On the power of quantum memory

被引:55
作者
König, R [1 ]
Maurer, U [1 ]
Renner, R [1 ]
机构
[1] ETH, Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
关键词
cryptography; privacy amplification; quantum information theory; quantum key distribution; quantum memory; security proofs; universal hashing;
D O I
10.1109/TIT.2005.850087
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address the question whether quantum memory is more powerful than classical memory. In particular, we consider a setting where information about a random n-bit string X is stored in 8 classical or quantum bits, for s < n, i.e., the stored information is bound to be only partial. Later, a randomly chosen predicate F about X has to be guessed using only the stored information. The maximum probability of correctly guessing F(X) is then compared for the cases where the storage device is classical or quantum mechanical, respectively. We show that, despite the fact that the measurement of quantum bits can depend arbitrarily on the predicate F, the quantum advantage is negligible already for small values of the difference n - s. Our setting generalizes the setting of Ambainis et al. who considered the problem of guessing an arbitrary bit (i.e., one of the n bits) of X. An implication for cryptography is that privacy amplification by universal hashing remains essentially equally secure when the adversary's memory is allowed to be quantum rather than only classical. Since privacy amplification is a main ingredient of many quantum key distribution (QKD) protocols, our result can be used to prove the security of QKD in a generic way.
引用
收藏
页码:2391 / 2401
页数:11
相关论文
共 25 条
[1]   The quantum communication complexity of sampling [J].
Ambainis, A ;
Schulman, LJ ;
Ta-Shma, A ;
Vazirani, U ;
Wigderson, A .
39TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1998, :342-351
[2]  
Ambainis A., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P376, DOI 10.1145/301250.301347
[3]  
Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[4]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[5]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[6]  
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[7]  
CHRISTANDL M, 2004, GENERIC SECURITY PRO
[8]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[9]   Optimal randomizer efficiency in the bounded-storage model [J].
Dziembowski, S .
JOURNAL OF CRYPTOLOGY, 2004, 17 (01) :5-26
[10]  
ELBAZ A, 2003, THESIS WEIZMANN I SC