1,471 research outputs found
Entanglement sampling and applications
A natural measure for the amount of quantum information that a physical
system E holds about another system A = A_1,...,A_n is given by the min-entropy
Hmin(A|E). Specifically, the min-entropy measures the amount of entanglement
between E and A, and is the relevant measure when analyzing a wide variety of
problems ranging from randomness extraction in quantum cryptography, decoupling
used in channel coding, to physical processes such as thermalization or the
thermodynamic work cost (or gain) of erasing a quantum system. As such, it is a
central question to determine the behaviour of the min-entropy after some
process M is applied to the system A. Here we introduce a new generic tool
relating the resulting min-entropy to the original one, and apply it to several
settings of interest, including sampling of subsystems and measuring in a
randomly chosen basis. The sampling results lead to new upper bounds on quantum
random access codes, and imply the existence of "local decouplers". The results
on random measurements yield new high-order entropic uncertainty relations with
which we prove the optimality of cryptographic schemes in the bounded quantum
storage model.Comment: v3: fixed some typos, v2: fixed minor issue with the definition of
entropy and improved presentatio
Unconditional security from noisy quantum storage
We consider the implementation of two-party cryptographic primitives based on
the sole assumption that no large-scale reliable quantum storage is available
to the cheating party. We construct novel protocols for oblivious transfer and
bit commitment, and prove that realistic noise levels provide security even
against the most general attack. Such unconditional results were previously
only known in the so-called bounded-storage model which is a special case of
our setting. Our protocols can be implemented with present-day hardware used
for quantum key distribution. In particular, no quantum storage is required for
the honest parties.Comment: 25 pages (IEEE two column), 13 figures, v4: published version (to
appear in IEEE Transactions on Information Theory), including bit wise
min-entropy sampling. however, for experimental purposes block sampling can
be much more convenient, please see v3 arxiv version if needed. See
arXiv:0911.2302 for a companion paper addressing aspects of a practical
implementation using block samplin
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography is the art and science of exploiting quantum mechanical
effects in order to perform cryptographic tasks. While the most well-known
example of this discipline is quantum key distribution (QKD), there exist many
other applications such as quantum money, randomness generation, secure two-
and multi-party computation and delegated quantum computation. Quantum
cryptography also studies the limitations and challenges resulting from quantum
adversaries---including the impossibility of quantum bit commitment, the
difficulty of quantum rewinding and the definition of quantum security models
for classical primitives. In this review article, aimed primarily at
cryptographers unfamiliar with the quantum world, we survey the area of
theoretical quantum cryptography, with an emphasis on the constructions and
limitations beyond the realm of QKD.Comment: 45 pages, over 245 reference
Quantum to Classical Randomness Extractors
The goal of randomness extraction is to distill (almost) perfect randomness
from a weak source of randomness. When the source yields a classical string X,
many extractor constructions are known. Yet, when considering a physical
randomness source, X is itself ultimately the result of a measurement on an
underlying quantum system. When characterizing the power of a source to supply
randomness it is hence a natural question to ask, how much classical randomness
we can extract from a quantum system. To tackle this question we here take on
the study of quantum-to-classical randomness extractors (QC-extractors). We
provide constructions of QC-extractors based on measurements in a full set of
mutually unbiased bases (MUBs), and certain single qubit measurements. As the
first application, we show that any QC-extractor gives rise to entropic
uncertainty relations with respect to quantum side information. Such relations
were previously only known for two measurements. As the second application, we
resolve the central open question in the noisy-storage model [Wehner et al.,
PRL 100, 220502 (2008)] by linking security to the quantum capacity of the
adversary's storage device.Comment: 6+31 pages, 2 tables, 1 figure, v2: improved converse parameters,
typos corrected, new discussion, v3: new reference
Current advances in~information quantum technologies - critical issues
This article reviews chosen topics related to the development of Information Quantum Technologies in the major areas of measurements, communications, and computing. These fields start to build their ecosystems which in the future will probably coalesce into a homogeneous quantum information layer consisting of such interconnected components as quantum internet, full size quantum computers with efficient error corrections and ultrasensitive quantum metrology nodes stationary and mobile. Today, however, the skepticism expressing many doubts about the realizability of this optimistic view fights with a cheap optimism pouring out of some popular press releases. Where is the truth? Financing of the IQT by key players in research, development and markets substantially strengthens the optimistic side. Keeping the bright side with some reservations, we concentrate on showing the FAST pace of IQT developments in such areas as biological sciences, quantum evolutionary computations, quantum internet and some of its components
Coherent X-ray Diffractive Imaging; applications and limitations
The inversion of a diffraction pattern offers aberration-free
diffraction-limited 3D images without the resolution and depth-of-field
limitations of lens-based tomographic systems, the only limitation being
radiation damage. We review our experimental results, discuss the fundamental
limits of this technique and future plans.Comment: 7 pages, 8 figure
- …