Bound entangled states with secret key and their classical counterpart
|
|
- Amber Jackson
- 5 years ago
- Views:
Transcription
1 Bound entangled states with secret key and their classical counterpart Māris Ozols Graeme Smith John Smolin February 6, 2014
2 A brief summary Main result A new construction of bound entangled states with secret key Steps involved 1. Understand what is the classical analogue of this 2. Construct a probability distribution P ABE that has the desired properties 3. Set ψ ABE = P ABE
3 A brief summary Main result A new construction of bound entangled states with secret key Steps involved 1. Understand what is the classical analogue of this 2. Construct a probability distribution P ABE that has the desired properties 3. Set ψ ABE = P ABE The significance of trash in cryptography
4 Shared entanglement and randomness Cryptographic and computational resource Alice Bob ρ AB
5 Shared entanglement and randomness Cryptographic and computational resource Joint state: ψ ABE or P ABE Eve Alice Bob ψ ABE
6 Shared entanglement and randomness Cryptographic and computational resource Joint state: ψ ABE or P ABE When is such resource useful? Eve Alice Bob ψ ABE
7 Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E
8 Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E P ABE = { KEY AB TRASH E 0 A 0 B w.p. 1/2 KEY AB = 1 A 1 B w.p. 1/2
9 Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E P ABE = { KEY AB TRASH E 0 A 0 B w.p. 1/2 KEY AB = 1 A 1 B w.p. 1/2 ψ ABE = KEY AB TRASH E KEY AB = 1 2 ( 00 AB + 11 AB
10 Distillation Eve Alice Bob ψ ABE
11 Distillation Eve LOCC.. Alice Bob ψ ABE
12 Distillation Eve LOCC.. Alice ψ ABE KEY k AB TRASH E Bob
13 Distillation Eve LOCC.. Alice KEY k ψ AB ABE TRASH E Bob Entanglement distillation rate 1 ( D( ψ ABE := lim # of KEY AB from ψ n n n ABE via LOCC
14 More distillation rates ψ ABE LOCC KEY AB P ABE LOPC KEY AB D( ψ ABE entanglement distillation rate K(P ABE key distillation rate
15 LOCC More distillation rates ψ ABE LOCC KEY AB P ABE LOPC KEY AB D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate
16 More distillation rates ψ ABE LOCC KEY AB = ( LOCC measure P ABE LOPC KEY AB = ( D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate
17 More distillation rates ψ ABE LOCC KEY AB = ( LOCC measure P ABE LOPC KEY AB = ( D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE
18 More distillation rates ψ ABE LOCC KEY AB = ( LOCC measure P ABE LOPC KEY AB = ( D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE Bound entanglement ψ ABE is entangled but D( ψ ABE = 0
19 More distillation rates ψ ABE LOCC KEY AB = ( LOCC measure P ABE LOPC KEY AB = ( D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE Bound entanglement ψ ABE is entangled but D( ψ ABE = 0 Private bound entanglement ψ ABE is bound entangled but K( ψ ABE > 0 [HHHO05]
20 Entanglement vs classical key A E B Compare T A ( Ψ 1 := AB + 11 AB ϕ TA T B φ E ( Ψ 2 := AB ϕ TA T B + 11 AB ϕ TA T B φ E T B
21 Entanglement vs classical key A E B Compare T A ( Ψ 1 := AB + 11 AB ϕ TA T B φ E ( Ψ 2 := AB ϕ TA T B + 11 AB ϕ TA T B φ E Observe If T A and T B are discarded, Ψ 1 contains a quantum KEY whereas Ψ 2 contains only a classical KEY T B
22 Entanglement vs classical key A E B Compare T A T B ( Ψ 1 := AB + 11 AB ϕ TA T B φ E ( Ψ 2 := AB ϕ TA T B + 11 AB ϕ TA T B φ E Observe If T A and T B are discarded, Ψ 1 contains a quantum KEY whereas Ψ 2 contains only a classical KEY Quantum KEY is immune against Eve accessing T A and T B (due to monogamy of entanglement
23 Distillation with remanent devices ψ ABE.. Alice Bob
24 Distillation with remanent devices ψ ABE.. Alice Bob Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key
25 Distillation with remanent devices φ TA T B E.. Alice Bob EPR AB Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key
26 Distillation with remanent devices φ TA T B E.. Alice Bob EPR AB Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key
27 Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( AB + 11 AB ϕ TA T B φ E ( AB + 11 AB ϕ TA T B φ E entangled key classical key? ( AB ϕ TA T B + 11 AB ϕ TA T B φ E ( AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B
28 Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( AB + 11 AB ϕ TA T B φ E ( AB + 11 AB ϕ TA T B φ E entangled key classical key? ( AB ϕ TA T B + 11 AB ϕ TA T B φ E ( AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness!
29 Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( AB + 11 AB ϕ TA T B φ E ( AB + 11 AB ϕ TA T B φ E entangled key classical key? ( AB ϕ TA T B + 11 AB ϕ TA T B φ E ( AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness! Classical analog of entanglement [CP02] is private randomness that is distilled on remanent devices
30 Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( AB + 11 AB ϕ TA T B φ E ( AB + 11 AB ϕ TA T B φ E entangled key classical key? ( AB ϕ TA T B + 11 AB ϕ TA T B φ E ( AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness! Classical analog of entanglement [CP02] is private randomness that is distilled on remanent devices This resource needs a new name...
31 cl[assical] en[t]anglement = enclanglement
32 Remanent devices Regular devices T A T B T A T B KEY AB D ψ ABE K KEY AB KEY AB D P ABE K KEY AB
33 Remanent devices Regular devices T A T B T A T B KEY AB D ψ ABE Private bound entanglement D( ψ ABE = 0 but K( ψ ABE > 0 K KEY AB KEY AB D P ABE Private bound enclanglement D(P ABE = 0 but K(P ABE > 0 K KEY AB
34 Main results Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0
35 Main results Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Corollaries 1. New construction of private bound entanglement 2. Noise helps in one-way classical key distillation
36 quant[um] + [class]ical = quantical
37 Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 Similar distributions have appeared in [OSW05, CEH + 07]
38 Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 If P ABE is quantical, we call ψ ABE := P ABE quantical too Similar distributions have appeared in [OSW05, CEH + 07]
39 Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 If P ABE is quantical, we call ψ ABE := P ABE quantical too Dual nature Quantical P ABE and ψ ABE describe the same entity Entropic quantities for P ABE and ψ ABE agree Quantical P ABE has a classical Schmidt decomposition w.r.t. any bipartition Similar distributions have appeared in [OSW05, CEH + 07]
40 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE
41 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one ψ ( 2 P U U ψ 2 U ( 2???
42 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol ψ ( 2 P U U ψ 2 U ( 2???
43 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol 3. Entropic quantities for P ABE and ψ ABE agree ψ ( 2 P U U ψ 2 U ( 2???
44 Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol 3. Entropic quantities for P ABE and ψ ABE agree 4. Promoted protocol achieves the same rate ψ ( 2 P U U ψ 2 U ( 2???
45 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0
46 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant
47 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT
48 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea ( Choose P ABE so that ρ AB := Tr E ψ ψ ABE is PT-invariant ρab Γ = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0
49 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0 One-way distillable key: K(P ABE max A X [ I(X; B I(X; E ]
50 Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0 One-way distillable key: K(P ABE max A X Choose X = 2 and do numerics [ I(X; B I(X; E ]
51 Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 01 AB x E + c 11 AB y E
52 Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 01 AB x E + c 11 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns
53 Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 11 AB x E + c 01 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns
54 Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 11 AB x E + c 01 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns PT-invariant Union of crosses Each cross has zero determinant
55 Recipe for quanticality and PT-invariance A 0 1 B 0 1 ( a 00 AB + b 11 AB x E + ( c 01 AB + d 10 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns PT-invariant Union of crosses Each cross has zero determinant
56 Example in B A P AB = D(P ABE = 0 but K(P ABE
57 Example in 4 4 A B o o K(P ABE Better than [HPHH08] K(P ABE
58 Example in B A K(P ABE
59 Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation
60 Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation Open questions How does our construction relate to [HHHO05]? Is the optimal protocol for distilling entanglement or key from a quantical state also quantical?
61 Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation Open questions How does our construction relate to [HHHO05]? Is the optimal protocol for distilling entanglement or key from a quantical state also quantical? Work in progress... Quantical mechanics and a classical analogue of superactivation (of the quantical capacity
62 That s it! Image: destroyed Guardian computer with Snowden files
63 Bibliography I [CEH + 07] [CP02] Matthias Christandl, Artur Ekert, Michał Horodecki, Paweł Horodecki, Jonathan Oppenheim, and Renato Renner. Unifying classical and quantum key distillation. In Salil P. Vadhan, editor, Theory of Cryptography, volume 4392 of Lecture Notes in Computer Science, pages Springer, arxiv:quant-ph/ , doi: / _25. Daniel Collins and Sandu Popescu. Classical analog of entanglement. Phys. Rev. A, 65(3:032321, Feb arxiv:quant-ph/ , doi: /physreva [HHHO05] Karol Horodecki, Michał Horodecki, Paweł Horodecki, and Jonathan Oppenheim. Secure key from bound entanglement. Phys. Rev. Lett., 94(16:160502, Apr arxiv:quant-ph/ , doi: /physrevlett
64 Bibliography II [HPHH08] [OSW05] [PBR12] [Spe07] Karol Horodecki, Łukasz Pankowski, Michał Horodecki, and Paweł Horodecki. Low-dimensional bound entanglement with one-way distillable cryptographic key. Information Theory, IEEE Transactions on, 54(6: , arxiv:quant-ph/ , doi: /tit Jonathan Oppenheim, Robert W. Spekkens, and Andreas Winter. A classical analogue of negative information arxiv:quant-ph/ Matthew F. Pusey, Jonathan Barrett, and Terry Rudolph. On the reality of the quantum state. Nature Physics, 8(6: , arxiv: , doi: /nphys2309. Robert W. Spekkens. Evidence for the epistemic view of quantum staappendices oftes: A toy theory. Phys. Rev. A, 75(3:032110, Mar arxiv:quant-ph/ , doi: /physreva
Squashed entanglement
Squashed Entanglement based on Squashed Entanglement - An Additive Entanglement Measure (M. Christandl, A. Winter, quant-ph/0308088), and A paradigm for entanglement theory based on quantum communication
More informationLimitations on Quantum Key Repeaters
Limitations on Quantum Key Repeaters Stefan Bäuml, Matthias Christandl, Karol Horodecki, and Andreas Winter (Dated: September 10, 2014) A major application of quantum communication is the distribution
More informationDegradable Quantum Channels
Degradable Quantum Channels Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA May 27, 2010 References The capacity of a quantum channel for simultaneous transmission of classical
More informationSending Quantum Information with Zero Capacity Channels
Sending Quantum Information with Zero Capacity Channels Graeme Smith IM Research KITP Quantum Information Science Program November 5, 2009 Joint work with Jon and John Noisy Channel Capacity X N Y p(y
More informationAsymptotic Analysis of a Three State Quantum Cryptographic Protocol
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key
More informationFundamental rate-loss tradeoff for optical quantum key distribution
Fundamental rate-loss tradeoff for optical quantum key distribution Masahiro Takeoka (NICT) Saikat Guha (BBN) Mark M. Wilde (LSU) Quantum Krispy Kreme Seminar @LSU January 30, 2015 Outline Motivation Main
More informationEntanglement Measures and Monotones Pt. 2
Entanglement Measures and Monotones Pt. 2 PHYS 500 - Southern Illinois University April 8, 2017 PHYS 500 - Southern Illinois University Entanglement Measures and Monotones Pt. 2 April 8, 2017 1 / 13 Entanglement
More informationEntanglement Measures and Monotones
Entanglement Measures and Monotones PHYS 500 - Southern Illinois University March 30, 2017 PHYS 500 - Southern Illinois University Entanglement Measures and Monotones March 30, 2017 1 / 11 Quantifying
More informationAsymptotic Pure State Transformations
Asymptotic Pure State Transformations PHYS 500 - Southern Illinois University April 18, 2017 PHYS 500 - Southern Illinois University Asymptotic Pure State Transformations April 18, 2017 1 / 15 Entanglement
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationarxiv: v1 [quant-ph] 3 Jan 2008
A paradigm for entanglement theory based on quantum communication Jonathan Oppenheim 1 1 Department of Applied Mathematics and Theoretical Physics, University of Cambridge U.K. arxiv:0801.0458v1 [quant-ph]
More informationQuantum Cryptography
http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.
More informationDistinguishing multi-partite states by local measurements
Distinguishing multi-partite states by local measurements arxiv[quant-ph]:1206.2884 Ecole Polytechnique Paris / University of Bristol Cécilia Lancien / Andreas Winter AQIS 12 August 24 th 2012 Cécilia
More informationUniformly Additive Entropic Formulas
Uniformly Additive Entropic Formulas Andrew Cross, Ke Li, Graeme Smith JILA and Department of Physics, University of Colorado Boulder QMATH2016 Georgia Tech October 9, 2016 Information theory: optimal
More informationCharacterization of Bipartite Entanglement
Characterization of Bipartite Entanglement Werner Vogel and Jan Sperling University of Rostock Germany Paraty, September 2009 Paraty, September 2009 UNIVERSITÄT ROSTOCK INSTITUT FÜR PHYSIK 1 Table of Contents
More informationQuantum Teleportation Pt. 3
Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation
More informationQuantum key distribution based on private states
Quantum key distribution based on private states Karol Horodecki (1), Michal Horodecki (1), Pawel Horodecki (2) Debbie Leung (3), Hoi-Kwong Lo (4) & Jonathan Oppenheim (5) (1) Univeristy of Gdańsk, Poland
More informationBit-Commitment and Coin Flipping in a Device-Independent Setting
Bit-Commitment and Coin Flipping in a Device-Independent Setting J. Silman Université Libre de Bruxelles Joint work with: A. Chailloux & I. Kerenidis (LIAFA), N. Aharon (TAU), S. Pironio & S. Massar (ULB).
More informationarxiv:quant-ph/ v1 13 Jan 2003
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationConverse bounds for private communication over quantum channels
Converse bounds for private communication over quantum channels Mark M. Wilde (LSU) joint work with Mario Berta (Caltech) and Marco Tomamichel ( Univ. Sydney + Univ. of Technology, Sydney ) arxiv:1602.08898
More informationQuantum Setting with Applications
in the Quantum Setting with Applications Frédéric Dupuis 1 Serge Fehr 2 Philippe Lamontagne 3 Louis Salvail 3 2 CWI, Amsterdam, The Netherlands 1 Faculty of Informatics, Masaryk University, Brno, Czech
More informationDistinguishing multi-partite states by local measurements
Distinguishing multi-partite states by local measurements Guillaume Aubrun / Andreas Winter Université Claude Bernard Lyon 1 / Universitat Autònoma de Barcelona Cécilia Lancien UCBL1 / UAB Madrid OA and
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationClassical and Quantum Channel Simulations
Classical and Quantum Channel Simulations Mario Berta (based on joint work with Fernando Brandão, Matthias Christandl, Renato Renner, Joseph Renes, Stephanie Wehner, Mark Wilde) Outline Classical Shannon
More informationOn the complementary quantum capacity of the depolarizing channel
On the complementary quantum capacity of the depolarizing channel Debbie Leung 1 and John Watrous 1 Institute for Quantum Computing and Department of Combinatorics and Optimization, University of Waterloo
More informationEntanglement: Definition, Purification and measures
Entanglement: Definition, Purification and measures Seminar in Quantum Information processing 3683 Gili Bisker Physics Department Technion Spring 006 Gili Bisker Physics Department, Technion Introduction
More informationQuantum Key Distribution. The Starting Point
Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated
More informationOn balance of information in bipartite quantum communication systems: entanglement-energy analogy
On balance of information in bipartite quantum communication systems: entanglement-energy analogy Ryszard Horodecki 1,, Micha l Horodecki 1, and Pawe l Horodecki 2, 1 Institute of Theoretical Physics and
More informationOptimal bounds for quantum bit commitment
Optimal bounds for quantum bit commitment André Chailloux LRI Université Paris-Sud andre.chailloux@gmail.fr Iordanis Kerenidis CNRS - LIAFA Université Paris 7 jkeren@liafa.jussieu.fr 1 Introduction Quantum
More informationSecurity of Quantum Key Distribution with Imperfect Devices
Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo
More informationTheory of Quantum Entanglement
Theory of Quantum Entanglement Shao-Ming Fei Capital Normal University, Beijing Universität Bonn, Bonn Richard Feynman 1980 Certain quantum mechanical effects cannot be simulated efficiently on a classical
More informationTransmitting and Hiding Quantum Information
2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents
More informationQuantification of Gaussian quantum steering. Gerardo Adesso
Quantification of Gaussian quantum steering Gerardo Adesso Outline Quantum steering Continuous variable systems Gaussian entanglement Gaussian steering Applications Steering timeline EPR paradox (1935)
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationarxiv:quant-ph/ v1 28 Oct 2003
Bell s inequalities detect efficient entanglement arxiv:quant-ph/03066 v 8 Oct 003 Antonio Acín, Nicolas Gisin, Lluis Masanes 3, Valerio Scarani Institut de Ciències Fotòniques, Barcelona, Spain. Group
More informationTeleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis
More informationQuantum Key Distribution
Quantum Key Distribution QUT Mathematics Society September 2, 2015 Dr Douglas Stebila Outline 1. Qubits 2. Basic QKD BB84 3. Entanglement-based QKD 4. Classical processing 5. Authentication Security of
More informationQuantum Information Theory
Quantum Information Theory C. H. Bennett IBM Research Yorktown QIS Workshop Vienna, VA 23 Apr 2009 Nature and importance of Information Distinctive features of Quantum Information Superposition principle,
More informationInstantaneous Nonlocal Measurements
Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.
More informationWhich-way experiment with an internal degree of freedom
Which-way experiment with an internal degree of freedom Konrad Banaszek Michał Karpiński Czesław Radzewicz University of Warsaw Paweł Horodecki Technical University of Gdańsk National Quantum Information
More informationarxiv: v2 [quant-ph] 10 Mar 2015
Limitations on Quantum Key Repeaters Stefan Bäuml, 1,, Matthias Christandl, 3, Karol Horodecki, 4, 5, and Andreas Winter6,, 1, 1 Department of Mathematics, University of Bristol, Bristol BS8 1TW, UK Física
More informationEntropy Accumulation in Device-independent Protocols
Entropy Accumulation in Device-independent Protocols QIP17 Seattle January 19, 2017 arxiv: 1607.01796 & 1607.01797 Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick Outline
More informationQuantum Information Processing and Diagrams of States
Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University
More informationBell inequality for qunits with binary measurements
Bell inequality for qunits with binary measurements arxiv:quant-ph/0204122v1 21 Apr 2002 H. Bechmann-Pasquinucci and N. Gisin Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland
More informationQuantum Correlations as Necessary Precondition for Secure Communication
Quantum Correlations as Necessary Precondition for Secure Communication Phys. Rev. Lett. 92, 217903 (2004) quant-ph/0307151 Marcos Curty 1, Maciej Lewenstein 2, Norbert Lütkenhaus 1 1 Institut für Theoretische
More informationOn the complementary quantum capacity of the depolarizing channel
On the complementary quantum capacity of the depolarizing channel Debbie Leung John Watrous 4 October, 15 Abstract The qubit depolarizing channel with noise parameter η transmits an input qubit perfectly
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationDevice-Independent Quantum Information Processing (DIQIP)
Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,
More informationarxiv: v7 [quant-ph] 20 Mar 2017
Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantumness versus Classicality of Quantum States Berry Groisman 1, Dan Kenigsberg 2 and Tal Mor 2 1. Centre for Quantum Computation, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationCompression and entanglement, entanglement transformations
PHYSICS 491: Symmetry and Quantum Information April 27, 2017 Compression and entanglement, entanglement transformations Lecture 8 Michael Walter, Stanford University These lecture notes are not proof-read
More informationEntropy in Classical and Quantum Information Theory
Entropy in Classical and Quantum Information Theory William Fedus Physics Department, University of California, San Diego. Entropy is a central concept in both classical and quantum information theory,
More informationSecrecy and the Quantum
Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and
More informationBound Information: The Classical Analog to Bound Quantum Entanglement
Bound Information: The Classical Analog to Bound Quantum Entanglement Nicolas Gisin, Renato Renner and Stefan Wolf Abstract. It was recently pointed out that there is a close connection between information-theoretic
More informationarxiv: v1 [quant-ph] 28 May 2011
Detection of Multiparticle Entanglement: Quantifying the Search for Symmetric Extensions Fernando G.S.L. Brandão 1 and Matthias Christandl 2 1 Departamento de Física, Universidade Federal de Minas Gerais,
More informationResearch Staff Member, Physical Sciences, IBM TJ Watson Research Center,
Graeme Smith JILA 440 UCB Boulder CO 80309 Office: (303) 492-1031 Email: gsbsmith@gmail.com Employment Assistant Professor of Physics, University of Colorado, Boulder, 2016 Associate Fellow, JILA, 2016
More informationMax-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig
Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig Coherence of Assistance and Regularized Coherence of Assistance by Ming-Jing Zhao, Teng Ma, and Shao-Ming Fei Preprint no.: 14 2018
More informationPractical quantum-key. key- distribution post-processing
Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert
More informationSingle-Particle Interference Can Witness Bipartite Entanglement
Single-Particle Interference Can Witness ipartite Entanglement Torsten Scholak 1 3 Florian Mintert 2 3 Cord. Müller 1 1 2 3 March 13, 2008 Introduction Proposal Quantum Optics Scenario Motivation Definitions
More informationQuantum sampling of mixed states
Quantum sampling of mixed states Philippe Lamontagne January 7th Philippe Lamontagne Quantum sampling of mixed states January 7th 1 / 9 The setup Philippe Lamontagne Quantum sampling of mixed states January
More information9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.
9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance
More informationGroup representations and quantum information theory. Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007
Group representations and quantum information theory Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007 outline Types in classical information theory A quantum analogue: Schur duality Joint types Applications
More informationThermodynamics beyond free energy relations or Quantum Quantum Thermodynamics. Matteo Lostaglio Imperial College London
Thermodynamics beyond free energy relations or Quantum Quantum Thermodynamics Matteo Lostaglio Imperial College London David Jennings Kamil Korzekwa This is wind, he is actually slim Terry Rudolph What
More informationOther Topics in Quantum Information
p. 1/23 Other Topics in Quantum Information In a course like this there is only a limited time, and only a limited number of topics can be covered. Some additional topics will be covered in the class projects.
More informationLecture Notes. Quantum Cryptography Week 2: The Power of Entanglement
Lecture Notes Quantum Cryptography Week : The Power of Entanglement This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Licence. Contents.1 Entanglement
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationarxiv: v1 [quant-ph] 2 Jun 2010
Contextuality offers device-independent security Karol Horodecki 1,2, Michał Horodecki 3,2, Paweł Horodecki 4,2, Ryszard Horodecki 3,2, Marcin Pawłowski 3,2 and Mohamed Bourennane 5 1 Institute of Informatics,
More informationLecture: Quantum Information
Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers
More informationMaximal Entanglement A New Measure of Entanglement
1 Maximal Entanglement A New Measure of Entanglement Salman Beigi School of Mathematics, Institute for Research in Fundamental Sciences IPM, Tehran, Iran arxiv:1405.50v1 [quant-ph] 11 May 014 Abstract
More informationOn PPT States in C K C M C N Composite Quantum Systems
Commun. Theor. Phys. (Beijing, China) 42 (2004) pp. 25 222 c International Academic Publishers Vol. 42, No. 2, August 5, 2004 On PPT States in C K C M C N Composite Quantum Systems WANG Xiao-Hong, FEI
More informationarxiv: v1 [quant-ph] 1 Jul 2013
Quantum enigma machines arxiv:1307.0380v1 [quant-ph] 1 Jul 2013 Seth Lloyd Department of Mechanical Engineering Massachusetts Institute of Technology MIT 3-160, Cambridge MA, 02139, USA Abstract: Enigma
More informationA Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols
A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016
More informationCS120, Quantum Cryptography, Fall 2016
CS10, Quantum Cryptography, Fall 016 Homework # due: 10:9AM, October 18th, 016 Ground rules: Your homework should be submitted to the marked bins that will be by Annenberg 41. Please format your solutions
More informationProbabilistic exact cloning and probabilistic no-signalling. Abstract
Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract
More information+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1
Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationEntanglement and non-locality of pure quantum states
MSc in Photonics Universitat Politècnica de Catalunya (UPC) Universitat Autònoma de Barcelona (UAB) Universitat de Barcelona (UB) Institut de Ciències Fotòniques (ICFO) PHOTONICSBCN http://www.photonicsbcn.eu
More informationEntanglement and Quantum Teleportation
Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,
More informationLecture 14: Quantum information revisited
CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 4: Quantum information revisited March 4, 006 So far, this course has focused almost entirely on quantum algorithms The next
More informationLocal cloning of entangled states
Local cloning of entangled states Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. March 16, 2010 Vlad Gheorghiu (CMU) Local cloning of entangled states March
More informationarxiv:quant-ph/ May 2002
Multiparty -imensional quantum information splitting Anrze Gruka* an Antoni Wócik** Faculty of Physics, Aam Mickiewicz University, arxiv:quant-ph/5 7 May 8PXOWRZVND3R]QD3RODQG Abstract Generalization of
More informationQuantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.
Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G. Kwiat Physics 403 talk: December 2, 2014 Entanglement is a feature of compound
More informationUnconditionally secure deviceindependent
Unconditionally secure deviceindependent quantum key distribution with only two devices Roger Colbeck (ETH Zurich) Based on joint work with Jon Barrett and Adrian Kent Physical Review A 86, 062326 (2012)
More informationarxiv: v2 [quant-ph] 21 Oct 2013
Genuine hidden quantum nonlocality Flavien Hirsch, 1 Marco Túlio Quintino, 1 Joseph Bowles, 1 and Nicolas Brunner 1, 1 Département de Physique Théorique, Université de Genève, 111 Genève, Switzerland H.H.
More informationPh 219/CS 219. Exercises Due: Friday 20 October 2006
1 Ph 219/CS 219 Exercises Due: Friday 20 October 2006 1.1 How far apart are two quantum states? Consider two quantum states described by density operators ρ and ρ in an N-dimensional Hilbert space, and
More informationQuantum Technologies for Cryptography
University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms
More informationarxiv: v3 [quant-ph] 5 Jun 2015
Entanglement and swap of quantum states in two qubits Takaya Ikuto and Satoshi Ishizaka Graduate School of Integrated Arts and Sciences, Hiroshima University, Higashihiroshima, 739-8521, Japan (Dated:
More informationPrivate quantum subsystems and error correction
Private quantum subsystems and error correction Sarah Plosker Department of Mathematics and Computer Science Brandon University September 26, 2014 Outline 1 Classical Versus Quantum Setting Classical Setting
More informationPERFECTLY secure key agreement has been studied recently
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 2, MARCH 1999 499 Unconditionally Secure Key Agreement the Intrinsic Conditional Information Ueli M. Maurer, Senior Member, IEEE, Stefan Wolf Abstract
More informationarxiv:quant-ph/ v2 17 Sep 2002
Proof of security of quantum key distribution with two-way classical communications arxiv:quant-ph/0105121 v2 17 Sep 2002 Daniel Gottesman EECS: Computer Science Division University of California Berkeley,
More informationQuantum Cryptography
Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,
More informationCS/Ph120 Homework 4 Solutions
CS/Ph10 Homework 4 Solutions November 3, 016 Problem 1: Robustness of GHZ and W states, part Solution: Due to Bolton Bailey a For the GHZ state, we have T r N GHZ N GHZ N = 1 0 N 1 0 N 1 + 1 N 1 1 N 1
More informationarxiv:quant-ph/ v1 9 May 2005
Quantum information can be negative Michal Horodecki 1, Jonathan Oppenheim & Andreas Winter 3 1 Institute of Theoretical Physics and Astrophysics, University of Gdańsk, 80 95 Gdańsk, Poland Department
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More information