(u2,l′2)(m′2)

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1)]]

+ 4∑

m′1,m′1,m′′2

EC′

[Tr [(Π)Y1

(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m′′1 ),{(u2,l′2)(m2):m2∈[2

R′2 ]},δ

((ρ′)Y ′1(q,l0),(u1,l′1)(m′1),(x1,l′′1 )(m′1,m

′′1 ),(u2,l′2)(m′2)

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1)]]

+ |L|−4 ·∑q,u1,x1,u2,l0,l′1,l

′′1 ,l′2

p(q)p(u1, x1|q)p(u2|q)

12

∥∥∥∥(ρ′)Y ′1(q,l0),(u1,l′1),(x1,l′′1 ),(u2,l′2) ⊗ |0〉〈0|

C2⊗ |0〉〈0|C

t+1

− ρY1q,u1,x1,u2

⊗ |0〉〈0|C2⊗ |0〉〈0|C

2⊗ |0〉〈0|C

t+1∥∥∥∥

1

= 2|L|−(t+3) ·

∑q,u1,x1,ut

2,l0,l′1,l′′1 ,(l

′2)t

p(q)p(u1, x1|q)p(ut2|q)

Tr [(11Y1 − (Π)Y1(q,l0),(u1,l′1),(x1,l′′1 ),(ut

2,(l′2)t),δ)

((ρ′)Y ′1(q,l0),(u1,l′1),(x1,l′′1 ),(ut

2,(l′2)t)(m′2)

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1)]

+ 4|L|−(t+4) ·∑m′′1 ,m′′1

∑q,u1,x1,x1,ut

2,l0,l′1,l′′1 ,l′′1 ,(l

′2)t

p(q)p(u1|q)p(x1|u1q)p(x1|u1q)p(ut2|q)

Tr [(Π)Y1

(q,l0),(u1,l′1),(x1,l′′1 ),ut2,(l′2)t ,δ

((ρ′)Y ′1(q,l0),(u1,l′1),(x1,l′′1 ),(ut

2,(l′2)t)(m′2)

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1)]

+ 4|L|−(t+5) ·∑m′1,m′1,m

′′2

∑q,u1,x1,u1,x1,ut

2,l0,l′1,l′′1 ,l′1,l′′1 ,(l

′2)t

p(q)p(u1, x1|q)p(u1, x1|q)p(ut2|q)

Tr [(Π)Y1

(q,l0),(u1,l′1),(x1,l′′1 ),ut2,(l′2)t ,δ

((ρ′)Y ′1(q,l0),(u1,l′1),(x1,l′′1 ),(ut

2,(l′2)t)(m′2)

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1)]

+12

∥∥∥∥(ρ′)QU1 X1(U2)t Y1 (m′2) −

ρQU1X1(U2)tY1 (m′2) ⊗ |0〉〈0|C2⊗

11L⊗(t+3)

|L|t+3

⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1∥∥∥∥

1

= 2 Tr [(11QU1 X1(U2)t Y1 − (Π)QU1 X1(U2)t Y1 )(ρ′)QU1 X1(U2)t Y1 (m′2)]+ 4 · (2R1−R′1 − 1) ·

Tr [(Π)QU1 X1(U2)t Y1 (ρ′)QU1 X1(U2)t Y1

({QU1U2},{X1},{})(m′2)]

+ 4 · (2R′1 − 1)2R1−R′1 ·

Tr [(Π)QU1 X1(U2)t Y1 (ρ′)QU1 X1(U2)t Y1

({QU2},{U1 X1},{})(m′2)]

+12

∥∥∥∥(ρ′)QU1 X1(U2)t Y1 (m′2) −

ρQU1X1(U2)tY1 (m′2) ⊗ |0〉〈0|C2

⊗11L

⊗(t+3)

|L|t+3 ⊗ |0〉〈0|C2⊗ |0〉〈0|C

t+1

∥∥∥∥∥∥∥1

≤ (2212δ−2ε + 25δ + 2α)

+1 − αα

2R1−R′1+2(2R′2−IεH (X1U2:Y1 |QU1) + 2−IεH (X1:Y1 |QU1U2))

+1 − αα

2R1+2(2R′2−IεH (X1U2:Y1 |Q) + 2−IεH (X1:Y1 |QU2))

≤ (2212δ−2ε + 25δ + 2α)

+1 − αα

(3R1−R′1+R′2+2−IεH (X1U2:Y1 |QU1)

+ 2R1−R′1+2−IεH (X1:Y1 |QU1U2))

16 Pranab Sen

+1 − αα

(2R1+2+R′2−IεH (X1U2:Y1 |Q) + 2R1+2−IεH (X1:Y1 |QU2)),

where Step (a) follows from Fact 3. Setting δ := ε1/3, α :=ε2/3 we get that E C′ [Pr[B1’s error]] ≤ 2213

ε1/3.Similarly, E C′ [Pr[B2’s error]] ≤ 2213

ε1/3. Thus, there isan augmented codebook C′ such that sum of average decod-ing errors of B1 and B2 is at most 2214

ε1/3. The average prob-ability that at least one of B1 or B2 err for C′ is thus seen tobe at most 2214

ε1/6 using Fact 1. This finishes the proof ofone-shot Chong-Motani-Garg-El Gamal inner bound. �

It is possible to give a one-shot Han-Kobayashi style in-ner bound for the interference channel also. To do so, weneed to use the one-shot simultaneous decoder for the threesender multiple access channel constructed in [1]. In contrastto the iid setting, in the one-shot setting it is not known if theHan-Kobayashi and Chong-Motani-Garg-El Gamal rate re-gions are the same or not. This is because we do not havegood chain rules for the hypothesis testing mutual informa-tion.

An advantage of the Han-Kobayashi inner bound tech-nique is that it can be easily extended to give a non-trivial in-ner bound for the interference channel wih entanglement as-sistance (see Figure 4). The Chong-Motani-Garg-El Gamalinner bound technique does not seem to be suitable for thisendeavour. We consider the case of an interference chan-nel with independent prior entanglement between A1 and B1,and between A2 and B2, which seems to be the most naturalscenario. We shall call this the interference channel with cisentanglement. For this channel, we can obtain the followinginner bound.

Theorem 4 (One-shot Han-Kobayashi, ent. assist.) Let C :X1X2 → Y1Y2 be a quantum interference channel. We are al-lowed use of arbitrary amount of prior entanglment betweenA1 and B1, and A2 and B2. Let Q,U1,U2 be three new sam-ple spaces and (Q,U1,U2) be a jointly distributed randomvariable with probability mass function p(q)p(u1|q)p(u2|q).Let X′′1 ,Z1, X′′2 ,Z2 be four new Hilbert spaces. Let ψX′1Z1

1 ⊗

ψX′2Z2

2 be a tensor product quantum state in X′1Z1X′2Z2. For

every element u1 ∈ U1, let EX′1→X1

1,u1be a fixed encoding super-

operator; similarly for every u2 ∈ U2. Consider the classicalquantum state

ρQU1U2Y1Z1Y2Z2

:=∑

q,u1,u2

p(q)p(u1|q)p(u2|q)|q, u1, u2〉〈q, u1, u2|QU1U2

⊗ ((CX1X2→Y1Y2 ⊗ IZ1Z2 )(

((EX′1→X1

1,u1⊗ IZ1 )(ψX′1Z1

1 ))X1Z1 ⊗

((EX′2→X2

2,u2⊗ IZ2 )(ψX′2Z2

1 ))X2Z2 ))Y1Z1Y2Z2 .

Let R′1, R′′1 , R′2, R′′2 , ε, be such that

R′1 ≤ IεH(U1 : Y1U2Z1|Q) − 2 − log1ε

R′′1 ≤ IεH(Z1 : Y1U1U2|Q) − 2 − log1ε

R′1 + R′′1 ≤ IεH(U1Z1 : Y1U2|Q) − 2 − log1ε

R′1 + R′2 ≤ IεH(U1U2 : Y1Z1|Q) − 2 − log1ε

R′′1 + R′2 ≤ IεH(Z1U2 : Y1U1|Q) − 2 − log1ε

R′1 + R′′1 + R′2 ≤ IεH(U1U2Z1 : Y1|Q) − 2 − log1ε

R′2 ≤ IεH(U2 : Y2U1Z2|Q) − 2 − log1ε

R′′2 ≤ IεH(Z2 : Y2U1U2|Q) − 2 − log1ε

R′2 + R′′2 ≤ IεH(U2Z2 : Y2U1|Q) − 2 − log1ε

R′1 + R′2 ≤ IεH(U1U2 : Y2Z2|Q) − 2 − log1ε

R′′2 + R′1 ≤ IεH(Z2U1 : Y2U2|Q) − 2 − log1ε

R′2 + R′′2 + R′1 ≤ IεH(U1U2Z2 : Y2|Q) − 2 − log1ε

where the mutual information quantitites above are computedwith respect to the cq-state ρQU1U2Y1Z1Y2Z2 . Define R1 := R′1 +

R′′1 , R2 := R′2 + R′′2 . Then there exists an (R1,R2, 2214ε1/6)-

quantum interference channel code for sending classical in-formation through C with cis entanglement assistance.

Proof: We employ rate splitting as in the traditional Han-Kobayashi inner bound proof. We split the message m1 intoa common message m′1 and a personal message m′′1 ; similarlyfor m2. The message triple (m′′1 ,m

′1,m

′2) is sent to B1 by treat-

ing the interference channel as a three sender multiple accesschannel. Message m′′1 is transmitted using the position basedcoding technique which requires the assistance of many in-dependent copies of the state ψX′1Z

1 with the X′1 parts under thepossession of A1 and the Z1 parts under the possession of B1.Message m′1 is transmitted without entanglement assistanceby applying the encoding superoperator E1,u1(m′1) to registerX′1(u1(m′1)), and feeding its output to the input register X1 ofthe channel C. Similar statements hold for messages m′′2 andm′2. An analogous consideration holds for receiver B2.

We obtain the above region by employing simultaneousdecoders for the two three-sender multiple access channelswith receivers B1 and B2 induced by C. The simultaneousdecoders have to handle both entanglement assisted as wellas unassisted messages, so in a sense, they are the hybridof the two simultaneous decoders described in [1]. Anotherimportant difference from the standard decoders for the mul-tiple access channel is that we do not want the additionalconstraints

R′2 ≤ IεH(U2 : Y1U1Z1|Q) − 2 − log1ε,

R′1 ≤ IεH(U1 : Y2U2Z2|Q) − 2 − log1ε

to appear in the rate region. For this, we need to use ‘unionof intersection of POVM elements’, which can be done by

Inner bounds via simultaneous decoding in quantum network information theory 17

Figure 4. Quantum interference channel with cis entanglement assistance.

appealing to Fact 5. The ‘union’ expresses the observationthat it is unnecessary for B1 to decode m′2 if he has alreadysuccessfully decoded (m′1,m

′′1 ), or equivalently, decoding m′2

wrongly is not a problem if B1 has already successfully de-coded (m′1,m

′′1 ). A similar comment holds for B2. In the

asymptotic iid setting, presence of these constraints does notaffect the rate region. In the one-shot setting it is not clearif this is true, simply because of the lack of chain rules forthe hypothesis testing mutual information. In the interest ofobtaining as large an inner bound as possible, we use the‘union’ technique. �

Remark:It is possible to get another Han-Kobayashi style inner boundif we allow independent prior entanglement between all thefour possible sender-receiver pairs i.e. if we allow both cisand trans entanglement, where trans entanglement refers toprior entanglement between A1 and B2, and A2 and B1. In thisscenario, we can directly employ, as a subroutine, the entan-glement assisted one-shot inner bound for the three senderquantum multiple access channel described in [1]. All themessage parts will now be transmitted using entanglementassistance. However, we do not discuss this further in thispaper because we feel that trans entanglement is an unnatu-ral resource.

6 Conclusions

In this paper, we have fruitfully used the quantum joint typi-cality lemmas from [1] to prove some novel inner bounds forsending classical information through multiterminal quan-tum channels. All our inner bounds require us to constructsimultaneous decoders, and hold in the one-shot setting. Forsome of these problems, one-shot inner bounds were hitherto

unknown even in the classical setting. All our one-shot in-ner bounds are strong enough to reduce to the standard innerbounds in the asymptotic iid limit, and provide non-trivialsecond order rates.

The Han-Kobayashi inner bound for a quantum interfer-ence channel with entanglement assistance given in this pa-per does not use the prior entanglement to send the commonparts of the messages. It seems that there is scope for im-provement in this regard, which is left for future work.

It will be interesting to find other applications of simulta-neous decoders in quantum network information theory. Al-ready, Ding, Gharibyan, Hayden and Walter [29] have usedthe joint typicality lemmas to construct a simultaneous de-coder for a particular quantum relay channel.

The quantum joint typicality lemmas give us robust toolsto handle union and intersection for ‘packing type’ problems.However, they fail for ‘covering type’ problems. Coveringtype problems often arise in source coding. Constructing si-multaneous decoders for them remains a major open prob-lem.

Acknowledgements

I thank Patrick Hayden, David Ding and Hrant Gharibyan foruseful discussions, and Mark Wilde for pointers to importantreferences. I am grateful to the anonymous referees of anearlier version of the paper, whose comments helped greatlyin improving the presentation.

References

[1] Sen, P. A one shot quantum joint typicality lemma. Availableat arXiv:1806.07278, 2018.

18 Pranab Sen

[2] A. El Gamal and Y-H. Kim. Network Information Theory.Cambridge University Press, 2012.

[3] O. Fawzi, P. Hayden, I. Savov, P. Sen, and M. Wilde. Classicalcommunication over a quantum interference channel. IEEETransactions on Information Theory, 58:3670–3691, 2012.

[4] P. Sen. Achieving the Han-Kobayashi inner bound for thequantum interference channel. In IEEE International Sym-posium on Information Theory (ISIT), pages 736–740, 2012.Full version at arXiv:1109.0802.

[5] H. Qi, Q. Wang, and M. Wilde. Applications of position-based coding to classical communication over quantum chan-nels. Journal of Physics A: Mathematical and Theoretical,51:444002:1–444002:42, 2018.

[6] A. Winter. The capacity of the quantum multiple-access chan-nel. IEEE Transactions on Information Theory, 47:3059–3065, 2001.

[7] Han, T. and Kobayashi, K. A new achievable rate region forthe interference channel. IEEE Transactions on InformationTheory, 27:49–60, 1981.

[8] Hirche,C., Morgan, C., and Wilde, M. Polar codes in networkquantum information theory. IEEE Transactions on Informa-tion Theory, 62:915–924, 2016.

[9] P. Sen. Inner bounds via simultaneous decoding in quantumnetwork information theory. Available at arXiv:1806.07276,2018.

[10] Marton, K. A coding theorem for the discrete memorylessbroadcast channel. IEEE Transactions on Information Theory,25:306–311, 1979.

[11] Chong, H., Motani, M., Garg, H., and El Gamal, H. Onthe Han-Kobayashi region for the interference channel. IEEETransactions on Information Theory, 54:3188–3195, 2008.

[12] Winter, A. Coding theorem and strong converse for quan-tum channels. IEEE Transactions on Information Theory,45:2481–2485, 1999.

[13] Ogawa, T. and Nagaoka, H. A new proof of the channel codingtheorem via hypothesis testing in quantum information the-ory. In IEEE International Symposium on Information The-ory (ISIT), pages 73–73, 2002. Full version at arXiv:quant-ph/0208139.

[14] L. Wang and R. Renner. One-shot classical-quantum capacityand hypothesis testing. Physical Review Letters, 108:2005:1–2005:5, 2012.

[15] F. Buscemi and N. Datta. The quantum capacity of channelswith arbitrarily correlated noise. IEEE Transactions on Infor-mation Theory, 56:1447–1460, 2010.

[16] F. Brandao and N. Datta. One-shot rates for entanglementmanipulation under non-entangling maps. IEEE Transactionson Information Theory, 57:1754–1760, 2011.

[17] Datta, N. Min- and max-relative entropies and a new entangle-ment monotone. IEEE Transactions on Information Theory,55:2816–2826, 2009.

[18] A. Anshu, R. Jain, and N. Warsi. Building blocks for commu-nication over noisy quantum networks. IEEE Transactions onInformation Theory, 65:1287–1306, 2019.

[19] Radhakrishnan, J., Sen, P., and Warsi, N. One shot Martoninner bound for classical quantum broadcast channel. IEEETransactions on Information Theory, 62:2836–2848, 2016.

[20] V. Belavkin. Optimal multiple quantum statistical hypothesistesting. Stochastics, 1:315–345, 1975.

[21] V. Belavkin. . Radiotekhnika i Electronika, 20:1177–1185,1975. English translation: “Optimal distinction of non-orthogonal quantum signals”, Radio Engineering and Elec-tronic Physics, 20, pp. 39–47, 1975.

[22] M. Hayashi and H. Nagaoka. General formulas for capacityof classical-quantum channels. IEEE Transactions on Infor-mation Theory, 49:1753–1768, 2003.

[23] Liu, J., Cuff, P., and Verdu, S. One-shot mutual coveringlemma and Marton’s inner bound with a common message. InIEEE International Symposium on Information Theory (ISIT),pages 1457–1461, 2015. Full version at arXiv:1504.04092.

[24] Cover, T. Broadcast channels. IEEE Transactions on Infor-mation Theory, 18:2–14, 1972.

[25] Bergmans, P. Random coding theorem for broadcast channelswith degraded components. IEEE Transactions on Informa-tion Theory, 19:197–207, 1973.

[26] Savov, I. and Wilde, M. Classical codes for quantum broadcastchannels. IEEE Transactions on Information Theory, 61:1–12,2015.

[27] Hirche, C. and Morgan, C. An improved rate region for theclassical-quantum broadcast channel. In IEEE InternationalSymposium on Information Theory (ISIT), pages 2782–2786,2015. Full version at arXiv:1501.07417.

[28] A. Anshu, R. Jain, and N. Warsi. On the near-optimalityof one-shot classical communication over quantum channels.Journal of Mathematical Physics, 60:012204:1–012204:19,2019.

[29] Ding, D., Gharibyan, H., Hayden, P., and Walter, M. A quan-tum multiparty packing lemma and the relay channel. IEEETransactions on Information Theory, 66:3500–3519, 2020.