Abstract
Communication networks have multiple users, each sending and receiving messages. A multiple access channel (MAC) models multiple senders transmitting to a single receiver, such as the uplink from many mobile phones to a single base station. The optimal performance of a MAC is quantified by a capacity region of simultaneously achievable communication rates. We study the twosender classical MAC, the simplest and bestunderstood network, and find a surprising richness in both a classical and quantum context. First, we find that quantum entanglement shared between senders can substantially boost the capacity of a classical MAC. Second, we find that optimal performance of a MAC with boundedsize inputs may require unbounded amounts of entanglement. Third, determining whether a perfect communication rate is achievable using finitedimensional entanglement is undecidable. Finally, we show that evaluating the capacity region of a twosender classical MAC is in fact NPhard.
Introduction
Information theory is the mathematical theory of communication and signal processing pioneered by Shannon^{1}. In network communication settings, the simplest model is a multiple access channel (MAC), where two spatially separated senders aim to transmit individual messages to a single receiver. Faithful information transmission through a MAC is possible within its capacity region, which was characterized by Ahlswede^{2} and Liao^{3} in terms of a socalled singleletter formula, i.e., an entropic optimization problem of fixed bounded dimension that is in principle computable. In quantum information theory, communication tasks can be enhanced dramatically if the communicating parties are given access to quantum resources such as shared entanglement^{4,5}. However, certain tasks such as classical singlesendersinglereceiver communication receive no advantage from entanglement assistance^{6}.
In this work, we show that MACs behave in a fundamentally different way in the presence of entanglement assistance, in contrast to the singlesendersinglereceiver scenario. Moreover, even unassisted classical MACs exhibit far more complex behavior than previously widely appreciated. We demonstrate this by constructing a family of classical MACs with surprisingly rich behavior: First, we show that entanglement shared between the senders can strictly increase the capacity region of a classical MAC, proving that entanglement can help in a purely classical communication scenario. Second, we exhibit examples of channels for which an unbounded amount of entanglement is needed to achieve the maximal possible increase of the achievable rate region. We also show that it is generally undecidable to determine whether the maximal rate pair can be achieved for a MAC with finitedimensional entanglement strategies. Finally, we prove in the unassisted communication setting that it is NPhard to determine which rates can be achieved for a given MAC. Our findings imply that even for the arguably simplest network informationtheoretic setting of a MAC, there is no general solution to the problem of efficiently determining its unassisted communication capabilities, highlighting the need for practical approximation algorithms. At the same time, entanglement assistance can push the achievable information transmission rates of MACs beyond the classical limit, paving the way for harnessing entangled resources in hybrid classicalquantum information networks.
Results
Entanglement helps a classical multiple access channel
We first briefly review classical MAC, a general example of which is shown in Fig. 1. Our results concern the capacity region \({\mathcal{C}}(N)\) of a MAC N, consisting of all the rate pairs (R_{1}, R_{2}) such that sender i can faithfully transmit information to the receiver at the rate R_{i} (see Section 1.2 in the Supplementary Information for a more detailed definition). Ahlswede^{2} and Liao^{3} proved that \({\mathcal{C}}(N)\) is given by the convex hull of all pairs (R_{1}, R_{2}) satisfying
for some product distribution π_{A}π_{B} on \({\mathcal{A}}\times {\mathcal{B}}\). Here, I(U; V∣W) = H(UW) + H(VW) − H(W) − H(UVW) is the conditional mutual information, \(H(X)={\sum }_{i}p({x}_{i})\mathrm{log}\,p({x}_{i})\) is the Shannon entropy of a random variable X ~ p with the logarithm taken to base 2, and I(U; V) = H(U) + H(V) − H(UV) is the mutual information.
The central object in our work is a multiple access channel N_{G} defined in terms of a nonlocal game \(G=({{\mathcal{X}}}_{1},{{\mathcal{X}}}_{2},{{\mathcal{Y}}}_{1},{{\mathcal{Y}}}_{2},W)\), where \({{\mathcal{X}}}_{1},{{\mathcal{X}}}_{2}\) and \({{\mathcal{Y}}}_{1},{{\mathcal{Y}}}_{2}\) are the question and answer sets for Alice and Bob, respectively, and \(W\subset {{\mathcal{X}}}_{1}\times {{\mathcal{X}}}_{2}\times {{\mathcal{Y}}}_{1}\times {{\mathcal{Y}}}_{2}\) is the winning condition. For the MAC N_{G}, the input alphabets of the two senders Alice and Bob are the questionanswer sets \({{\mathcal{X}}}_{1}\times {{\mathcal{Y}}}_{1}\) and \({{\mathcal{X}}}_{2}\times {{\mathcal{Y}}}_{2}\), respectively, and the output alphabet of N_{G} is \({{\mathcal{X}}}_{1}\times {{\mathcal{X}}}_{2}\). If Alice and Bob win the nonlocal game G, that is, (x_{1}, y_{1}, x_{2}, y_{2}) \(\in W\), the channel is noiseless and outputs the question pair (x_{1}, x_{2}) to the receiver. If they lose the game, (x_{1}, y_{1}, x_{2}, y_{2}) ∉ W, the channel outputs a question pair \(({\hat{x}}_{1},{\hat{x}}_{2})\) drawn uniformly at random from \({{\mathcal{X}}}_{1}\times {{\mathcal{X}}}_{2}\). More formally, the MAC \({N}_{G}:({{\mathcal{X}}}_{1}\times {{\mathcal{Y}}}_{1})\times ({{\mathcal{X}}}_{2}\times {{\mathcal{Y}}}_{2})\to {{\mathcal{X}}}_{1}\times {{\mathcal{X}}}_{2}\) is defined as
This channel construction is inspired by previous work by Quek and Shor^{7}, who used a similar construction in terms of the CHSH game^{8} for an interference channel consisting of two senders and two receivers. It also appeared in unpublished work by Nötzel and Winter (A. Winter, personal communication), a portion of which has appeared in ref. ^{9}.
The noise in the MAC N_{G} defined in (2) is determined by the players’ ability to win the nonlocal game G. Clearly, if there exists a perfect strategy for Alice and Bob (i.e., a strategy that wins the game with certainty on any question pair), they can select their questions uniformly at random and transmit information to the receiver at rates \({R}_{i}=\mathrm{log}\, {{\mathcal{X}}}_{i}\), achieving the maximal possible sum rate \({R}_{1}+{R}_{2}=\mathrm{log}\, {{\mathcal{X}}}_{1} +\mathrm{log}\, {{\mathcal{X}}}_{2}\). On the other hand, if they cannot win the game with certainty, then the channel necessarily adds noise to their signals, and consequently the achievable sum rate decreases. We can make this intuition precise by observing that, setting A = X_{1}Y_{1} and B = X_{2}Y_{2}, the mutual information I(X_{1}Y_{1}X_{2}Y_{2}; Z) constraining the sum rate R_{1} + R_{2} in (1) can be expressed as:
Here, p_{L} denotes the probability of losing the game G given a product distribution p_{A}p_{B} on the questions x_{i} and a strategy producing the answers y_{i}. This relation allows us to prove a bound on the capacity region of N_{G} whenever the nonlocal game G does not admit a perfect strategy:
Theorem 1 If a nonlocal game G does not admit a perfect strategy (using the available resources), the sum rate R_{1} + R_{2} of the MAC N_{G} defined in (2) is strictly bounded away from \(\mathrm{log}\, {{\mathcal{X}}}_{1} +\mathrm{log}\, {{\mathcal{X}}}_{2}\).
Consider now a nonlocal game G that cannot be won with certainty using any classical strategy, and assume there exists a perfect quantum strategy. If we allow shared entanglement between the two senders of the MAC, then Theorem 1 provides a provable separation between the capacity region of the unassisted MAC N_{G} and the entanglementassisted achievable rate region. A wellknown example of such a nonlocal game is the magic square game G_{MS}^{10,11,12,13}, in which Alice and Bob have to fill a given row and column of a 3 × 3square with a bit string such that the parity of Alice’s row is even, the parity of Bob’s column is odd, and the assignments are consistent in the overlapping cell. It is wellknown that any classical strategy has winning probability at most \(\frac{8}{9}\)^{13}, as illustrated in the left panel in Fig. 2. For the MAC \({N}_{{G}_{{\rm{MS}}}}\) defined in terms of the magic square game, we can use Theorem 1 to obtain an upper bound on the achievable sum rate of 3.13694, bounding it away from the maximal value of \(2\mathrm{log}\,3\approx 3.17\).
On the other hand, there is a perfect quantum strategy in which Alice and Bob make measurements on two maximally entangled states shared between them^{10,11,13}. This perfect quantum strategy, depicted in the right panel of Fig. 2, allows Alice and Bob to send individual messages to the receiver at the rates \({R}_{1}={R}_{2}=\mathrm{log}\,3\), yielding the maximal sum rate \({R}_{1}+{R}_{2}=2\, {\mathrm{log}}\,3\), which is not achievable by any classical coding strategy by Theorem 1. Therefore, the unassisted capacity region of \({N}_{{G}_{{\rm{MS}}}}\) is separated from the point \((\mathrm{log}\,3,\mathrm{log}\,3)\), while the entanglementassisted achievable rate region includes this point. This separation between classical strategies and entanglementassisted strategies occurs for any nonlocal game G with no perfect classical strategies and perfect quantum strategies, a socalled “pseudotelepathy game”^{13}. Each game in this class yields a separation for the corresponding MAC between the unassisted capacity region and the entanglementassisted region via Theorem 1.
How much entanglement do you need?
Our main result, Theorem 1, can also be applied to the separate achievable rate regions for coding strategies using different amounts of entanglement. To illustrate this, we consider the class of linear system games G_{LS}^{14}, which are defined in terms of an m × n linear system Ax = b of equations over \({{\mathbb{F}}}_{2}\). Slofstra and Vidick showed that there is a particular instance G_{SV} of a linear system game for which a perfect winning strategy is necessarily quantum and furthermore requires an unbounded amount of entanglement^{15}. More precisely, they gave upper and lower bounds on the local dimension d of the quantum systems associated with Alice and Bob in the quantum strategy in terms of the losing probability p_{L}. Consider now the MAC \({N}_{{G}_{{\rm{SV}}}}\) defined according to (2) in terms of the linear system game G_{SV}. Limiting Alice and Bob to entanglement assistance of local dimension at most d, their probability of losing the linear system game is strictly positive^{15}. Consequently, we can invoke Theorem 1 to conclude that the ddimensional entanglementassisted achievable rate region of \({N}_{{G}_{{\rm{SV}}}}\) is bounded away from the rate pair \((\mathrm{log}\,m,\mathrm{log}\,n)\) achieving the maximal sum rate \(\mathrm{log}\,m+\mathrm{log}\,n\). On the other hand, it is straightforward to define a ddimensional entanglementassisted coding strategy for Alice and Bob based on the quantum strategy derived by Slofstra and Vidick^{15} whose winning probability converges to unity as d grows. Hence, as Alice and Bob have access to larger and larger entangled states, they approximate the perfect sum rate \(\mathrm{log}\,m+\mathrm{log}\,n\) arbitrarily well.
Our results show that linear system games give rise to a family of MACs whose dentanglementassisted achievable rate regions approach the rate pair \((\mathrm{log}\,m,\mathrm{log}\,n)\) in the limit d → ∞, yet they are strictly bounded away from it for any fixed finite d. Moreover, considering all finitedimensional quantum strategies for a general linear system game G_{LS}, Slofstra showed that it is undecidable to determine whether there is a perfect quantum strategy among them^{16}. By the arguments above, this directly translates to the following result: For the MAC \({N}_{{G}_{{\rm{LS}}}}\) defined in terms of a linear system game G_{LS}, it is undecidable to determine whether the entanglementassisted achievable rate region includes the rate pair \((\mathrm{log}\,m,\mathrm{log}\,n)\).
Complexity of the capacity region of a classical MAC
Finally, we turn our focus to the unassisted coding scenario for a discrete MAC. In informationtheoretic terms, this scenario seems well understood as the capacity region \({\mathcal{C}}(N)\) of a MAC N can be expressed in terms of a computable singleletter formula^{2,3}. However, the singleletter nature of the capacity region formula by itself does not guarantee an efficient method of computing \({\mathcal{C}}\) in, say, runtime polynomial in \(\max \{ {\mathcal{A}} , {\mathcal{B}} , {\mathcal{Z}} \}\), the maximal size of the input and output alphabets of N. Using our construction of a MAC in terms of nonlocal games, we prove that it is NPhard to decide whether a given point (R_{1}, R_{2}) belongs to the capacity region of a MAC to within an additive error inversecubic in n, where n is the size of the output alphabet. Our result is based on a nonlocal game version G_{H} of 3SAT introduced by Håstad^{17}, consisting of \(m={\mathcal{O}}(n)\) clauses containing exactly three out of n literals. For this nonlocal game, it follows from the probabilistically checkable proofs theorem^{18,19} that it is NPhard to decide if there is a perfect winning strategy for G_{H} or if the maximal winning probability is bounded from above by 1 − (1 − c)/n for some constant c < 1^{17}. Consider now \({N}_{{G}_{{\rm{H}}}}\), the MAC defined in (2) in terms of the game G_{H}. Clearly, if Alice and Bob have a perfect winning strategy for G_{H}, they can each code at the rates \({R}_{1}=\mathrm{log}\,m\) and \({R}_{2}=\mathrm{log}\,n\) by choosing a uniform distribution over their respective question alphabets. This leads to the maximal sum rate \({R}_{1}+{R}_{2}=\mathrm{log}\,m+\mathrm{log}\,n\). On the other hand, if the maximal winning probability is bounded from above by ω^{*} = 1 − (1 − c)/n, then Theorem 1 can be used to show that the sum rate R_{1} + R_{2} is bounded from above by \(\mathrm{log}\,m+\mathrm{log}\,n{(1{\omega }^{* })}^{3}\). In this case, the capacity region \({\mathcal{C}}({N}_{{G}_{{\rm{H}}}})\) is bounded away from the rate pair \((\mathrm{log}\,m,\mathrm{log}\,n)\). Altogether, this shows that it is NPhard to decide if an arbitrary rate tuple (R_{1}, R_{2}) belongs to \({\mathcal{C}}({N}_{{G}_{{\rm{H}}}})\) to precision inversecubic in n.
Discussion
In this work we show that the capacity region of a multiple access channel displays complex behavior, both in a purely classical setting and when the senders have access to shared entangled quantum states. In particular, we prove that entanglement assistance can boost the achievable rates in a setting where two senders try to convey classical information through a common classical communication channel to a single receiver. Such an increase in capacity is impossible in the pointtopoint scenario involving a single sender and a receiver. We also show that for a certain family of MACs the two senders need to share an unbounded amount of entanglement in order to achieve the ideal communication rate pair. When restricted to finitedimensional entangled strategies, it is undecidable for this particular channel family whether the ideal rate can be achieved. Finally, we show that even in the unassisted scenario, it is in fact NPhard to decide whether the ideal rate pair belongs to the capacity region of a MAC. This result is a strong counterpoint to the widely held belief that the availability of a computable singleletter formula for the capacity region essentially solves the MAC problem. The central tool in the proofs of all results above is the construction of a MAC in terms of a nonlocal game in such a way that the noise level of the channel is determined by the senders’ ability to win the game.
Our work opens up a number of interesting topics for future work. Numerical investigations for the magic square channel suggest that the true separation between classical and quantum coding strategies for the MACs considered in this work is considerably larger than the separation guaranteed by Theorem 1, suggesting that our bound on the sum rate could be further tightened. For our results above we considered a specific achievable rate region that arises naturally when the two senders measure identical copies of a single entangled state. In general, the senders might have access to multipartite entangled states and implement parallel encoding strategies, which leads to the notion of an entanglementassisted capacity region. We expect this region to be given by the regularization of the achievable region considered in this paper. For the MACs defined via our construction, this question seems to be related to parallel repetition theorems for nonlocal games played with quantum strategies. Furthermore, in this work we only considered entanglement shared between the two senders, and the communication setting could be generalized to one where entanglement is shared between both the senders and the receiver. Finally, our NPhardness result for the unassisted capacity region of a MAC underlines the need for tight efficiently computable outer bounds on the unassisted capacity region. Such bounds could for example be obtained from convex relaxations of the rank1 optimization problem describing the MAC capacity region^{20}.
Data availability
No data sets were generated during this study.
Code availability
MATLAB and Mathematica code files used to obtain the numerical bounds in Supplementary Note 3 are available from the corresponding author upon request.
References
 1.
Shannon, C. E. A mathematical theory of communication. Bell Syst. Tech. J. 27, 379–423 (1948).
 2.
Ahlswede, R. Multiway communication channels. In Second International Symposium on Information Theory: Tsahkadsor, Armenia, USSR, Sept. 2–8, 1971, 23–52 (1971).
 3.
Liao, H. Multiple access channels. Phd thesis, Department of Electrical Engineering, University of Hawaii (1972).
 4.
Bennett, C. H. & Wiesner, S. J. Communication via one and twoparticle operators on einsteinpodolskyrosen states. Phys. Rev. Lett. 69, 2881–2884 (1992).
 5.
Bennett, C. H. et al. Teleporting an unknown quantum state via dual classical and einsteinpodolskyrosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993).
 6.
Bennett, C. H., Shor, P. W., Smolin, J. A. & Thapliyal, A. V. Entanglementassisted classical capacity of noisy quantum channels. Phys. Rev. Lett. 83, 3081–3084 (1999).
 7.
Quek, Y. & Shor, P. W. Quantum and superquantum enhancements to twosender, tworeceiver channels. Phys. Rev. A 95, 052329 (2017).
 8.
Clauser, J. F., Horne, M. A., Shimony, A. & Holt, R. A. Proposed experiment to test local hiddenvariable theories. Phys. Rev. Lett. 23, 880–884 (1969).
 9.
Nötzel, J. Entanglementenabled communication, Preprint at https://arxiv.org/abs/1910.03796 (2019).
 10.
Mermin, N. D. Simple unified form for the major nohiddenvariables theorems. Phys. Rev. Lett. 65, 3373–3376 (1990).
 11.
Peres, A. Incompatible results of quantum measurements. Phys. Lett. A 151, 107–108 (1990).
 12.
Aravind, P. K. A simple demonstration of bell’s theorem involving two observers and no probabilities or inequalities, Preprint at https://arxiv.org/abs/quantph/0206070 (2002).
 13.
Brassard, G., Broadbent, A. & Tapp, A. Quantum pseudotelepathy. Found. Phys. 35, 1877–1907 (2005).
 14.
Cleve, R. & Mittal, R. Characterization of binary constraint system games. In International Colloquium on Automata, Languages, and Programming, 320–331 (Springer, 2014). 1209.2729.
 15.
Slofstra, W. & Vidick, T. Entanglement in nonlocal games and the hyperlinear profile of groups. Annales Henri Poincaré 19, 2979–3005 (2018).
 16.
Slofstra, W. The set of quantum correlations is not closed. Forum Math., Pi 7, e1 (2019).
 17.
Håstad, J. Some optimal inapproximability results. J. ACM 48, 798–859 (2001).
 18.
Feige, U. A threshold of ln n for approximating set cover. J. ACM 45, 634–652 (1998).
 19.
Khot, S. & Saket, R. A 3query nonadaptive pcp with perfect completeness. In Proceedings of the 21st Annual IEEE Conference on Computational Complexity, 11 pp.–169 (2006).
 20.
Calvo, E., Palomar, D. P., Fonollosa, J. R. & Vidal, J. On the computation of the capacity region of the discrete mac. IEEE Trans. Commun. 58, 3512–3525 (2010).
Acknowledgements
We thank Mark M. Wilde and Andreas Winter for helpful comments and feedback. This work was partially supported by NSF Grant No. PHY 1734006 and NSF CAREER award CCF 1652560.
Author information
Affiliations
Contributions
F.L., M.A., J.L., and G.S. each contributed extensively to the paper.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Peer review information Nature Communications thanks Omar Fawzi and the other, anonymous, reviewer(s) for their contribution to the peer review of this work. Peer reviewer reports are available.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Leditzky, F., Alhejji, M.A., Levin, J. et al. Playing games with multiple access channels. Nat Commun 11, 1497 (2020). https://doi.org/10.1038/s4146702015240w
Received:
Accepted:
Published:
Further reading

Entanglementassisted capacity regions and protocol designs for quantum multipleaccess channels
npj Quantum Information (2021)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.