3 research outputs found
Stronger Attacks on Causality-Based Key Agreement
Remarkably, it has been shown that in principle, security proofs for quantum
key-distribution (QKD) protocols can be independent of assumptions on the
devices used and even of the fact that the adversary is limited by quantum
theory. All that is required instead is the absence of any hidden information
flow between the laboratories, a condition that can be enforced either by
shielding or by space-time causality. All known schemes for such Causal Key
Distribution (CKD) that offer noise-tolerance (and, hence, must use privacy
amplification as a crucial step) require multiple devices carrying out
measurements in parallel on each end of the protocol, where the number of
devices grows with the desired level of security. We investigate the power of
the adversary for more practical schemes, where both parties each use a single
device carrying out measurements consecutively. We provide a novel construction
of attacks that is strictly more powerful than the best known attacks and has
the potential to decide the question whether such practical CKD schemes are
possible in the negative
No-signalling attacks and implications for (quantum) nonlocality distillation
The phenomenon of nonlocality, which can arise when entangled quantum systems are suitably measured, is perhaps one of the most puzzling features of quantum theory to the philosophical mind. It implies that these measurement statistics cannot be explained by hidden variables, as requested by Einstein, and it thus suggests that our universe may not be, in principle, a well-determined entity where the uncertainty we perceive in physical observations stems only from our lack of knowledge of the whole. Besides its philosophical impact, nonlocality is also a resource for information- theoretic tasks since it implies secrecy: If nonlocality limits the predictive power that any hidden variable (in the universe) can have about some observations, then it limits in particular the predictive power of a hidden variable held by an adversary in a cryptographic scenario. We investigate whether nonlocality alone can empower two parties to perform unconditionally secure communication in a feasible manner when only a provably minimal set of assumptions are made for such a task to be possible — independently of the validity of any physical theory (such as quantum theory). Nonlocality has also been of interest in the study of foundations of quantum theory and the principles that stand beyond its mathematical formalism. In an attempt to single out quantum theory within a broader set of theories, the study of nonlocality may help to point out intuitive principles that distinguish it from the rest. In theories where the limits by which quantum theory constrains the strength of nonlocality are surpassed, many “principles” on which an information theorist would rely on are shattered — one example is the hierarchy of communication complexity as the latter becomes completely trivial once a certain degree of nonlocality is overstepped. In order to study the structure of such super-quantum theories — beyond their aforementioned secrecy aspects — we investigate the phenomenon of distillation of nonlocality, the ability to distill stronger forms of nonlocality from weaker ones. By exploiting the inherent connection between nonlocality and secrecy, we provide a novel way of deriving bounds on nonlocality-distillation protocols through an ad
versarial view to the problem
Many-body entanglement: Permutations and equivalence classes
With an easily applicable criterion based on permutation symmetries of
(identically prepared) replicas of quantum states we identify distinct
entanglement classes in high-dimensional multi- partite systems. The different
symmetry properties of inequivalent states provide a rather intuitive picture
of the otherwise very abstract classification of many-body entangled states.Comment: 8 pages, 1 figur