Bound entangled states with secret key and their classical counterpart

Size: px
Start display at page:

Download "Bound entangled states with secret key and their classical counterpart"

Transcription

1 Bound entangled states with secret key and their classical counterpart Māris Ozols Graeme Smith John Smolin February 6, 2014

2 A brief summary Main result A new construction of bound entangled states with secret key Steps involved 1. Understand what is the classical analogue of this 2. Construct a probability distribution P ABE that has the desired properties 3. Set ψ ABE = P ABE

3 A brief summary Main result A new construction of bound entangled states with secret key Steps involved 1. Understand what is the classical analogue of this 2. Construct a probability distribution P ABE that has the desired properties 3. Set ψ ABE = P ABE The significance of trash in cryptography

4 Shared entanglement and randomness Cryptographic and computational resource Alice Bob ρ AB

5 Shared entanglement and randomness Cryptographic and computational resource Joint state: ψ ABE or P ABE Eve Alice Bob ψ ABE

6 Shared entanglement and randomness Cryptographic and computational resource Joint state: ψ ABE or P ABE When is such resource useful? Eve Alice Bob ψ ABE

7 Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E

8 Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E P ABE = { KEY AB TRASH E 0 A 0 B w.p. 1/2 KEY AB = 1 A 1 B w.p. 1/2

9 Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E P ABE = { KEY AB TRASH E 0 A 0 B w.p. 1/2 KEY AB = 1 A 1 B w.p. 1/2 ψ ABE = KEY AB TRASH E KEY AB = 1 2 ( 00 AB + 11 AB

10 Distillation Eve Alice Bob ψ ABE

11 Distillation Eve LOCC.. Alice Bob ψ ABE

12 Distillation Eve LOCC.. Alice ψ ABE KEY k AB TRASH E Bob

13 Distillation Eve LOCC.. Alice KEY k ψ AB ABE TRASH E Bob Entanglement distillation rate 1 ( D( ψ ABE := lim # of KEY AB from ψ n n n ABE via LOCC

14 More distillation rates ψ ABE LOCC KEY AB P ABE LOPC KEY AB D( ψ ABE entanglement distillation rate K(P ABE key distillation rate

15 LOCC More distillation rates ψ ABE LOCC KEY AB P ABE LOPC KEY AB D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate

16 More distillation rates ψ ABE LOCC KEY AB = ( LOCC measure P ABE LOPC KEY AB = ( D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate

17 More distillation rates ψ ABE LOCC KEY AB = ( LOCC measure P ABE LOPC KEY AB = ( D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE

18 More distillation rates ψ ABE LOCC KEY AB = ( LOCC measure P ABE LOPC KEY AB = ( D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE Bound entanglement ψ ABE is entangled but D( ψ ABE = 0

19 More distillation rates ψ ABE LOCC KEY AB = ( LOCC measure P ABE LOPC KEY AB = ( D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE Bound entanglement ψ ABE is entangled but D( ψ ABE = 0 Private bound entanglement ψ ABE is bound entangled but K( ψ ABE > 0 [HHHO05]

20 Entanglement vs classical key A E B Compare T A ( Ψ 1 := AB + 11 AB ϕ TA T B φ E ( Ψ 2 := AB ϕ TA T B + 11 AB ϕ TA T B φ E T B

21 Entanglement vs classical key A E B Compare T A ( Ψ 1 := AB + 11 AB ϕ TA T B φ E ( Ψ 2 := AB ϕ TA T B + 11 AB ϕ TA T B φ E Observe If T A and T B are discarded, Ψ 1 contains a quantum KEY whereas Ψ 2 contains only a classical KEY T B

22 Entanglement vs classical key A E B Compare T A T B ( Ψ 1 := AB + 11 AB ϕ TA T B φ E ( Ψ 2 := AB ϕ TA T B + 11 AB ϕ TA T B φ E Observe If T A and T B are discarded, Ψ 1 contains a quantum KEY whereas Ψ 2 contains only a classical KEY Quantum KEY is immune against Eve accessing T A and T B (due to monogamy of entanglement

23 Distillation with remanent devices ψ ABE.. Alice Bob

24 Distillation with remanent devices ψ ABE.. Alice Bob Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key

25 Distillation with remanent devices φ TA T B E.. Alice Bob EPR AB Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key

26 Distillation with remanent devices φ TA T B E.. Alice Bob EPR AB Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key

27 Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( AB + 11 AB ϕ TA T B φ E ( AB + 11 AB ϕ TA T B φ E entangled key classical key? ( AB ϕ TA T B + 11 AB ϕ TA T B φ E ( AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B

28 Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( AB + 11 AB ϕ TA T B φ E ( AB + 11 AB ϕ TA T B φ E entangled key classical key? ( AB ϕ TA T B + 11 AB ϕ TA T B φ E ( AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness!

29 Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( AB + 11 AB ϕ TA T B φ E ( AB + 11 AB ϕ TA T B φ E entangled key classical key? ( AB ϕ TA T B + 11 AB ϕ TA T B φ E ( AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness! Classical analog of entanglement [CP02] is private randomness that is distilled on remanent devices

30 Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( AB + 11 AB ϕ TA T B φ E ( AB + 11 AB ϕ TA T B φ E entangled key classical key? ( AB ϕ TA T B + 11 AB ϕ TA T B φ E ( AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness! Classical analog of entanglement [CP02] is private randomness that is distilled on remanent devices This resource needs a new name...

31 cl[assical] en[t]anglement = enclanglement

32 Remanent devices Regular devices T A T B T A T B KEY AB D ψ ABE K KEY AB KEY AB D P ABE K KEY AB

33 Remanent devices Regular devices T A T B T A T B KEY AB D ψ ABE Private bound entanglement D( ψ ABE = 0 but K( ψ ABE > 0 K KEY AB KEY AB D P ABE Private bound enclanglement D(P ABE = 0 but K(P ABE > 0 K KEY AB

34 Main results Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0

35 Main results Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Corollaries 1. New construction of private bound entanglement 2. Noise helps in one-way classical key distillation

36 quant[um] + [class]ical = quantical

37 Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 Similar distributions have appeared in [OSW05, CEH + 07]

38 Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 If P ABE is quantical, we call ψ ABE := P ABE quantical too Similar distributions have appeared in [OSW05, CEH + 07]

39 Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 If P ABE is quantical, we call ψ ABE := P ABE quantical too Dual nature Quantical P ABE and ψ ABE describe the same entity Entropic quantities for P ABE and ψ ABE agree Quantical P ABE has a classical Schmidt decomposition w.r.t. any bipartition Similar distributions have appeared in [OSW05, CEH + 07]

40 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE

41 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one ψ ( 2 P U U ψ 2 U ( 2???

42 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol ψ ( 2 P U U ψ 2 U ( 2???

43 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol 3. Entropic quantities for P ABE and ψ ABE agree ψ ( 2 P U U ψ 2 U ( 2???

44 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol 3. Entropic quantities for P ABE and ψ ABE agree 4. Promoted protocol achieves the same rate ψ ( 2 P U U ψ 2 U ( 2???

45 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0

46 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant

47 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT

48 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea ( Choose P ABE so that ρ AB := Tr E ψ ψ ABE is PT-invariant ρab Γ = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0

49 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0 One-way distillable key: K(P ABE max A X [ I(X; B I(X; E ]

50 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0 One-way distillable key: K(P ABE max A X Choose X = 2 and do numerics [ I(X; B I(X; E ]

51 Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 01 AB x E + c 11 AB y E

52 Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 01 AB x E + c 11 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns

53 Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 11 AB x E + c 01 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns

54 Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 11 AB x E + c 01 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns PT-invariant Union of crosses Each cross has zero determinant

55 Recipe for quanticality and PT-invariance A 0 1 B 0 1 ( a 00 AB + b 11 AB x E + ( c 01 AB + d 10 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns PT-invariant Union of crosses Each cross has zero determinant

56 Example in B A P AB = D(P ABE = 0 but K(P ABE

57 Example in 4 4 A B o o K(P ABE Better than [HPHH08] K(P ABE

58 Example in B A K(P ABE

59 Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation

60 Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation Open questions How does our construction relate to [HHHO05]? Is the optimal protocol for distilling entanglement or key from a quantical state also quantical?

61 Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation Open questions How does our construction relate to [HHHO05]? Is the optimal protocol for distilling entanglement or key from a quantical state also quantical? Work in progress... Quantical mechanics and a classical analogue of superactivation (of the quantical capacity

62 That s it! Image: destroyed Guardian computer with Snowden files

63 Bibliography I [CEH + 07] [CP02] Matthias Christandl, Artur Ekert, Michał Horodecki, Paweł Horodecki, Jonathan Oppenheim, and Renato Renner. Unifying classical and quantum key distillation. In Salil P. Vadhan, editor, Theory of Cryptography, volume 4392 of Lecture Notes in Computer Science, pages Springer, arxiv:quant-ph/ , doi: / _25. Daniel Collins and Sandu Popescu. Classical analog of entanglement. Phys. Rev. A, 65(3:032321, Feb arxiv:quant-ph/ , doi: /physreva [HHHO05] Karol Horodecki, Michał Horodecki, Paweł Horodecki, and Jonathan Oppenheim. Secure key from bound entanglement. Phys. Rev. Lett., 94(16:160502, Apr arxiv:quant-ph/ , doi: /physrevlett

64 Bibliography II [HPHH08] [OSW05] [PBR12] [Spe07] Karol Horodecki, Łukasz Pankowski, Michał Horodecki, and Paweł Horodecki. Low-dimensional bound entanglement with one-way distillable cryptographic key. Information Theory, IEEE Transactions on, 54(6: , arxiv:quant-ph/ , doi: /tit Jonathan Oppenheim, Robert W. Spekkens, and Andreas Winter. A classical analogue of negative information arxiv:quant-ph/ Matthew F. Pusey, Jonathan Barrett, and Terry Rudolph. On the reality of the quantum state. Nature Physics, 8(6: , arxiv: , doi: /nphys2309. Robert W. Spekkens. Evidence for the epistemic view of quantum staappendices oftes: A toy theory. Phys. Rev. A, 75(3:032110, Mar arxiv:quant-ph/ , doi: /physreva

Squashed entanglement

Squashed entanglement Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication

More information

Limitations on Quantum Key Repeaters

Limitations on Quantum Key Repeaters Limitations on Quantum Key Repeaters Stefan Bäuml, Matthias Christandl, Karol Horodecki, and Andreas Winter (Dated: September 10, 2014) A major application of quantum communication is the distribution

More information

Degradable Quantum Channels

Degradable Quantum Channels Degradable Quantum Channels Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA May 27, 2010 References The capacity of a quantum channel for simultaneous transmission of classical

More information

Sending Quantum Information with Zero Capacity Channels

Sending Quantum Information with Zero Capacity Channels Sending Quantum Information with Zero Capacity Channels Graeme Smith IM Research KITP Quantum Information Science Program November 5, 2009 Joint work with Jon and John Noisy Channel Capacity X N Y p(y

More information

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key

More information

Fundamental rate-loss tradeoff for optical quantum key distribution

Fundamental rate-loss tradeoff for optical quantum key distribution Fundamental rate-loss tradeoff for optical quantum key distribution Masahiro Takeoka (NICT) Saikat Guha (BBN) Mark M. Wilde (LSU) Quantum Krispy Kreme Seminar @LSU January 30, 2015 Outline Motivation Main

More information

Entanglement Measures and Monotones Pt. 2

Entanglement Measures and Monotones Pt. 2 Entanglement Measures and Monotones Pt. 2 PHYS 500 - Southern Illinois University April 8, 2017 PHYS 500 - Southern Illinois University Entanglement Measures and Monotones Pt. 2 April 8, 2017 1 / 13 Entanglement

More information

Entanglement Measures and Monotones

Entanglement Measures and Monotones Entanglement Measures and Monotones PHYS 500 - Southern Illinois University March 30, 2017 PHYS 500 - Southern Illinois University Entanglement Measures and Monotones March 30, 2017 1 / 11 Quantifying

More information

Asymptotic Pure State Transformations

Asymptotic Pure State Transformations Asymptotic Pure State Transformations PHYS 500 - Southern Illinois University April 18, 2017 PHYS 500 - Southern Illinois University Asymptotic Pure State Transformations April 18, 2017 1 / 15 Entanglement

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

arxiv: v1 [quant-ph] 3 Jan 2008

arxiv: v1 [quant-ph] 3 Jan 2008 A paradigm for entanglement theory based on quantum communication Jonathan Oppenheim 1 1 Department of Applied Mathematics and Theoretical Physics, University of Cambridge U.K. arxiv:0801.0458v1 [quant-ph]

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

Distinguishing multi-partite states by local measurements

Distinguishing multi-partite states by local measurements Distinguishing multi-partite states by local measurements arxiv[quant-ph]:1206.2884 Ecole Polytechnique Paris / University of Bristol Cécilia Lancien / Andreas Winter AQIS 12 August 24 th 2012 Cécilia

More information

Uniformly Additive Entropic Formulas

Uniformly Additive Entropic Formulas Uniformly Additive Entropic Formulas Andrew Cross, Ke Li, Graeme Smith JILA and Department of Physics, University of Colorado Boulder QMATH2016 Georgia Tech October 9, 2016 Information theory: optimal

More information

Characterization of Bipartite Entanglement

Characterization of Bipartite Entanglement Characterization of Bipartite Entanglement Werner Vogel and Jan Sperling University of Rostock Germany Paraty, September 2009 Paraty, September 2009 UNIVERSITÄT ROSTOCK INSTITUT FÜR PHYSIK 1 Table of Contents

More information

Quantum Teleportation Pt. 3

Quantum Teleportation Pt. 3 Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation

More information

Quantum key distribution based on private states

Quantum key distribution based on private states Quantum key distribution based on private states Karol Horodecki (1), Michal Horodecki (1), Pawel Horodecki (2) Debbie Leung (3), Hoi-Kwong Lo (4) & Jonathan Oppenheim (5) (1) Univeristy of Gdańsk, Poland

More information

Bit-Commitment and Coin Flipping in a Device-Independent Setting

Bit-Commitment and Coin Flipping in a Device-Independent Setting Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

Converse bounds for private communication over quantum channels

Converse bounds for private communication over quantum channels Converse bounds for private communication over quantum channels Mark M. Wilde (LSU) joint work with Mario Berta (Caltech) and Marco Tomamichel ( Univ. Sydney + Univ. of Technology, Sydney ) arxiv:1602.08898

More information

Quantum Setting with Applications

Quantum Setting with Applications in the Quantum Setting with Applications Frédéric Dupuis 1 Serge Fehr 2 Philippe Lamontagne 3 Louis Salvail 3 2 CWI, Amsterdam, The Netherlands 1 Faculty of Informatics, Masaryk University, Brno, Czech

More information

Distinguishing multi-partite states by local measurements

Distinguishing multi-partite states by local measurements Distinguishing multi-partite states by local measurements Guillaume Aubrun / Andreas Winter Université Claude Bernard Lyon 1 / Universitat Autònoma de Barcelona Cécilia Lancien UCBL1 / UAB Madrid OA and

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Classical and Quantum Channel Simulations

Classical and Quantum Channel Simulations Classical and Quantum Channel Simulations Mario Berta (based on joint work with Fernando Brandão, Matthias Christandl, Renato Renner, Joseph Renes, Stephanie Wehner, Mark Wilde) Outline Classical Shannon

More information

On the complementary quantum capacity of the depolarizing channel

On the complementary quantum capacity of the depolarizing channel On the complementary quantum capacity of the depolarizing channel Debbie Leung 1 and John Watrous 1 Institute for Quantum Computing and Department of Combinatorics and Optimization, University of Waterloo

More information

Entanglement: Definition, Purification and measures

Entanglement: Definition, Purification and measures Entanglement: Definition, Purification and measures Seminar in Quantum Information processing 3683 Gili Bisker Physics Department Technion Spring 006 Gili Bisker Physics Department, Technion Introduction

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

On balance of information in bipartite quantum communication systems: entanglement-energy analogy

On balance of information in bipartite quantum communication systems: entanglement-energy analogy On balance of information in bipartite quantum communication systems: entanglement-energy analogy Ryszard Horodecki 1,, Micha l Horodecki 1, and Pawe l Horodecki 2, 1 Institute of Theoretical Physics and

More information

Optimal bounds for quantum bit commitment

Optimal bounds for quantum bit commitment Optimal bounds for quantum bit commitment André Chailloux LRI Université Paris-Sud andre.chailloux@gmail.fr Iordanis Kerenidis CNRS - LIAFA Université Paris 7 jkeren@liafa.jussieu.fr 1 Introduction Quantum

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

Theory of Quantum Entanglement

Theory of Quantum Entanglement Theory of Quantum Entanglement Shao-Ming Fei Capital Normal University, Beijing Universität Bonn, Bonn Richard Feynman 1980 Certain quantum mechanical effects cannot be simulated efficiently on a classical

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

Quantification of Gaussian quantum steering. Gerardo Adesso

Quantification of Gaussian quantum steering. Gerardo Adesso Quantification of Gaussian quantum steering Gerardo Adesso Outline Quantum steering Continuous variable systems Gaussian entanglement Gaussian steering Applications Steering timeline EPR paradox (1935)

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

arxiv:quant-ph/ v1 28 Oct 2003

arxiv:quant-ph/ v1 28 Oct 2003 Bell s inequalities detect efficient entanglement arxiv:quant-ph/03066 v 8 Oct 003 Antonio Acín, Nicolas Gisin, Lluis Masanes 3, Valerio Scarani Institut de Ciències Fotòniques, Barcelona, Spain. Group

More information

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis

More information

Quantum Key Distribution

Quantum Key Distribution Quantum Key Distribution QUT Mathematics Society September 2, 2015 Dr Douglas Stebila Outline 1. Qubits 2. Basic QKD BB84 3. Entanglement-based QKD 4. Classical processing 5. Authentication Security of

More information

Quantum Information Theory

Quantum Information Theory Quantum Information Theory C. H. Bennett IBM Research Yorktown QIS Workshop Vienna, VA 23 Apr 2009 Nature and importance of Information Distinctive features of Quantum Information Superposition principle,

More information

Instantaneous Nonlocal Measurements

Instantaneous Nonlocal Measurements Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.

More information

Which-way experiment with an internal degree of freedom

Which-way experiment with an internal degree of freedom Which-way experiment with an internal degree of freedom Konrad Banaszek Michał Karpiński Czesław Radzewicz University of Warsaw Paweł Horodecki Technical University of Gdańsk National Quantum Information

More information

arxiv: v2 [quant-ph] 10 Mar 2015

arxiv: v2 [quant-ph] 10 Mar 2015 Limitations on Quantum Key Repeaters Stefan Bäuml, 1,, Matthias Christandl, 3, Karol Horodecki, 4, 5, and Andreas Winter6,, 1, 1 Department of Mathematics, University of Bristol, Bristol BS8 1TW, UK Física

More information

Entropy Accumulation in Device-independent Protocols

Entropy Accumulation in Device-independent Protocols Entropy Accumulation in Device-independent Protocols QIP17 Seattle January 19, 2017 arxiv: 1607.01796 & 1607.01797 Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick Outline

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

Bell inequality for qunits with binary measurements

Bell inequality for qunits with binary measurements Bell inequality for qunits with binary measurements arxiv:quant-ph/0204122v1 21 Apr 2002 H. Bechmann-Pasquinucci and N. Gisin Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland

More information

Quantum Correlations as Necessary Precondition for Secure Communication

Quantum Correlations as Necessary Precondition for Secure Communication Quantum Correlations as Necessary Precondition for Secure Communication Phys. Rev. Lett. 92, 217903 (2004) quant-ph/0307151 Marcos Curty 1, Maciej Lewenstein 2, Norbert Lütkenhaus 1 1 Institut für Theoretische

More information

On the complementary quantum capacity of the depolarizing channel

On the complementary quantum capacity of the depolarizing channel On the complementary quantum capacity of the depolarizing channel Debbie Leung John Watrous 4 October, 15 Abstract The qubit depolarizing channel with noise parameter η transmits an input qubit perfectly

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Device-Independent Quantum Information Processing (DIQIP)

Device-Independent Quantum Information Processing (DIQIP) Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,

More information

arxiv: v7 [quant-ph] 20 Mar 2017

arxiv: v7 [quant-ph] 20 Mar 2017 Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantumness versus Classicality of Quantum States Berry Groisman 1, Dan Kenigsberg 2 and Tal Mor 2 1. Centre for Quantum Computation, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Compression and entanglement, entanglement transformations

Compression and entanglement, entanglement transformations PHYSICS 491: Symmetry and Quantum Information April 27, 2017 Compression and entanglement, entanglement transformations Lecture 8 Michael Walter, Stanford University These lecture notes are not proof-read

More information

Entropy in Classical and Quantum Information Theory

Entropy in Classical and Quantum Information Theory Entropy in Classical and Quantum Information Theory William Fedus Physics Department, University of California, San Diego. Entropy is a central concept in both classical and quantum information theory,

More information

Secrecy and the Quantum

Secrecy and the Quantum Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and

More information

Bound Information: The Classical Analog to Bound Quantum Entanglement

Bound Information: The Classical Analog to Bound Quantum Entanglement Bound Information: The Classical Analog to Bound Quantum Entanglement Nicolas Gisin, Renato Renner and Stefan Wolf Abstract. It was recently pointed out that there is a close connection between information-theoretic

More information

arxiv: v1 [quant-ph] 28 May 2011

arxiv: v1 [quant-ph] 28 May 2011 Detection of Multiparticle Entanglement: Quantifying the Search for Symmetric Extensions Fernando G.S.L. Brandão 1 and Matthias Christandl 2 1 Departamento de Física, Universidade Federal de Minas Gerais,

More information

Research Staff Member, Physical Sciences, IBM TJ Watson Research Center,

Research Staff Member, Physical Sciences, IBM TJ Watson Research Center, Graeme Smith JILA 440 UCB Boulder CO 80309 Office: (303) 492-1031 Email: gsbsmith@gmail.com Employment Assistant Professor of Physics, University of Colorado, Boulder, 2016 Associate Fellow, JILA, 2016

More information

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Coherence of Assistance and Regularized Coherence of Assistance by Ming-Jing Zhao, Teng Ma, and Shao-Ming Fei Preprint no.: 14 2018

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

Single-Particle Interference Can Witness Bipartite Entanglement

Single-Particle Interference Can Witness Bipartite Entanglement Single-Particle Interference Can Witness ipartite Entanglement Torsten Scholak 1 3 Florian Mintert 2 3 Cord. Müller 1 1 2 3 March 13, 2008 Introduction Proposal Quantum Optics Scenario Motivation Definitions

More information

Quantum sampling of mixed states

Quantum sampling of mixed states Quantum sampling of mixed states Philippe Lamontagne January 7th Philippe Lamontagne Quantum sampling of mixed states January 7th 1 / 9 The setup Philippe Lamontagne Quantum sampling of mixed states January

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Group representations and quantum information theory. Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007

Group representations and quantum information theory. Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007 Group representations and quantum information theory Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007 outline Types in classical information theory A quantum analogue: Schur duality Joint types Applications

More information

Thermodynamics beyond free energy relations or Quantum Quantum Thermodynamics. Matteo Lostaglio Imperial College London

Thermodynamics beyond free energy relations or Quantum Quantum Thermodynamics. Matteo Lostaglio Imperial College London Thermodynamics beyond free energy relations or Quantum Quantum Thermodynamics Matteo Lostaglio Imperial College London David Jennings Kamil Korzekwa This is wind, he is actually slim Terry Rudolph What

More information

Other Topics in Quantum Information

Other Topics in Quantum Information p. 1/23 Other Topics in Quantum Information In a course like this there is only a limited time, and only a limited number of topics can be covered. Some additional topics will be covered in the class projects.

More information

Lecture Notes. Quantum Cryptography Week 2: The Power of Entanglement

Lecture Notes. Quantum Cryptography Week 2: The Power of Entanglement Lecture Notes Quantum Cryptography Week : The Power of Entanglement This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Licence. Contents.1 Entanglement

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

arxiv: v1 [quant-ph] 2 Jun 2010

arxiv: v1 [quant-ph] 2 Jun 2010 Contextuality offers device-independent security Karol Horodecki 1,2, Michał Horodecki 3,2, Paweł Horodecki 4,2, Ryszard Horodecki 3,2, Marcin Pawłowski 3,2 and Mohamed Bourennane 5 1 Institute of Informatics,

More information

Lecture: Quantum Information

Lecture: Quantum Information Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers

More information

Maximal Entanglement A New Measure of Entanglement

Maximal Entanglement A New Measure of Entanglement 1 Maximal Entanglement A New Measure of Entanglement Salman Beigi School of Mathematics, Institute for Research in Fundamental Sciences IPM, Tehran, Iran arxiv:1405.50v1 [quant-ph] 11 May 014 Abstract

More information

On PPT States in C K C M C N Composite Quantum Systems

On PPT States in C K C M C N Composite Quantum Systems Commun. Theor. Phys. (Beijing, China) 42 (2004) pp. 25 222 c International Academic Publishers Vol. 42, No. 2, August 5, 2004 On PPT States in C K C M C N Composite Quantum Systems WANG Xiao-Hong, FEI

More information

arxiv: v1 [quant-ph] 1 Jul 2013

arxiv: v1 [quant-ph] 1 Jul 2013 Quantum enigma machines arxiv:1307.0380v1 [quant-ph] 1 Jul 2013 Seth Lloyd Department of Mechanical Engineering Massachusetts Institute of Technology MIT 3-160, Cambridge MA, 02139, USA Abstract: Enigma

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

CS120, Quantum Cryptography, Fall 2016

CS120, Quantum Cryptography, Fall 2016 CS10, Quantum Cryptography, Fall 016 Homework # due: 10:9AM, October 18th, 016 Ground rules: Your homework should be submitted to the marked bins that will be by Annenberg 41. Please format your solutions

More information

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Probabilistic exact cloning and probabilistic no-signalling. Abstract Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Entanglement and non-locality of pure quantum states

Entanglement and non-locality of pure quantum states MSc in Photonics Universitat Politècnica de Catalunya (UPC) Universitat Autònoma de Barcelona (UAB) Universitat de Barcelona (UB) Institut de Ciències Fotòniques (ICFO) PHOTONICSBCN http://www.photonicsbcn.eu

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

Lecture 14: Quantum information revisited

Lecture 14: Quantum information revisited CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 4: Quantum information revisited March 4, 006 So far, this course has focused almost entirely on quantum algorithms The next

More information

Local cloning of entangled states

Local cloning of entangled states Local cloning of entangled states Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. March 16, 2010 Vlad Gheorghiu (CMU) Local cloning of entangled states March

More information

arxiv:quant-ph/ May 2002

arxiv:quant-ph/ May 2002 Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of

More information

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G. Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G. Kwiat Physics 403 talk: December 2, 2014 Entanglement is a feature of compound

More information

Unconditionally secure deviceindependent

Unconditionally secure deviceindependent Unconditionally secure deviceindependent quantum key distribution with only two devices Roger Colbeck (ETH Zurich) Based on joint work with Jon Barrett and Adrian Kent Physical Review A 86, 062326 (2012)

More information

arxiv: v2 [quant-ph] 21 Oct 2013

arxiv: v2 [quant-ph] 21 Oct 2013 Genuine hidden quantum nonlocality Flavien Hirsch, 1 Marco Túlio Quintino, 1 Joseph Bowles, 1 and Nicolas Brunner 1, 1 Département de Physique Théorique, Université de Genève, 111 Genève, Switzerland H.H.

More information

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

Ph 219/CS 219. Exercises Due: Friday 20 October 2006 1 Ph 219/CS 219 Exercises Due: Friday 20 October 2006 1.1 How far apart are two quantum states? Consider two quantum states described by density operators ρ and ρ in an N-dimensional Hilbert space, and

More information

Quantum Technologies for Cryptography

Quantum Technologies for Cryptography University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms

More information

arxiv: v3 [quant-ph] 5 Jun 2015

arxiv: v3 [quant-ph] 5 Jun 2015 Entanglement and swap of quantum states in two qubits Takaya Ikuto and Satoshi Ishizaka Graduate School of Integrated Arts and Sciences, Hiroshima University, Higashihiroshima, 739-8521, Japan (Dated:

More information

Private quantum subsystems and error correction

Private quantum subsystems and error correction Private quantum subsystems and error correction Sarah Plosker Department of Mathematics and Computer Science Brandon University September 26, 2014 Outline 1 Classical Versus Quantum Setting Classical Setting

More information

PERFECTLY secure key agreement has been studied recently

PERFECTLY secure key agreement has been studied recently IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract

More information

arxiv:quant-ph/ v2 17 Sep 2002

arxiv:quant-ph/ v2 17 Sep 2002 Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

CS/Ph120 Homework 4 Solutions

CS/Ph120 Homework 4 Solutions CS/Ph10 Homework 4 Solutions November 3, 016 Problem 1: Robustness of GHZ and W states, part Solution: Due to Bolton Bailey a For the GHZ state, we have T r N GHZ N GHZ N = 1 0 N 1 0 N 1 + 1 N 1 1 N 1

More information

arxiv:quant-ph/ v1 9 May 2005

arxiv:quant-ph/ v1 9 May 2005 Quantum information can be negative Michal Horodecki 1, Jonathan Oppenheim & Andreas Winter 3 1 Institute of Theoretical Physics and Astrophysics, University of Gdańsk, 80 95 Gdańsk, Poland Department

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information