TREVISAN'S EXTRACTOR IN THE PRESENCE OF QUANTUM SIDE INFORMATION

被引:68
作者
De, Anindya [1 ]
Portmann, Christopher [2 ,3 ]
Vidick, Thomas [4 ]
Renner, Renato [2 ,3 ]
机构
[1] Univ Calif Berkeley, Div Comp Sci, Berkeley, CA 94720 USA
[2] ETH, Inst Theoret Phys, CH-8093 Zurich, Switzerland
[3] Univ Geneva, Appl Phys Grp, CH-1211 Geneva, Switzerland
[4] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
基金
美国国家科学基金会; 瑞士国家科学基金会; 欧洲研究理事会;
关键词
randomness extractors; quantum information; quantum cryptography; smooth min-entropy; BOUNDED-STORAGE MODEL; PRIVACY AMPLIFICATION; RANDOMNESS; ENTROPIES;
D O I
10.1137/100813683
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Randomness extraction involves the processing of purely classical information and is therefore usually studied with in the framework of classical probability theory. However, such a classical treatment is generally too restrictive for applications where side information about the values taken by classical random variables may be represented by the state of a quantum system. This is particularly relevant in the context of cryptography, where an adversary may make use of quantum devices. Here, we show that the well-known construction paradigm for extractors proposed by Trevisan is sound in the presence of quantum side information. We exploit the modularity of this paradigm to give several concrete extractor constructions, which, e.g., extract all the conditional (smooth) min-entropy of the source using a seed of length polylogarithmic in the input, or only require the seed to be weakly random.
引用
收藏
页码:915 / 940
页数:26
相关论文
共 38 条
  • [1] Ambainis A., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P376, DOI 10.1145/301250.301347
  • [2] [Anonymous], P IEEE FOCS 1989
  • [3] Better short-seed quantum-proof extractors
    Ben-Aroya, Avraham
    Ta-Shma, Amnon
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 419 : 17 - 25
  • [4] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923
  • [5] PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION
    BENNETT, CH
    BRASSARD, G
    ROBERT, JM
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 210 - 229
  • [6] De A, 2010, ACM S THEORY COMPUT, P161
  • [7] Exponential Separations for One-Way Quantum Communication Complexity, with Applications to Cryptography
    Gavinsky, Dmitry
    Kempe, Julia
    Kerenidis, Iordanis
    Raz, Ran
    de Wolf, Ronald
    [J]. STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, 2007, : 516 - 525
  • [8] Combinatorial bounds for list decoding
    Guruswami, V
    Håstad, J
    Sudan, M
    Zuckerman, D
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (05) : 1021 - 1034
  • [9] On the distribution of the number of roots of polynomials and explicit weak designs
    Hartman, T
    Raz, R
    [J]. RANDOM STRUCTURES & ALGORITHMS, 2003, 23 (03) : 235 - 263
  • [10] Impagliazzo R., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/335305.335306