Entanglement Sampling and Applications

被引:73
作者
Dupuis, Frederic [1 ]
Fawzi, Omar [2 ]
Wehner, Stephanie [3 ]
机构
[1] Aarhus Univ, Inst Comp Sci, DK-8000 Aarhus, Denmark
[2] ETH, Inst Theoret Phys, CH-8092 Zurich, Switzerland
[3] Natl Univ Singapore, Ctr Quantum Technol, Singapore 119077, Singapore
基金
欧洲研究理事会; 新加坡国家研究基金会; 美国国家科学基金会;
关键词
Quantum cryptography; min-entropy sampling; bounded storage model; noisy quantum-storage model; entropic uncertainty relation; random access codes; collision entropy; QUANTUM BIT COMMITMENT; UNCONDITIONAL SECURITY; UNCERTAINTY PRINCIPLE; STORAGE; CRYPTOGRAPHY; RANDOMNESS; MEMORY; KEY;
D O I
10.1109/TIT.2014.2371464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A natural measure for the amount of quantum information that a physical system E holds about another system A = A(1), ... , A(n) is given by the min-entropy H-min(A vertical bar E). In particular, the min-entropy measures the amount of entanglement between E and A, and is the relevant measure when analyzing a wide variety of problems ranging from randomness extraction in quantum cryptography, decoupling used in channel coding, to physical processes such as thermalization or the thermodynamic work cost (or gain) of erasing a quantum system. As such, it is a central question to determine the behavior of the min-entropy after some process M is applied to the system A. Here, we introduce a new generic tool relating the resulting min-entropy to the original one, and apply it to several settings of interest. A simple example of such a process is the one of sampling, where a subset S of the systems A(1), ... , A(n) is selected at random. Our tool allows us to quantify the entanglement that E has with the selected systems A(S), i.e., H-min(A(S)vertical bar ES) as a function of the original H-min(A vertical bar E). We give two applications of this result. First, it directly provides the first local quantum-to-classical randomness extractors for use in quantum cryptography, as well as decoupling operations acting on only a small fraction AS of the input A. Moreover, it gives lower bounds on the dimension of k-out-of-n fully quantum random access encodings. Another natural example of such a process is a measurement in, e.g., BB84 bases commonly used in quantum cryptography. We establish the first entropic uncertainty relations with quantum side information that are nontrivial whenever E is not maximally entangled with A. As a consequence, we are able to prove optimality of quantum cryptographic schemes in the noisy-storage model. This model allows for the secure implementation of two-party cryptographic primitives under the assumption that the adversary cannot store quantum information perfectly. A special case is the bounded-quantum-storage model (BQSM), which assumes that the adversary's quantum memory device is noise free but limited in size. Ever since the inception of the BQSM, it has been a vexing open question to determine whether the security is possible as long as the adversary can only store strictly less than the number of qubits n transmitted during the protocol. Here, we show that security is even possible as long as the adversary's device is not larger than n - O(log(2) n) qubits, which finally settles the fundamental limits of the BQSM.
引用
收藏
页码:1093 / 1112
页数:20
相关论文
共 66 条
  • [1] The mother of all protocols: restructuring quantum information's family tree
    Abeyesinghe, Anura
    Devetak, Igor
    Hayden, Patrick
    Winter, Andreas
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2009, 465 (2108): : 2537 - 2563
  • [2] Dense quantum coding and quantum finite automata
    Ambainis, A
    Nayak, A
    Ta-Shma, A
    Vazirani, U
    [J]. JOURNAL OF THE ACM, 2002, 49 (04) : 496 - 511
  • [3] Ambainis A., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P376, DOI 10.1145/301250.301347
  • [4] [Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
  • [5] [Anonymous], 2010, Introduction to Coding Theory, Notes 1: Introduction, Linear Codes
  • [6] A new proof for the existence of mutually unbiased bases
    Bandyopadhyay, S
    Boykin, PO
    Roychowdhury, V
    Vatan, F
    [J]. ALGORITHMICA, 2002, 34 (04) : 512 - 528
  • [7] On quantum fidelities and channel capacities
    Barnum, H
    Knill, E
    Nielsen, MA
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1317 - 1329
  • [8] Reversing quantum dynamics with near-optimal quantum and classical fidelity
    Barnum, H
    Knill, E
    [J]. JOURNAL OF MATHEMATICAL PHYSICS, 2002, 43 (05) : 2097 - 2106
  • [9] A Hypercontractive Inequality for Matrix-Valued Functions with Applications to Quantum Computing and LDCs
    Ben-Aroya, Avraham
    Regev, Oded
    de Wolf, Ronald
    [J]. PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, : 477 - +
  • [10] Berta M., 2013, EQUALITY ENTANGLEMEN