470 research outputs found
Unifying classical and quantum key distillation
Assume that two distant parties, Alice and Bob, as well as an adversary, Eve,
have access to (quantum) systems prepared jointly according to a tripartite
state. In addition, Alice and Bob can use local operations and authenticated
public classical communication. Their goal is to establish a key which is
unknown to Eve. We initiate the study of this scenario as a unification of two
standard scenarios: (i) key distillation (agreement) from classical
correlations and (ii) key distillation from pure tripartite quantum states.
Firstly, we obtain generalisations of fundamental results related to
scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based
on an embedding of classical distributions into quantum states, we are able to
find new connections between protocols and quantities in the standard scenarios
(i) and (ii).
Secondly, we study specific properties of key distillation protocols. In
particular, we show that every protocol that makes use of pre-shared key can be
transformed into an equally efficient protocol which needs no pre-shared key.
This result is of practical significance as it applies to quantum key
distribution (QKD) protocols, but it also implies that the key rate cannot be
locked with information on Eve's side. Finally, we exhibit an arbitrarily large
separation between the key rate in the standard setting where Eve is equipped
with quantum memory and the key rate in a setting where Eve is only given
classical memory. This shows that assumptions on the nature of Eve's memory are
important in order to determine the correct security threshold in QKD.Comment: full versio
The private and public correlation cost of three random variables with collaboration
© 2016 IEEE. In this paper, we consider the problem of generating arbitrary three-party correlations from a combination of public and secret correlations. Two parties - called Alice and Bob - share perfectly correlated bits that are secret from a collaborating third party, Charlie. At the same time, all three parties have access to a separate source of correlated bits, and their goal is to convert these two resources into multiple copies of some given tripartite distribution ℙ(XYZ). We obtain a single-letter characterization of the tradeoff between public and private bits that are needed to achieve this task. The rate of private bits is shown to generalize Wyner's classic notion of common information held between a pair of random variables. The problem we consider can be contrasted fruitfully with the task of secrecy formation, in which ℙ(XYZ) is generated using public communication and local randomness but with Charlie functioning as an adversary instead of a collaborator. We describe in detail the differences between the collaborative and adversarial scenarios
Round Complexity in the Local Transformations of Quantum and Classical States
A natural operational paradigm for distributed quantum and classical
information processing involves local operations coordinated by multiple rounds
of public communication. In this paper we consider the minimum number of
communication rounds needed to perform the locality-constrained task of
entanglement transformation and the analogous classical task of secrecy
manipulation. Specifically we address whether bipartite mixed entanglement can
always be converted into pure entanglement or whether unsecure classical
correlations can always be transformed into secret shared randomness using
local operations and a bounded number of communication exchanges. Our main
contribution in this paper is an explicit construction of quantum and classical
state transformations which, for any given , can be achieved using
rounds of classical communication exchanges but no fewer. Our results reveal
that highly complex communication protocols are indeed necessary to fully
harness the information-theoretic resources contained in general quantum and
classical states. The major technical contribution of this manuscript lies in
proving lower bounds for the required number of communication exchanges using
the notion of common information and various lemmas built upon it. We propose a
classical analog to the Schmidt rank of a bipartite quantum state which we call
the secrecy rank, and we show that it is a monotone under stochastic local
classical operations.Comment: Submitted to QIP 2017. Proof strategies have been streamlined and
differ from the submitted versio
Uncertainty, Monogamy, and Locking of Quantum Correlations
Squashed entanglement and entanglement of purification are quantum mechanical
correlation measures and defined as certain minimisations of entropic
quantities. We present the first non-trivial calculations of both quantities.
Our results lead to the conclusion that both measures can drop by an arbitrary
amount when only a single qubit of a local system is lost. This property is
known as "locking" and has previously been observed for other correlation
measures, such as the accessible information, entanglement cost and the
logarithmic negativity.
In the case of squashed entanglement, the results are obtained with the help
of an inequality that can be understood as a quantum channel analogue of
well-known entropic uncertainty relations. This inequality may prove a useful
tool in quantum information theory.
The regularised entanglement of purification is known to equal the
entanglement needed to prepare a many copies of quantum state by local
operations and a sublinear amount of communication. Here, monogamy of quantum
entanglement (i.e., the impossibility of a system being maximally entangled
with two others at the same time) leads to an exact calculation for all quantum
states that are supported either on the symmetric or on the antisymmetric
subspace of a dxd-dimensional system.Comment: 7 pages revtex4, no figures. v2 has improved presentation and a
couple of references adde
Distributed Channel Synthesis
Two familiar notions of correlation are rediscovered as the extreme operating
points for distributed synthesis of a discrete memoryless channel, in which a
stochastic channel output is generated based on a compressed description of the
channel input. Wyner's common information is the minimum description rate
needed. However, when common randomness independent of the input is available,
the necessary description rate reduces to Shannon's mutual information. This
work characterizes the optimal trade-off between the amount of common
randomness used and the required rate of description. We also include a number
of related derivations, including the effect of limited local randomness, rate
requirements for secrecy, applications to game theory, and new insights into
common information duality.
Our proof makes use of a soft covering lemma, known in the literature for its
role in quantifying the resolvability of a channel. The direct proof
(achievability) constructs a feasible joint distribution over all parts of the
system using a soft covering, from which the behavior of the encoder and
decoder is inferred, with no explicit reference to joint typicality or binning.
Of auxiliary interest, this work also generalizes and strengthens this soft
covering tool.Comment: To appear in IEEE Trans. on Information Theory (submitted Aug., 2012,
accepted July, 2013), 26 pages, using IEEEtran.cl
- …