Bound entangled states with secret key and their classical counterpart

Similar documents
Squashed entanglement

Limitations on Quantum Key Repeaters

Degradable Quantum Channels

Sending Quantum Information with Zero Capacity Channels

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Fundamental rate-loss tradeoff for optical quantum key distribution

Entanglement Measures and Monotones Pt. 2

Entanglement Measures and Monotones

Asymptotic Pure State Transformations

Quantum key distribution for the lazy and careless

arxiv: v1 [quant-ph] 3 Jan 2008

Quantum Cryptography

Distinguishing multi-partite states by local measurements

Uniformly Additive Entropic Formulas

Characterization of Bipartite Entanglement

Quantum Teleportation Pt. 3

Quantum key distribution based on private states

Bit-Commitment and Coin Flipping in a Device-Independent Setting

arxiv:quant-ph/ v1 13 Jan 2003

Introduction to Quantum Key Distribution

Converse bounds for private communication over quantum channels

Quantum Setting with Applications

Distinguishing multi-partite states by local measurements

Cryptography in a quantum world

Classical and Quantum Channel Simulations

On the complementary quantum capacity of the depolarizing channel

Entanglement: Definition, Purification and measures

Quantum Key Distribution. The Starting Point

On balance of information in bipartite quantum communication systems: entanglement-energy analogy

Optimal bounds for quantum bit commitment

Security of Quantum Key Distribution with Imperfect Devices

Theory of Quantum Entanglement

Transmitting and Hiding Quantum Information

Quantification of Gaussian quantum steering. Gerardo Adesso

Entanglement and information

arxiv:quant-ph/ v1 28 Oct 2003

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Quantum Key Distribution

Quantum Information Theory

Instantaneous Nonlocal Measurements

Which-way experiment with an internal degree of freedom

arxiv: v2 [quant-ph] 10 Mar 2015

Entropy Accumulation in Device-independent Protocols

Quantum Information Processing and Diagrams of States

Bell inequality for qunits with binary measurements

Quantum Correlations as Necessary Precondition for Secure Communication

On the complementary quantum capacity of the depolarizing channel

Ping Pong Protocol & Auto-compensation

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Device-Independent Quantum Information Processing (DIQIP)

arxiv: v7 [quant-ph] 20 Mar 2017

arxiv:quant-ph/ v1 13 Mar 2007

LECTURE NOTES ON Quantum Cryptography

Compression and entanglement, entanglement transformations

Entropy in Classical and Quantum Information Theory

Secrecy and the Quantum

Bound Information: The Classical Analog to Bound Quantum Entanglement

arxiv: v1 [quant-ph] 28 May 2011

Research Staff Member, Physical Sciences, IBM TJ Watson Research Center,

Max-Planck-Institut für Mathematik in den Naturwissenschaften Leipzig

Practical quantum-key. key- distribution post-processing

Single-Particle Interference Can Witness Bipartite Entanglement

Quantum sampling of mixed states

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Group representations and quantum information theory. Aram Harrow (Bristol) NII, Tokyo 5 Feb, 2007

Thermodynamics beyond free energy relations or Quantum Quantum Thermodynamics. Matteo Lostaglio Imperial College London

Other Topics in Quantum Information

Lecture Notes. Quantum Cryptography Week 2: The Power of Entanglement

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

arxiv: v1 [quant-ph] 2 Jun 2010

Lecture: Quantum Information

Maximal Entanglement A New Measure of Entanglement

On PPT States in C K C M C N Composite Quantum Systems

arxiv: v1 [quant-ph] 1 Jul 2013

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

CS120, Quantum Cryptography, Fall 2016

Probabilistic exact cloning and probabilistic no-signalling. Abstract

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Entanglement and non-locality of pure quantum states

Entanglement and Quantum Teleportation

Lecture 14: Quantum information revisited

Local cloning of entangled states

arxiv:quant-ph/ May 2002

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Unconditionally secure deviceindependent

arxiv: v2 [quant-ph] 21 Oct 2013

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

Quantum Technologies for Cryptography

arxiv: v3 [quant-ph] 5 Jun 2015

Private quantum subsystems and error correction

PERFECTLY secure key agreement has been studied recently

arxiv:quant-ph/ v2 17 Sep 2002

Quantum Cryptography

arxiv:quant-ph/ v1 13 Mar 2007

CS/Ph120 Homework 4 Solutions

arxiv:quant-ph/ v1 9 May 2005

Problem Set: TT Quantum Information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Transcription:

Bound entangled states with secret key and their classical counterpart Māris Ozols Graeme Smith John Smolin February 6, 2014

A brief summary Main result A new construction of bound entangled states with secret key Steps involved 1. Understand what is the classical analogue of this 2. Construct a probability distribution P ABE that has the desired properties 3. Set ψ ABE = P ABE

A brief summary Main result A new construction of bound entangled states with secret key Steps involved 1. Understand what is the classical analogue of this 2. Construct a probability distribution P ABE that has the desired properties 3. Set ψ ABE = P ABE The significance of trash in cryptography

Shared entanglement and randomness Cryptographic and computational resource Alice Bob ρ AB

Shared entanglement and randomness Cryptographic and computational resource Joint state: ψ ABE or P ABE Eve Alice Bob ψ ABE

Shared entanglement and randomness Cryptographic and computational resource Joint state: ψ ABE or P ABE When is such resource useful? Eve Alice Bob ψ ABE

Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E

Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E P ABE = { KEY AB TRASH E 0 A 0 B w.p. 1/2 KEY AB = 1 A 1 B w.p. 1/2

Perfect resources When is P ABE a perfect resource? 1. Identical for A and B 2. Uniformly random 3. Private from E P ABE = { KEY AB TRASH E 0 A 0 B w.p. 1/2 KEY AB = 1 A 1 B w.p. 1/2 ψ ABE = KEY AB TRASH E KEY AB = 1 2 ( 00 AB + 11 AB

Distillation Eve Alice Bob ψ ABE

Distillation Eve LOCC.. Alice Bob ψ ABE

Distillation Eve LOCC.. Alice ψ ABE KEY k AB TRASH E Bob

Distillation Eve LOCC.. Alice KEY k ψ AB ABE TRASH E Bob Entanglement distillation rate 1 ( D( ψ ABE := lim # of KEY AB from ψ n n n ABE via LOCC

More distillation rates ψ ABE LOCC KEY AB P ABE LOPC KEY AB D( ψ ABE entanglement distillation rate K(P ABE key distillation rate

LOCC More distillation rates ψ ABE LOCC KEY AB P ABE LOPC KEY AB D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate

More distillation rates ψ ABE LOCC KEY AB = ( 2 1 0 0 1 2 LOCC measure P ABE LOPC KEY AB = ( 1 2 0 0 1 2 D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate

More distillation rates ψ ABE LOCC KEY AB = ( 2 1 0 0 1 2 LOCC measure P ABE LOPC KEY AB = ( 1 2 0 0 1 2 D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE

More distillation rates ψ ABE LOCC KEY AB = ( 2 1 0 0 1 2 LOCC measure P ABE LOPC KEY AB = ( 1 2 0 0 1 2 D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE Bound entanglement ψ ABE is entangled but D( ψ ABE = 0

More distillation rates ψ ABE LOCC KEY AB = ( 2 1 0 0 1 2 LOCC measure P ABE LOPC KEY AB = ( 1 2 0 0 1 2 D( ψ ABE entanglement distillation rate K(P ABE key distillation rate K( ψ ABE key distillation rate K( ψ ABE D( ψ ABE Bound entanglement ψ ABE is entangled but D( ψ ABE = 0 Private bound entanglement ψ ABE is bound entangled but K( ψ ABE > 0 [HHHO05]

Entanglement vs classical key A E B Compare T A ( Ψ 1 := 1 2 00 AB + 11 AB ϕ TA T B φ E ( Ψ 2 := 1 2 00 AB ϕ TA T B + 11 AB ϕ TA T B φ E T B

Entanglement vs classical key A E B Compare T A ( Ψ 1 := 1 2 00 AB + 11 AB ϕ TA T B φ E ( Ψ 2 := 1 2 00 AB ϕ TA T B + 11 AB ϕ TA T B φ E Observe If T A and T B are discarded, Ψ 1 contains a quantum KEY whereas Ψ 2 contains only a classical KEY T B

Entanglement vs classical key A E B Compare T A T B ( Ψ 1 := 1 2 00 AB + 11 AB ϕ TA T B φ E ( Ψ 2 := 1 2 00 AB ϕ TA T B + 11 AB ϕ TA T B φ E Observe If T A and T B are discarded, Ψ 1 contains a quantum KEY whereas Ψ 2 contains only a classical KEY Quantum KEY is immune against Eve accessing T A and T B (due to monogamy of entanglement

Distillation with remanent devices ψ ABE.. Alice Bob

Distillation with remanent devices ψ ABE.. Alice Bob Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key

Distillation with remanent devices φ TA T B E.. Alice Bob EPR AB Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key

Distillation with remanent devices φ TA T B E.. Alice Bob EPR AB Extra assumption At the end of the protocol Eve confiscates both devices; she can recover all information that was erased Alice and Bob can keep only the key

Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( 1 2 00 AB + 11 AB ϕ TA T B φ E ( 1 2 00 AB + 11 AB ϕ TA T B φ E entangled key classical key? ( 1 2 00 AB ϕ TA T B + 11 AB ϕ TA T B φ E ( 1 2 00 AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B

Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( 1 2 00 AB + 11 AB ϕ TA T B φ E ( 1 2 00 AB + 11 AB ϕ TA T B φ E entangled key classical key? ( 1 2 00 AB ϕ TA T B + 11 AB ϕ TA T B φ E ( 1 2 00 AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness!

Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( 1 2 00 AB + 11 AB ϕ TA T B φ E ( 1 2 00 AB + 11 AB ϕ TA T B φ E entangled key classical key? ( 1 2 00 AB ϕ TA T B + 11 AB ϕ TA T B φ E ( 1 2 00 AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness! Classical analog of entanglement [CP02] is private randomness that is distilled on remanent devices

Quantum distillation ψ ABE Ψ A A E T A LOCC E B B Classical distillation P ABE Q A A E T A LOPC E B B T B ( 1 2 00 AB + 11 AB ϕ TA T B φ E ( 1 2 00 AB + 11 AB ϕ TA T B φ E entangled key classical key? ( 1 2 00 AB ϕ TA T B + 11 AB ϕ TA T B φ E ( 1 2 00 AB ϕ TA T B + 11 AB ϕt A T B φ E classical key classical key? T B Private randomness There are two types of private randomness! Classical analog of entanglement [CP02] is private randomness that is distilled on remanent devices This resource needs a new name...

cl[assical] en[t]anglement = enclanglement

Remanent devices Regular devices T A T B T A T B KEY AB D ψ ABE K KEY AB KEY AB D P ABE K KEY AB

Remanent devices Regular devices T A T B T A T B KEY AB D ψ ABE Private bound entanglement D( ψ ABE = 0 but K( ψ ABE > 0 K KEY AB KEY AB D P ABE Private bound enclanglement D(P ABE = 0 but K(P ABE > 0 K KEY AB

Main results Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0

Main results Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Corollaries 1. New construction of private bound entanglement 2. Noise helps in one-way classical key distillation

quant[um] + [class]ical = quantical

Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 Similar distributions have appeared in [OSW05, CEH + 07]

Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 If P ABE is quantical, we call ψ ABE := P ABE quantical too Similar distributions have appeared in [OSW05, CEH + 07]

Quantical distributions / states P ABE is quantical if any single party s state can be unambiguously determined by the rest of the parties: b, e : {a : p(a, b, e = 0} 1 a, b : {e : p(a, b, e = 0} 1 a, e : {b : p(a, b, e = 0} 1 If P ABE is quantical, we call ψ ABE := P ABE quantical too Dual nature Quantical P ABE and ψ ABE describe the same entity Entropic quantities for P ABE and ψ ABE agree Quantical P ABE has a classical Schmidt decomposition w.r.t. any bipartition Similar distributions have appeared in [OSW05, CEH + 07]

Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE

Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one ψ ( 2 P U U ψ 2 U ( 2???

Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol ψ ( 2 P U U ψ 2 U ( 2???

Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol 3. Entropic quantities for P ABE and ψ ABE agree ψ ( 2 P U U ψ 2 U ( 2???

Theorem 1 If ψ ABE = P ABE is quantical then D(ψ ABE D(P ABE and K(ψ ABE K(P ABE Proof idea 1. Classical protocol can be promoted to a quantum one 2. P ABE remains quantical throughout the protocol 3. Entropic quantities for P ABE and ψ ABE agree 4. Promoted protocol achieves the same rate ψ ( 2 P U U ψ 2 U ( 2???

Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0

Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant

Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT

Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea ( Choose P ABE so that ρ AB := Tr E ψ ψ ABE is PT-invariant ρab Γ = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0

Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0 One-way distillable key: K(P ABE max A X [ I(X; B I(X; E ]

Theorem 2 There exist quantical distributions P ABE with D(P ABE = 0 and K(P ABE > 0 Proof idea Choose P ABE so that ρ AB := Tr E ( ψ ψ ABE is PT-invariant ρ Γ AB = ρ AB 0, hence ρ AB is PPT D(P ABE = 0, since D(P ABE D(ψ ABE = 0 One-way distillable key: K(P ABE max A X Choose X = 2 and do numerics [ I(X; B I(X; E ]

Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 01 AB x E + c 11 AB y E

Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 01 AB x E + c 11 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns

Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 11 AB x E + c 01 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns

Recipe for quanticality and PT-invariance B 0 1 A 0 1 o ( a 00 AB + b 11 AB x E + c 01 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns PT-invariant Union of crosses Each cross has zero determinant

Recipe for quanticality and PT-invariance A 0 1 B 0 1 ( a 00 AB + b 11 AB x E + ( c 01 AB + d 10 AB y E Quantical Union of disjoint cliques Each clique is diagonal (no repeated rows or columns PT-invariant Union of crosses Each cross has zero determinant

Example in 3 3 0 B 0 1 2 A 1 2 0.167184 0.171529 0.001243 P AB = 0.089041 0.091355 0.017492 0.441714 0.017157 0.003285 D(P ABE = 0 but K(P ABE 0.0057852

Example in 4 4 A 0 1 2 3 B 0 1 2 3 o o K(P ABE 0.0293914 Better than [HPHH08] K(P ABE 0.0213399

Example in 4 5 0 B 0 1 2 3 4 A 1 2 3 K(P ABE 0.0480494

Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation

Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation Open questions How does our construction relate to [HHHO05]? Is the optimal protocol for distilling entanglement or key from a quantical state also quantical?

Conclusions Results New construction of private bound entanglement Adding noise can help in one-way classical key distillation Open questions How does our construction relate to [HHHO05]? Is the optimal protocol for distilling entanglement or key from a quantical state also quantical? Work in progress... Quantical mechanics and a classical analogue of superactivation (of the quantical capacity

That s it! Image: destroyed Guardian computer with Snowden files

Bibliography I [CEH + 07] [CP02] Matthias Christandl, Artur Ekert, Michał Horodecki, Paweł Horodecki, Jonathan Oppenheim, and Renato Renner. Unifying classical and quantum key distillation. In Salil P. Vadhan, editor, Theory of Cryptography, volume 4392 of Lecture Notes in Computer Science, pages 456 478. Springer, 2007. arxiv:quant-ph/0608199, doi:10.1007/978-3-540-70936-7_25. Daniel Collins and Sandu Popescu. Classical analog of entanglement. Phys. Rev. A, 65(3:032321, Feb 2002. arxiv:quant-ph/0107082, doi:10.1103/physreva.65.032321. [HHHO05] Karol Horodecki, Michał Horodecki, Paweł Horodecki, and Jonathan Oppenheim. Secure key from bound entanglement. Phys. Rev. Lett., 94(16:160502, Apr 2005. arxiv:quant-ph/0309110, doi:10.1103/physrevlett.94.160502.

Bibliography II [HPHH08] [OSW05] [PBR12] [Spe07] Karol Horodecki, Łukasz Pankowski, Michał Horodecki, and Paweł Horodecki. Low-dimensional bound entanglement with one-way distillable cryptographic key. Information Theory, IEEE Transactions on, 54(6:2621 2625, 2008. arxiv:quant-ph/0506203, doi:10.1109/tit.2008.921709. Jonathan Oppenheim, Robert W. Spekkens, and Andreas Winter. A classical analogue of negative information. 2005. arxiv:quant-ph/0511247. Matthew F. Pusey, Jonathan Barrett, and Terry Rudolph. On the reality of the quantum state. Nature Physics, 8(6:475 478, 2012. arxiv:1111.3328, doi:10.1038/nphys2309. Robert W. Spekkens. Evidence for the epistemic view of quantum staappendices oftes: A toy theory. Phys. Rev. A, 75(3:032110, Mar 2007. arxiv:quant-ph/0401052, doi:10.1103/physreva.75.032110.