Introduction
Entanglement is often treated as a free amplifier for quantum communication, the idea being that shared EPR pairs can shrink the number of qubits that need to move between two sides. That view works when both sides have unlimited local memory, but real hardware never does. The question here is whether pre–shared entanglement still helps once each side is limited to a fixed workspace of size S.
The model studied here is a two–party quantum communication task with bounded local coherence. Each side holds at most S qubits of reusable memory and may share E ebits before the protocol begins. Communication is measured in qubits sent across a noiseless channel, and workspace is enforced through a verify–and–reset map that keeps the local Hilbert–Schmidt dimension at most . This framing treats memory as a first–class resource, not just a hidden register.
In the unbounded setting, entanglement assistance can in theory reduce communication to zero through teleportation or superdense coding [
3,
4]. Cleve and Buhrman showed that entanglement can exponentially reduce communication complexity in certain tasks [
5]. Under bounded memory that assumption breaks. Each message qubit competes with local coherence for the same limited budget, and the total number of distinguishable states that survive each round is capped by
. That makes the workspace itself a physical limit on information flow.
No existing paper has treated this case directly. Classical and quantum communication tradeoffs generally assume unrestricted local memory. Single-party query-space results cover algorithms only, not two-party communication under bounded memory. The gap is simple to state: how much does pre-shared entanglement really buy once coherence becomes the bottleneck.
The analysis extends the multi–round Kadison–Schwarz packing lemma used in the workspace papers to protocols that include
E shared ebits. The key question is whether the assisted projector carries trace
or just
S. If it expands linearly, the tradeoff becomes
a dimensional boost but no asymptotic change. If it does not, the same bound
survives untouched, meaning entanglement gives no scaling advantage.
Either way, coherence appears to be the true limit. Even perfect correlations cannot overcome bounded local memory, and in that sense, workspace may be the more fundamental quantity in quantum communication. Entanglement-assisted quantum communication has been studied extensively since the foundational results on superdense coding and teleportation. Most recent analyses of assisted communication assume unbounded local memory, including work on channel capacities [
14,
16], quantum network protocols [
7], and resource tradeoffs in distributed systems [
2]. That assumption simplifies proofs but ignores the physical limits of coherence and workspace that matter in practical settings.
Memory-bounded quantum algorithms and space–time tradeoffs have been explored in single-party contexts, particularly for circuits and query models [
8,
11,
15]. These studies restrict local storage but do not involve interaction or entanglement between parties, so their methods do not transfer directly to communication tasks under workspace constraints. The presence of pre-shared entanglement changes how information accumulates and resets between rounds, creating a different limitation than in one-party computation.
Classical communication with memory limits has been examined intermittently, but no quantum work establishes whether shared entanglement can overcome bounded local coherence. The present analysis addresses this gap by combining a workspace constraint with entanglement assistance and testing whether the resulting tradeoff alters the known lower bound [
6].
Assisted Model Definition
The setup follows the standard two–party communication model but includes a fixed amount of shared entanglement. Each side holds at most S qubits of reusable workspace and shares E ebits in the maximally entangled state . Each party holds one half of this shared register, labeled and . Those pairs are distributed once before the protocol begins and persist unchanged through all k rounds. The goal is to see how that shared state interacts with the local memory bound.
Figure 1.
Assisted workspace-bounded communication model. Alice and Bob each maintain S qubits of local workspace and share E pre-distributed ebits in state . Each round r transfers at most qubits of communication, followed by local verify-and-reset operations and that enforce the workspace bound.
Figure 1.
Assisted workspace-bounded communication model. Alice and Bob each maintain S qubits of local workspace and share E pre-distributed ebits in state . Each round r transfers at most qubits of communication, followed by local verify-and-reset operations and that enforce the workspace bound.
The protocol unfolds in
k message rounds. In round
r, one side sends a message of at most
qubits, giving total communication
. Between rounds each party applies a local verify–and–reset map that restores the workspace to a clean state while keeping part of the joint system coherent through the shared ebits. This structure follows the bounded–memory model used in the workspace study [
6] and connects to the standard entanglement–assisted communication framework of Cleve and Buhrman [
5].
Let
denote the joint state of both parties after round
r. The assisted evolution is written
where
already includes both local workspaces and the persistent entanglement registers
. The map
represents the message transfer and
is the local verify–and–reset unitary acting on each side’s workspace. This composition is completely positive and trace preserving, keeping the local Hilbert–Schmidt dimension limited by the workspace bound.
For a marked instance
i and reference instance 0, define the round-
r difference operator
These operators track how much each round changes what can be told apart, forming the base of the Kadison–Schwarz packing step that comes next [
12].
To represent the effective space of verified operators, introduce the Hilbert–Schmidt projector acting on the sender’s combined workspace and local entanglement register . Its trace gives the available distinguishability budget, The term quantifies how much the shared entanglement contributes to the verified subspace. The coefficient satisfies ; its actual value is determined by the analysis in later sections. When the shared ebits act as passive correlation, and when each ebit contributes one effective workspace dimension to the verified subspace.
A protocol succeeds with error at most when the receiver identifies the target bit or pointer value with probability at least after the final round. This condition matches the unassisted workspace model but now depends on both S and E.
The open question is whether the entanglement adds a true dimensional boost to the verified subspace or merely acts as passive correlation. That decision rests on the size of and determines whether the next section’s packing lemma carries trace or stays at S.
Extended Packing Lemma
Setup. Fix adversary weights
with
. For each round
r and instance
i, recall
. The no–accumulation statement used in the workspace series reads
which caps per–round distinguishability growth before any projector is applied [
6].
Assisted projection map. Let
denote the round
r projector acting on the sender’s verified local space
, and define the completely positive, idempotent map
Its trace gives the available distinguishability budget,
, with
. By the Kadison–Schwarz inequality for completely positive maps,
see Paulsen [
12].
Per–round bound. Substitute
and sum over
i:
This gives the assisted packing cap for a single round.
Across rounds. Summing over all
k rounds yields
Interpretation. The total Hilbert–Schmidt load that survives verification over all rounds is bounded by a constant times . Entanglement contributes linearly through at most. When , shared ebits act as passive correlation; when , each ebit adds one effective workspace dimension.
Assisted packing lemma. For any entanglement–assisted protocol in the bounded–workspace model with local limit
S, shared ebits
E, and
k rounds,
This extends the workspace packing lemma of [
6] to the entanglement–assisted setting and serves as the bridge to the adversary argument in the next section.
Main Theorem
Adversary Setup. Let
where
is the trace distance. Initially
. Success with bounded error means
for some constant
. The setting follows the hybrid–adversary potential used by Ambainis [
1] and the workspace formulation in [
6]. By the Helstrom bound, constant–bias success implies a constant lower bound on trace distance [
9].
Per–Step Bound. Fix adversary weights
with
. At message step
t, let
be the active round and write
. The hybrid step [
1] gives
No global budget is used yet; this is a pointwise step bound.
Accumulated Progress. Summing over
and applying Cauchy–Schwarz,
By the assisted packing lemma,
Hence
Since
, the protocol must satisfy
Case Analysis. If
, shared entanglement contributes nothing and the relation reduces to
identical to the unassisted workspace bound. If
, entanglement expands the Hilbert–Schmidt budget linearly,
showing only dimensional growth, not asymptotic gain. In both cases the dominant term is the local workspace
S.
Endpoint Verification. When
the inequality recovers the single–round workspace theorem from [
6]. When
the bound becomes
so pure entanglement lowers the constant by at most a
factor but does not remove the
dependence. Both limits confirm internal consistency with prior results.
Formal Theorem Statement.
Theorem. In any
k-round quantum communication protocol where each party holds at most
S qubits of workspace and shares
E pre-distributed ebits,
Workspace remains the fundamental bottleneck regardless of the entanglement factor . This completes the derivation of the entanglement-assisted workspace bound.
Conclusions
The analysis introduced a workspace-bounded model that includes pre-shared entanglement. The main theorem shows that even with
E shared ebits, the communication cost satisfies
with
describing the effective entanglement contribution. Workspace bounds persist under assistance, confirming that local coherence remains the primary resource controlling quantum communication.
The bound interpolates between two regimes. When , shared entanglement contributes nothing to the verified subspace, and the result reduces to , identical to the unassisted case. When , each ebit adds one effective dimension, giving , a dimensional boost but no asymptotic scaling advantage. Either outcome demonstrates that workspace dominates the communication cost regardless of how entanglement contributes.
Practical Implications. The distinction between workspace and entanglement matters for near-term quantum hardware. NISQ devices operate under strict coherence-time limits that impose implicit workspace bounds [
13]. Pre-shared EPR pairs cannot compensate for insufficient local memory. Protocol designers optimizing for communication efficiency must account for workspace as a primary constraint, not just entanglement availability.
The verify-and-reset structure models realistic error mitigation where qubits must be measured and reinitialized between protocol rounds [
10]. Extending these bounds to continuous operation without resets would require analyzing cumulative decoherence, which may tighten the workspace constraint further.
Open Problems. The parameter measures how the verified subspace extends into the entangled register. Under the standard Hilbert–Schmidt trace, the verified projector on a tensor factor multiplies its dimension, so does not reduce to the workspace trace. Identifying therefore requires constructing the verified operator subspace explicitly. A possible direction is to reformulate the verify-and-reset process as a conditional expectation onto the workspace algebra, which may yield a normalized trace preserving the packing argument. This remains open in the present model.
Other open directions include:
Extending the analysis to mixed or partially entangled shared states.
Removing the verify-and-reset assumption through a conditional-expectation approach.
Constructing an upper bound that matches the scaling .
Analyzing protocols where entanglement is consumed rather than persistent across rounds.
Testing whether similar workspace–entanglement tradeoffs appear in non-interactive settings like quantum channel coding.
Closing Remarks. The results suggest that workspace bounds may represent a more fundamental constraint on quantum communication than previously recognized. Local coherence cannot be replaced by nonlocal correlation. This distinction matters for quantum network design where qubit coherence times define implicit memory limits. Hardware constraints may impose workspace bottlenecks that entanglement cannot overcome. The framework established here provides a foundation for analyzing resource tradeoffs in memory-constrained quantum protocols.
Funding
No external funding was received for this work.
Institutional Review Board Statement
Not applicable.
Data Availability Statement
No datasets were generated or analyzed in this study.
Use of Artificial Intelligence
Language and formatting assistance were provided by generative AI tools. All mathematical reasoning, results, and conclusions are the author’s own.
Conflicts of Interest
The author declares no conflicts of interest.
References
- Ambainis, A. (2002). Quantum lower bounds by quantum arguments. Journal of Computer and System Sciences, 64(4), 750–767.
- Bäuml, S., Azuma, K., & Dür, W. (2023). Entanglement-assisted classical communication in finite dimensions. Physical Review A, 107(3), 032411.
- Bennett, C. H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., & Wootters, W. K. (1993). Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Physical Review Letters, 70(13), 1895–1899.
- Bennett, C. H., & Wiesner, S. J. (1992). Communication via one- and two-particle operators on Einstein–Podolsky–Rosen states. Physical Review Letters, 69(20), 2881–2884.
- Cleve, R., & Buhrman, H. (1997). Substituting quantum entanglement for communication. Physical Review A, 56(2), 1201–1204.
- Cody, M. A. (2025). Workspace bound. Zenodo. DOI: 10.5281/zenodo.17270825.
- Gyongyosi, L., & Imre, S. (2021). Quantum communications in networked environments. IEEE Communications Surveys & Tutorials, 23(2), 1042–1078.
- Harrow, A. W., & Soleimanifar, M. (2023). Space-time tradeoffs in quantum circuits. arXiv:2303.01516.
- Helstrom, C. W. (1976). Quantum detection and estimation theory. Academic Press.
- Knill, E. (2005). Quantum computing with realistically noisy devices. Nature, 434(7029), 39–44.
- Li, Y., & Chen, X. (2024). Quantum memory bounds for interactive algorithms. Quantum Information Processing, 23(5), 161.
- Paulsen, V. (2002). Completely bounded maps and operator algebras. Cambridge University Press.
- Preskill, J. (2018). Quantum computing in the NISQ era and beyond. Quantum, 2, 79.
- Smith, G. (2020). Entanglement-assisted capacities of quantum channels. Reviews of Modern Physics, 92(2), 025002.
- Tomamichel, M., & Renner, R. (2020). Quantum information processing with limited memory. Quantum, 4, 347.
- Wilde, M. M. (2022). Quantum information theory (2nd ed.). Cambridge University Press.
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).