481 research outputs found
Practical entanglement distillation scheme using recurrence method and quantum low density parity check codes
Many entanglement distillation schemes use either universal random hashing or breeding as their final step to obtain almost perfect shared EPR pairs spite of a high yield, the hardness of decoding a random linear code makes the use of random hashing and breeding infeasible in practice this pilot study, we analyze the performance of the recurrence method, a well-known entanglement distillation scheme, with its final random hashing or breeding procedure being replaced by various efficiently decodable quantum codes. Among all the replacements investigated, the one using a certain adaptive quantum low density parity check (QLDPC) code is found to give the highest yield for Werner states over a wide range of noise level- the yield for using this QLDPC code is higher than the first runner up by more than 25% over a wide parameter range this respect, the effectiveness of using QLDPC codes in practical entanglement distillation is illustrated. © The Author(s) 2010.published_or_final_versionSpringer Open Choice, 21 Feb 201
Robustness for Space-Bounded Statistical Zero Knowledge
We show that the space-bounded Statistical Zero Knowledge classes SZK_L and NISZK_L are surprisingly robust, in that the power of the verifier and simulator can be strengthened or weakened without affecting the resulting class. Coupled with other recent characterizations of these classes [Eric Allender et al., 2023], this can be viewed as lending support to the conjecture that these classes may coincide with the non-space-bounded classes SZK and NISZK, respectively
Faster-than-Clifford Simulations of Entanglement Purification Circuits and Their Full-stack Optimization
Quantum Entanglement is a fundamentally important resource in Quantum
Information Science; however, generating it in practice is plagued by noise and
decoherence, limiting its utility. Entanglement distillation and forward error
correction are the tools we employ to combat this noise, but designing the best
distillation and error correction circuits that function well, especially on
today's imperfect hardware, is still challenging. Here, we develop a simulation
algorithm for distillation circuits with gate-simulation complexity of
steps, providing for drastically faster modeling compared to
Clifford simulators or wavefunction
simulators over qubits.
This new simulator made it possible to not only model but also optimize
practically interesting purification circuits. It enabled us to use a simple
discrete optimization algorithm to design purification circuits from raw
Bell pairs to purified pairs and study the use of these circuits in the
teleportation of logical qubits in second-generation quantum repeaters. The
resulting purification circuits are the best-known purification circuits for
finite-size noisy hardware and can be fine-tuned for specific hardware error
models. Furthermore, we design purification circuits that shape the
correlations of errors in the purified pairs such that the performance of the
error-correcting code used in teleportation or other higher-level protocols is
greatly improved. Our approach of optimizing multiple layers of the networking
stack, both the low-level entanglement purification, and the forward error
correction on top of it, are shown to be indispensable for the design of
high-performance second-generation quantum repeaters
Computing the Maximum using (min, +) Formulas
We study computation by formulas over (min,+). We consider the
computation of max{x_1,...,x_n} over N as a difference of
(min,+) formulas, and show that size n + n log n is sufficient
and necessary. Our proof also shows that any (min,+) formula
computing the minimum of all sums of n-1 out of n variables must
have n log n leaves; this too is tight. Our proofs use a
complexity measure for (min,+) functions based on minterm-like
behaviour and on the entropy of an associated graph
Unconditional Relationships within Zero Knowledge
Zero-knowledge protocols enable one party, called a prover, to "convince" another party, called a verifier, the validity of a mathematical statement such that the verifier "learns nothing" other than the fact that the proven statement is true. The different ways of formulating the terms "convince" and "learns nothing" gives rise to four classes of languages having zero-knowledge protocols, which are: statistical zero-knowledge proof systems, computational zero-knowledge proof systems, statistical zero-knowledge argument systems, and computational zero-knowledge argument systems.
We establish complexity-theoretic characterization of the classes of languages in NP having zero-knowledge argument systems. Using these characterizations, we show that for languages in NP:
-- Instance-dependent commitment schemes are necessary and sufficient for zero-knowledge protocols. Instance-dependent commitment schemes for a given language are commitment schemes that can depend on the instance of the language, and where the hiding and binding properties are required to hold only on the YES and NO instances of the language, respectively.
-- Computational zero knowledge and computational soundness (a property held by argument systems) are symmetric properties. Namely, we show that the class of languages in NP intersect co-NP having zero-knowledge arguments is closed under complement, and that a language in NP has a statistical zero-knowledge **argument** system if and only if its complement has a **computational** zero-knowledge proof system.
-- A method of transforming any zero-knowledge protocol that is secure only against an honest verifier that follows the prescribed protocol into one that is secure against malicious verifiers. In addition, our transformation gives us protocols with desirable properties like having public coins, being black-box simulatable, and having an efficient prover.
The novelty of our results above is that they are **unconditional**, meaning that they do not rely on any unproven complexity assumptions such as the existence of one-way functions. Moreover, in establishing our complexity-theoretic characterizations, we give the first construction of statistical zero-knowledge argument systems for NP based on any one-way function
Quantum entanglement
All our former experience with application of quantum theory seems to say:
{\it what is predicted by quantum formalism must occur in laboratory}. But the
essence of quantum formalism - entanglement, recognized by Einstein, Podolsky,
Rosen and Schr\"odinger - waited over 70 years to enter to laboratories as a
new resource as real as energy.
This holistic property of compound quantum systems, which involves
nonclassical correlations between subsystems, is a potential for many quantum
processes, including ``canonical'' ones: quantum cryptography, quantum
teleportation and dense coding. However, it appeared that this new resource is
very complex and difficult to detect. Being usually fragile to environment, it
is robust against conceptual and mathematical tools, the task of which is to
decipher its rich structure.
This article reviews basic aspects of entanglement including its
characterization, detection, distillation and quantifying. In particular, the
authors discuss various manifestations of entanglement via Bell inequalities,
entropic inequalities, entanglement witnesses, quantum cryptography and point
out some interrelations. They also discuss a basic role of entanglement in
quantum communication within distant labs paradigm and stress some
peculiarities such as irreversibility of entanglement manipulations including
its extremal form - bound entanglement phenomenon. A basic role of entanglement
witnesses in detection of entanglement is emphasized.Comment: 110 pages, 3 figures, ReVTex4, Improved (slightly extended)
presentation, updated references, minor changes, submitted to Rev. Mod. Phys
Fiat-Shamir for highly sound protocols is instantiable
The Fiat–Shamir (FS) transformation (Fiat and Shamir, Crypto '86) is a popular paradigm for constructing very efficient non-interactive zero-knowledge (NIZK) arguments and signature schemes from a hash function and any three-move interactive protocol satisfying certain properties. Despite its wide-spread applicability both in theory and in practice, the known positive results for proving security of the FS paradigm are in the random oracle model only, i.e., they assume that the hash function is modeled as an external random function accessible to all parties. On the other hand, a sequence of negative results shows that for certain classes of interactive protocols, the FS transform cannot be instantiated in the standard model.
We initiate the study of complementary positive results, namely, studying classes of interactive protocols where the FS transform does have standard-model instantiations. In particular, we show that for a class of “highly sound” protocols that we define, instantiating the FS transform via a q-wise independent hash function yields NIZK arguments and secure signature schemes. In the case of NIZK, we obtain a weaker “q-bounded” zero-knowledge flavor where the simulator works for all adversaries asking an a-priori bounded number of queries q; in the case of signatures, we obtain the weaker notion of random-message unforgeability against q-bounded random message attacks.
Our main idea is that when the protocol is highly sound, then instead of using random-oracle programming, one can use complexity leveraging. The question is whether such highly sound protocols exist and if so, which protocols lie in this class. We answer this question in the affirmative in the common reference string (CRS) model and under strong assumptions. Namely, assuming indistinguishability obfuscation and puncturable pseudorandom functions we construct a compiler that transforms any 3-move interactive protocol with instance-independent commitments and simulators (a property satisfied by the Lapidot–Shamir protocol, Crypto '90) into a compiled protocol in the CRS model that is highly sound. We also present a second compiler, in order to be able to start from a larger class of protocols, which only requires instance-independent commitments (a property for example satisfied by the classical protocol for quadratic residuosity due to Blum, Crypto '81). For the second compiler we require dual-mode commitments.
We hope that our work inspires more research on classes of (efficient) 3-move protocols where Fiat–Shamir is (efficiently) instantiable
- …