3 research outputs found
Non-Asymptotic Analysis of Privacy Amplification via Renyi Entropy and Inf-Spectral Entropy
This paper investigates the privacy amplification problem, and compares the
existing two bounds: the exponential bound derived by one of the authors and
the min-entropy bound derived by Renner. It turns out that the exponential
bound is better than the min-entropy bound when a security parameter is rather
small for a block length, and that the min-entropy bound is better than the
exponential bound when a security parameter is rather large for a block length.
Furthermore, we present another bound that interpolates the exponential bound
and the min-entropy bound by a hybrid use of the Renyi entropy and the
inf-spectral entropy.Comment: 6 pages, 4 figure
Separation of Reliability and Secrecy in Rate-Limited Secret-Key Generation
For a discrete or a continuous source model, we study the problem of
secret-key generation with one round of rate-limited public communication
between two legitimate users. Although we do not provide new bounds on the
wiretap secret-key (WSK) capacity for the discrete source model, we use an
alternative achievability scheme that may be useful for practical applications.
As a side result, we conveniently extend known bounds to the case of a
continuous source model. Specifically, we consider a sequential key-generation
strategy, that implements a rate-limited reconciliation step to handle
reliability, followed by a privacy amplification step performed with extractors
to handle secrecy. We prove that such a sequential strategy achieves the best
known bounds for the rate-limited WSK capacity (under the assumption of
degraded sources in the case of two-way communication). However, we show that,
unlike the case of rate-unlimited public communication, achieving the
reconciliation capacity in a sequential strategy does not necessarily lead to
achieving the best known bounds for the WSK capacity. Consequently, reliability
and secrecy can be treated successively but not independently, thereby
exhibiting a limitation of sequential strategies for rate-limited public
communication. Nevertheless, we provide scenarios for which reliability and
secrecy can be treated successively and independently, such as the two-way
rate-limited SK capacity, the one-way rate-limited WSK capacity for degraded
binary symmetric sources, and the one-way rate-limited WSK capacity for
Gaussian degraded sources.Comment: 18 pages, two-column, 9 figures, accepted to IEEE Transactions on
Information Theory; corrected typos; updated references; minor change in
titl
A Hierarchy of Information Quantities for Finite Block Length Analysis of Quantum Tasks
We consider two fundamental tasks in quantum information theory, data
compression with quantum side information as well as randomness extraction
against quantum side information. We characterize these tasks for general
sources using so-called one-shot entropies. We show that these
characterizations - in contrast to earlier results - enable us to derive tight
second order asymptotics for these tasks in the i.i.d. limit. More generally,
our derivation establishes a hierarchy of information quantities that can be
used to investigate information theoretic tasks in the quantum domain: The
one-shot entropies most accurately describe an operational quantity, yet they
tend to be difficult to calculate for large systems. We show that they
asymptotically agree up to logarithmic terms with entropies related to the
quantum and classical information spectrum, which are easier to calculate in
the i.i.d. limit. Our techniques also naturally yields bounds on operational
quantities for finite block lengths.Comment: See also arXiv:1208.1400, which independently derives part of our
result: the second order asymptotics for binary hypothesis testin