pith. sign in

arxiv: 2510.09834 · v2 · submitted 2025-10-10 · 🪐 quant-ph · cs.IT· math.IT

Quantum Action-Dependent Channels

Pith reviewed 2026-05-18 07:20 UTC · model grok-4.3

classification 🪐 quant-ph cs.ITmath.IT
keywords quantum action-dependent channelachievable rateschannel side informationquantum memorydepolarizationno-cloning theoremquantum communication
0
0 comments X

The pith

The paper derives achievable rates for reliable message transmission over quantum action-dependent channels with causal or non-causal side information.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper studies a quantum channel model in which the transmitter first performs an action that modifies the environment and then sends an encoded message. It generalizes the classical action-dependent channel while respecting the no-cloning theorem by letting the transmitter share entanglement with the environment rather than possess a copy of its state. Achievable rates are obtained for both causal and non-causal channel side information. The results are illustrated with a memory-storage example involving depolarization and selective rewriting, showing how preparatory actions affect transmission performance.

Core claim

The central claim is that achievable rates for reliable message transmission can be derived for the quantum action-dependent channel, where the transmitter first shocks the environment and then encodes the message, either with causal or non-causal channel side information. Because Alice cannot clone the environment state, the model instead allows her to share entanglement with it. The rates are demonstrated in a case study of memory storage with depolarization and selective rewriting.

What carries the argument

The quantum action-dependent channel, defined by an initial transmitter action that affects the environment before message encoding, with entanglement sharing replacing any environment copy.

Load-bearing premise

The transmitter can share entanglement with the channel environment during the initial action without violating no-cloning or needing an environment copy.

What would settle it

A concrete calculation for the depolarizing memory example in which the derived achievable rate cannot be attained under standard quantum mechanics would falsify the rates.

Figures

Figures reproduced from arXiv: 2510.09834 by Michael Korenberg, Uzi Pereg.

Figure 1
Figure 1. Figure 1: Coding over a quantum action-dependent channel. Here Alice acts as the Action encoder, encoding the message [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Effect of pinching on a quantum state. Left: Matrix representation of B. Off-diagonal blocks (regions labeled C and C† ) indicate non-commutativity with A. Right: After applying the pinching map EA, the modified state EA(B) is block-diagonal in the eigenbasis of A (off-diagonal blocks are zero). Now EA(B) commutes with A, enabling a measurement comparison of their spectra. and the conditional entropy as H(… view at source ↗
read the original abstract

We study communication over a quantum action-dependent channel, where the transmitter first performs an action that "shocks" the channel environment, and subsequently encodes a message into a transmission sent through the channel. This two-stage interaction arises in various settings, including rewriting over defective memory and quantum effects such as measurement-induced state collapse. Our model can be viewed as a quantum generalization of Weissman's classical action-dependent channel (2010). Here, however, Alice cannot have a copy of the environment state due to the no-cloning theorem. Instead, she may share entanglement with this environment. We derive achievable rates for reliable message transmission via the quantum action-dependent channel, with either causal or non-causal channel side information (CSI). As a case study, we analyze memory storage with depolarization and selective rewriting, demonstrating how action-dependent control influences performance.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. The manuscript introduces a quantum generalization of action-dependent channels, in which the transmitter first performs an initial action that interacts with ('shocks') the channel environment and may share entanglement with it (owing to the no-cloning theorem), then encodes a message for transmission. Achievable rates are derived for reliable communication under both causal and non-causal channel side information at the transmitter; a case study applies the model to memory storage involving depolarization and selective rewriting.

Significance. If the rate derivations correctly incorporate the quantum resources associated with the initial action and entanglement sharing, the results would furnish a useful framework for quantum communication in settings with environmental control and side information, extending Weissman's classical model while respecting no-cloning. The case study supplies a concrete illustration of how action-dependent operations affect performance in a physically motivated scenario.

major comments (2)
  1. The derivation of achievable rates (both causal and non-causal CSI cases) must explicitly account for any ebits consumed or generated during the initial action and entanglement-sharing step with the environment; without this accounting the stated rates risk overstating the net capacity, as the interface between the action and the subsequent encoding is the least secure link in the construction.
  2. The model definition requires a precise specification of how the initial action produces an environment state with which Alice shares entanglement while remaining consistent with no-cloning and without implicitly assuming free or unlimited entanglement; this clarification is load-bearing for the validity of the subsequent rate expressions.
minor comments (1)
  1. Notation for the quantum action-dependent channel and the two CSI scenarios should be introduced with explicit definitions of the relevant quantum mutual information quantities and the precise role of the shared entanglement.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the careful reading of our manuscript on quantum action-dependent channels and for the constructive major comments. We address each point below, indicating the changes we will make to strengthen the presentation of the model and rate derivations.

read point-by-point responses
  1. Referee: The derivation of achievable rates (both causal and non-causal CSI cases) must explicitly account for any ebits consumed or generated during the initial action and entanglement-sharing step with the environment; without this accounting the stated rates risk overstating the net capacity, as the interface between the action and the subsequent encoding is the least secure link in the construction.

    Authors: We agree that an explicit accounting of ebit consumption or generation is required for the rates to represent net capacity. Our current derivations express achievable rates in terms of quantum mutual informations that incorporate the shared entanglement between Alice and the environment after the initial action. However, the manuscript does not separately quantify the entanglement cost of that action step. In the revision we will introduce a net-rate definition that subtracts the ebit rate consumed (or adds any ebits generated) by the action, and we will recompute the achievable rates for both the causal and non-causal CSI cases under this accounting. revision: yes

  2. Referee: The model definition requires a precise specification of how the initial action produces an environment state with which Alice shares entanglement while remaining consistent with no-cloning and without implicitly assuming free or unlimited entanglement; this clarification is load-bearing for the validity of the subsequent rate expressions.

    Authors: The abstract and introduction note that Alice cannot clone the environment state and may instead share entanglement with it. We acknowledge that the precise mathematical description of the action map and the resulting joint state is not fully formalized in the current text. In the revised manuscript we will add a dedicated model section that defines the initial action as a completely positive trace-preserving map (or isometry) acting on Alice’s input and the environment, explicitly constructs the post-action entangled state, and states that any entanglement is generated by this map itself rather than assumed to be freely available. revision: yes

Circularity Check

0 steps flagged

No significant circularity in derivation of achievable rates

full rationale

The paper derives achievable rates for reliable transmission over the quantum action-dependent channel by generalizing Weissman's classical model to the quantum setting, replacing environment copying with entanglement sharing due to no-cloning. The rate expressions rely on standard quantum mutual information quantities for both causal and non-causal CSI cases, without any reduction to fitted parameters, self-definitional constructs, or load-bearing self-citations. The two-stage interaction (initial action shocking the environment followed by message encoding) is modeled explicitly with physically consistent assumptions, and the derivation chain remains independent of its own outputs, grounded in established quantum information theory techniques.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 0 invented entities

Relies on standard quantum channel formalism and no-cloning theorem; no new free parameters or invented entities introduced in abstract.

axioms (1)
  • standard math Standard quantum information axioms including no-cloning theorem and entanglement sharing
    Invoked to justify why Alice shares entanglement rather than copying the environment state.

pith-pipeline@v0.9.0 · 5661 in / 1067 out tokens · 27106 ms · 2026-05-18T07:20:35.908244+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

42 extracted references · 42 canonical work pages

  1. [1]

    An algebraic and probabilistic framework for network information theory,

    S. S. Pradhan, A. Padakandla, and F. Shirani, “An algebraic and probabilistic framework for network information theory,” Found. Trends® Commun. Inf. Theory, vol. 18, no. 2, pp. 173–379, 2020

  2. [2]

    Keyless covert communication via channel state information,

    H. ZivariFard, M. R. Bloch, and A. Nosratinia, “Keyless covert communication via channel state information,”IEEE Trans. Inf. Theory, vol. 68, no. 8, pp. 5440–5474, 2022

  3. [3]

    Towards deep learning-aided wireless channel estimation and channel state information feedback for 6G,

    W. Kim, Y . Ahn, J. Kim, and B. Shim, “Towards deep learning-aided wireless channel estimation and channel state information feedback for 6G,”J. Commun. Netw., vol. 25, no. 1, pp. 61–75, 2023

  4. [4]

    Fully quantum arbitrarily varying channel coding for entanglement-assisted communication,

    P. Belzig, “Fully quantum arbitrarily varying channel coding for entanglement-assisted communication,” in2024 IEEE Int. Symp. Inf. Theory (ISIT), 2024, pp. 1011–1016

  5. [5]

    On the need of neuromorphic twins to detect denial-of-service attacks on communication networks,

    H. Boche, R. F. Schaefer, H. V . Poor, and F. H. P. Fitzek, “On the need of neuromorphic twins to detect denial-of-service attacks on communication networks,”IEEE/ACM Trans. Netw., vol. 32, no. 4, pp. 2875–2887, 2024

  6. [6]

    Electromagnetic information theory: Fundamentals and applications for 6g wireless communication systems,

    C.-X. Wang, Y . Yang, J. Huang, X. Gao, T. J. Cui, and L. Hanzo, “Electromagnetic information theory: Fundamentals and applications for 6g wireless communication systems,”IEEE Wireless Commun., vol. 31, no. 5, pp. 279–286, 2024

  7. [7]

    Vision transformers for human activity recognition using wifi channel state information,

    F. Luo, S. Khan, B. Jiang, and K. Wu, “Vision transformers for human activity recognition using wifi channel state information,”IEEE Internet of Things J., vol. 11, no. 17, pp. 28 111–28 122, 2024

  8. [8]

    Robust joint message and state transmission under arbitrarily varying jamming,

    Y . Chen and H. Boche, “Robust joint message and state transmission under arbitrarily varying jamming,”arXiv preprint arXiv:2501.10896, 2025

  9. [9]

    Channels with side information at the transmitter,

    C. E. Shannon, “Channels with side information at the transmitter,”IBM J. Res. Develop., vol. 2, no. 4, Oct. 1958

  10. [10]

    Coding for channel with random parameters,

    S. I. Gel’fand and M. S. Pinsker, “Coding for channel with random parameters,”Probl. Control Inf. Theory, vol. 9, no. 1, pp. 19–31, 1980

  11. [11]

    Writing on dirty paper (corresp.),

    M. H. M. Costa, “Writing on dirty paper (corresp.),”IEEE Trans. Inf. Theory, vol. 29, pp. 439–441, May. 1983

  12. [12]

    Superposition coding for side-information channels,

    A. Bennatan, D. Burshtein, G. Caire, and S. Shamai, “Superposition coding for side-information channels,”IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 1872–1889, Apr. 2006

  13. [13]

    Joint state estimation and communication over a state-dependent Gaussian multiple access channel,

    V . Ramachandran, S. R. B. Pillai, and V . M. Prabhakaran, “Joint state estimation and communication over a state-dependent Gaussian multiple access channel,”IEEE Trans. Commun., vol. 67, no. 10, pp. 6743–6752, Jul. 2019

  14. [14]

    The arbitrarily varying channel under constraints with side information at the encoder,

    U. Pereg and Y . Steinberg, “The arbitrarily varying channel under constraints with side information at the encoder,”IEEE Trans. Inf. Theory, vol. 65, no. 2, pp. 861–887, 2019

  15. [15]

    An information-theoretic approach to joint sensing and communication,

    M. Ahmadipour, M. Kobayashi, M. Wigger, and G. Caire, “An information-theoretic approach to joint sensing and communication,”IEEE Trans. Inf. Theory, vol. 70, no. 2, pp. 1124–1146, 2024

  16. [16]

    Channel coding in the presence of side information,

    G. Keshet, Y . Steinberg, N. Merhavet al., “Channel coding in the presence of side information,”Found. Trends® Commun. Inf. Theory, vol. 4, no. 6, pp. 445–586, 2008

  17. [17]

    Capacity of channels with action-dependent states,

    T. Weissman, “Capacity of channels with action-dependent states,”IEEE Trans. Inf. Theory, vol. 56, no. 11, pp. 5396–5411, Oct. 2010

  18. [18]

    Writing on dirty memory

    Y . Kim, “Writing on dirty memory.” Ph.D. dissertation, Carnegie Mellon University, USA, 2016. 14

  19. [19]

    On the capacity of computer memory with defects,

    C. Heegard and A. A. E. Gamal, “On the capacity of computer memory with defects,”IEEE Trans. Inf. Theory, vol. 29, pp. 731–739, Sep. 1983

  20. [20]

    Multi-stage coding for channels with a rewrite option and reversible input,

    K. Kittichokechai, T. J. Oechtering, and M. Skoglund, “Multi-stage coding for channels with a rewrite option and reversible input,” inProc. IEEE Int. Symp. Inf. Theory, 2012, pp. 3063–3067

  21. [21]

    Probing capacity,

    H. Asnani, H. Permuter, and T. Weissman, “Probing capacity,”IEEE Trans. Inf. Theory, vol. 57, no. 11, pp. 7317–7332, Nov. 2011

  22. [22]

    Coding with action-dependent side information and additional reconstruction requirements,

    K. Kittichokechai, T. J. Oechtering, and M. Skoglund, “Coding with action-dependent side information and additional reconstruction requirements,”IEEE Trans. Inf. Theory, vol. 61, no. 11, pp. 6355–6367, Nov. 2015

  23. [23]

    The degraded broadcast channel with action-dependent states,

    Y . Steinberg and T. Weissman, “The degraded broadcast channel with action-dependent states,” inProc. IEEE Int. Symp. Inf. Theory, 2012, pp. 596–600

  24. [24]

    On channels with action-dependent states,

    B. Ahmadi and O. Simeone, “On channels with action-dependent states,” inProc. IEEE Inf. Theory Workshop, 2012, pp. 167–171

  25. [25]

    MAC with action-dependent state information at one encoder,

    L. Dikstein, H. H. Permuter, and S. S. Shamai, “MAC with action-dependent state information at one encoder,”IEEE Trans. Inf. Theory, vol. 61, no. 1, pp. 173–188, Jan. 2015

  26. [26]

    Wiretap channel with action-dependent channel state information,

    B. Dai, A. J. H. Vinck, Y . Luo, and X. Tang, “Wiretap channel with action-dependent channel state information,”Entropy, vol. 15, no. 2, pp. 445–473, 2013

  27. [27]

    Impact of action-dependent state and channel feedback on Gaussian wiretap channels,

    B. Dai, C. Li, Y . Liang, Z. Ma, and S. S. Shamai, “Impact of action-dependent state and channel feedback on Gaussian wiretap channels,”IEEE Trans. Inf. Theory, vol. 66, no. 6, pp. 3435–3455, Jun. 2020

  28. [28]

    Transmitter actions for secure integrated sensing and communication,

    T. Welling, O. Günlü, and A. Yener, “Transmitter actions for secure integrated sensing and communication,” inProc. IEEE Int. Symp. Inf. Theory (ISIT), 2024, pp. 2580–2585

  29. [29]

    Experimental demonstration of long-distance continuous-variable quantum key distribution,

    P. Jouguet, S. Kunz-Jacques, A. Leverrier, P. Grangier, and E. Diamanti, “Experimental demonstration of long-distance continuous-variable quantum key distribution,”Nature Photonics, vol. 7, no. 5, p. 378, 2013

  30. [30]

    Recent advances on integrated quantum communications,

    A. Orieux and E. Diamanti, “Recent advances on integrated quantum communications,”J. Opt., vol. 18, no. 8, p. 083002, Aug. 2016

  31. [31]

    Universal quantum logic in hot silicon qubits,

    L. Petitet al., “Universal quantum logic in hot silicon qubits,”Nature, vol. 580, no. 7803, pp. 355–359, Apr. 2020

  32. [32]

    Quantum-enabled 6G wireless networks: Opportunities and challenges,

    C. Wang and A. Rahman, “Quantum-enabled 6G wireless networks: Opportunities and challenges,”IEEE Wireless Commun., vol. 29, no. 1, pp. 58–69, 2022

  33. [33]

    Quantum communication networks for 6G,

    R. Bassoli, F. H. Fitzek, and H. Boche, “Quantum communication networks for 6G,”Photon. Quantum Technol. Sci. Appl., vol. 2, pp. 715–736, 2023

  34. [34]

    The capacity of quantum channels with side information at the transmitter,

    F. Dupuis, “The capacity of quantum channels with side information at the transmitter,” inProc. IEEE Int. Symp. Inf. Theory, 2009, pp. 948–952

  35. [35]

    Entanglement-assisted capacity of quantum channels with side information,

    U. Pereg, “Entanglement-assisted capacity of quantum channels with side information,” 2019, arXiv:1909.09992

  36. [36]

    Secure communication over fully quantum Gel’fand-Pinsker wiretap channel,

    A. Anshu, M. Hayashi, and N. A. Warsi, “Secure communication over fully quantum Gel’fand-Pinsker wiretap channel,” IEEE Trans. Inf. Theory, vol. 66, no. 9, pp. 5548–5566, Jun. 2020

  37. [37]

    Covert communication with positive rate over state-dependent quantum channels,

    H. ZivariFard, R. A. Chou, and X. Wang, “Covert communication with positive rate over state-dependent quantum channels,” inProc. IEEE Inf. Theory Workshop (ITW), 2024, pp. 711–716

  38. [38]

    Communication over quantum channels with parameter estimation,

    U. Pereg, “Communication over quantum channels with parameter estimation,”IEEE Trans. Inf. Theory, vol. 68, no. 1, pp. 359–383, Jan. 2022

  39. [39]

    On quantum Rényi entropies: A new generalization and some properties,

    M. Müller-Lennert, F. Dupuis, O. Szehr, S. Fehr, and M. Tomamichel, “On quantum Rényi entropies: A new generalization and some properties,”J. Math. Phys., vol. 54, no. 12, Dec. 2013

  40. [40]

    Tomamichel,Quantum Information Processing with Finite Resources: Mathematical Foundations

    M. Tomamichel,Quantum Information Processing with Finite Resources: Mathematical Foundations. Springer-Verlag, 2015

  41. [41]

    Hayashi,Quantum Information Theory: Mathematical Foundation, 2nd ed

    M. Hayashi,Quantum Information Theory: Mathematical Foundation, 2nd ed. Springer, 2017

  42. [42]

    General formulas for capacity of classical-quantum channels,

    M. Hayashi and H. Nagaoka, “General formulas for capacity of classical-quantum channels,”IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1753–1768, Jun. 2003