5,241 research outputs found
Duality of privacy amplification against quantum adversaries and data compression with quantum side information
We show that the tasks of privacy amplification against quantum adversaries
and data compression with quantum side information are dual in the sense that
the ability to perform one implies the ability to perform the other. These are
two of the most important primitives in classical information theory, and are
shown to be connected by complementarity and the uncertainty principle in the
quantum setting. Applications include a new uncertainty principle formulated in
terms of smooth min- and max-entropies, as well as new conditions for
approximate quantum error correction.Comment: v2: Includes a derivation of an entropic uncertainty principle for
smooth min- and max-entropies. Discussion of the
Holevo-Schumacher-Westmoreland theorem remove
Comment on "Indispensable Finite Time Correlations for Fokker-Planck Equations from Time Series Data"
Comment on "Indispensable Finite Time Correlations for Fokker-Planck
Equations from Time Series Data"Comment: 2 pages, 1 figur
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing
We derive a bound for the security of QKD with finite resources under one-way
post-processing, based on a definition of security that is composable and has
an operational meaning. While our proof relies on the assumption of collective
attacks, unconditional security follows immediately for standard protocols like
Bennett-Brassard 1984 and six-states. For single-qubit implementations of such
protocols, we find that the secret key rate becomes positive when at least
N\sim 10^5 signals are exchanged and processed. For any other discrete-variable
protocol, unconditional security can be obtained using the exponential de
Finetti theorem, but the additional overhead leads to very pessimistic
estimates
Full security of quantum key distribution from no-signaling constraints
We analyze a cryptographic protocol for generating a distributed secret key
from correlations that violate a Bell inequality by a sufficient amount, and
prove its security against eavesdroppers, constrained only by the assumption
that any information accessible to them must be compatible with the
non-signaling principle. The claim holds with respect to the state-of-the-art
security definition used in cryptography, known as universally-composable
security. The non-signaling assumption only refers to the statistics of
measurement outcomes depending on the choices of measurements; hence security
is independent of the internal workings of the devices --- they do not even
need to follow the laws of quantum theory. This is relevant for practice as a
correct and complete modeling of realistic devices is generally impossible. The
techniques developed are general and can be applied to other Bell
inequality-based protocols. In particular, we provide a scheme for estimating
Bell-inequality violations when the samples are not independent and identically
distributed.Comment: 15 pages, 2 figur
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
Device independent quantum key distribution aims to provide a higher degree
of security than traditional QKD schemes by reducing the number of assumptions
that need to be made about the physical devices used. The previous proof of
security by Pironio et al. applies only to collective attacks where the state
is identical and independent and the measurement devices operate identically
for each trial in the protocol. We extend this result to a more general class
of attacks where the state is arbitrary and the measurement devices have no
memory. We accomplish this by a reduction of arbitrary adversary strategies to
qubit strategies and a proof of security for qubit strategies based on the
previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits
for clarit
Generalized Entropies
We study an entropy measure for quantum systems that generalizes the von
Neumann entropy as well as its classical counterpart, the Gibbs or Shannon
entropy. The entropy measure is based on hypothesis testing and has an elegant
formulation as a semidefinite program, a type of convex optimization. After
establishing a few basic properties, we prove upper and lower bounds in terms
of the smooth entropies, a family of entropy measures that is used to
characterize a wide range of operational quantities. From the formulation as a
semidefinite program, we also prove a result on decomposition of hypothesis
tests, which leads to a chain rule for the entropy.Comment: 21 page
Locking classical information
It is known that the maximum classical mutual information that can be
achieved between measurements on a pair of quantum systems can drastically
underestimate the quantum mutual information between those systems. In this
article, we quantify this distinction between classical and quantum information
by demonstrating that after removing a logarithmic-sized quantum system from
one half of a pair of perfectly correlated bitstrings, even the most sensitive
pair of measurements might only yield outcomes essentially independent of each
other. This effect is a form of information locking but the definition we use
is strictly stronger than those used previously. Moreover, we find that this
property is generic, in the sense that it occurs when removing a random
subsystem. As such, the effect might be relevant to statistical mechanics or
black hole physics. Previous work on information locking had always assumed a
uniform message. In this article, we assume only a min-entropy bound on the
message and also explore the effect of entanglement. We find that classical
information is strongly locked almost until it can be completely decoded. As a
cryptographic application of these results, we exhibit a quantum key
distribution protocol that is "secure" if the eavesdropper's information about
the secret key is measured using the accessible information but in which
leakage of even a logarithmic number of key bits compromises the secrecy of all
the others.Comment: 32 pages, 2 figure
The Uncertainty Principle in the Presence of Quantum Memory
The uncertainty principle, originally formulated by Heisenberg, dramatically
illustrates the difference between classical and quantum mechanics. The
principle bounds the uncertainties about the outcomes of two incompatible
measurements, such as position and momentum, on a particle. It implies that one
cannot predict the outcomes for both possible choices of measurement to
arbitrary precision, even if information about the preparation of the particle
is available in a classical memory. However, if the particle is prepared
entangled with a quantum memory, a device which is likely to soon be available,
it is possible to predict the outcomes for both measurement choices precisely.
In this work we strengthen the uncertainty principle to incorporate this case,
providing a lower bound on the uncertainties which depends on the amount of
entanglement between the particle and the quantum memory. We detail the
application of our result to witnessing entanglement and to quantum key
distribution.Comment: 5 pages plus 12 of supplementary information. Updated to match the
journal versio
- …