Converse bounds for private communication over quantum channels

Similar documents
A meta-converse for private communication over quantum channels

Fundamental rate-loss tradeoff for optical quantum key distribution

Correlation Detection and an Operational Interpretation of the Rényi Mutual Information

A Hierarchy of Information Quantities for Finite Block Length Analysis of Quantum Tasks

Strong converse theorems using Rényi entropies

Capacity Estimates of TRO Channels

arxiv: v5 [quant-ph] 5 Jun 2018

Supplementary Information

Classical and Quantum Channel Simulations

Entanglement: concept, measures and open problems

Semidefinite programming strong converse bounds for quantum channel capacities

Quantum Sphere-Packing Bounds and Moderate Deviation Analysis for Classical-Quantum Channels

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Semidefinite programming strong converse bounds for quantum channel capacities

Quantum Hadamard channels (II)

Asymptotic Pure State Transformations

Security of Quantum Key Distribution with Imperfect Devices

Explicit Receivers for Optical Communication and Quantum Reading

High rate quantum cryptography with untrusted relay: Theory and experiment

Squashed entanglement

Entropy Accumulation in Device-independent Protocols

Entanglement and Quantum Teleportation

Multivariate trace inequalities. David Sutter, Mario Berta, Marco Tomamichel

Ping Pong Protocol & Auto-compensation

Problem Set: TT Quantum Information

Quantum Technologies for Cryptography

Extremal properties of the variance and the quantum Fisher information; Phys. Rev. A 87, (2013).

On Composite Quantum Hypothesis Testing

Quantum Correlations as Necessary Precondition for Secure Communication

Concentration of Measure Effects in Quantum Information. Patrick Hayden (McGill University)

Asymptotic Estimates in Information Theory with Non-Vanishing Error Probabilities

Exact entanglement cost of quantum states and channels under PPT-preserving operations

Spin chain model for correlated quantum channels

Introduction to Quantum Key Distribution

Quantum to Classical Randomness Extractors

Explicit capacity-achieving receivers for optical communication and quantum reading

On Third-Order Asymptotics for DMCs

arxiv: v1 [quant-ph] 3 Jan 2008

Sending Quantum Information with Zero Capacity Channels

Entropic Formulation of Heisenberg s Measurement-Disturbance Relation

Quantum Bilinear Optimisation

Coherence, Discord, and Entanglement: Activating one resource into another and beyond

Quantum key distribution for the lazy and careless

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

EE5139R: Problem Set 7 Assigned: 30/09/15, Due: 07/10/15

Practical quantum-key. key- distribution post-processing

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

arxiv: v3 [quant-ph] 30 Aug 2017

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Characterization of Bipartite Entanglement

Compression and entanglement, entanglement transformations

ENTANGLEMENT TRANSFORMATION AT ABSORBING AND AMPLIFYING DIELECTRIC FOUR-PORT DEVICES

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Physics 581, Quantum Optics II Problem Set #4 Due: Tuesday November 1, 2016

Entanglement Measures and Monotones Pt. 2

APPLICATIONS. Quantum Communications

Bound entangled states with secret key and their classical counterpart

Strong converse theorems using Rényi entropies

A Tight Upper Bound on the Second-Order Coding Rate of Parallel Gaussian Channels with Feedback

Quantum Key Distribution. The Starting Point

A semi-device-independent framework based on natural physical assumptions

Quantum Achievability Proof via Collision Relative Entropy

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach

arxiv: v1 [quant-ph] 17 Sep 2015

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Limits on classical communication from quantum entropy power inequalities

THE INTERFEROMETRIC POWER OF QUANTUM STATES GERARDO ADESSO

Security Proofs for Quantum Key Distribution Protocols by Numerical Approaches

arxiv: v2 [quant-ph] 18 May 2018

Entanglement Measures and Monotones

arxiv:quant-ph/ v2 16 Jul 2006

Transmitting and Hiding Quantum Information

arxiv: v2 [quant-ph] 3 Nov 2017

Lecture 19 October 28, 2015

Single-Particle Interference Can Witness Bipartite Entanglement

arxiv: v4 [quant-ph] 22 Nov 2012

Maximal Entanglement A New Measure of Entanglement

quantum error-rejection

Entanglement: Definition, Purification and measures

Quantum Fisher information and entanglement

LECTURE NOTES ON Quantum Cryptography

arxiv:quant-ph/ v1 13 Jan 2003

Exponential Separation of Quantum Communication and Classical Information

arxiv: v2 [quant-ph] 19 Jan 2018

Secure heterodyne-based QRNG at 17 Gbps

Realization of Finite-Size Continuous-Variable Quantum Key Distribution based on Einstein-Podolsky-Rosen Entangled Light

Port-based teleportation and its applications

Lecture 11 September 30, 2015

Multivariate Trace Inequalities

Quantum Information Theory and Cryptography

The Quantum Reverse Shannon Theorem Based on One-Shot Information Theory

Quantum key distribution based on private states

Quantification of Gaussian quantum steering. Gerardo Adesso

Quantum estimation for quantum technology

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Thermodynamical cost of accuracy and stability of information processing

arxiv: v2 [quant-ph] 8 Mar 2018

Valerio Cappellini. References

Separation between quantum Lovász number and entanglement-assisted zero-error classical capacity

Attempting to reverse the irreversible in quantum physics

Transcription:

Converse bounds for private communication over quantum channels Mark M. Wilde (LSU) joint work with Mario Berta (Caltech) and Marco Tomamichel ( Univ. Sydney + Univ. of Technology, Sydney ) arxiv:1602.08898 accepted for publication in IEEE Trans. Inf. Theory DOI: 10.1109/TIT.2017.2648825 QIP 2017 Seattle - January 20, 2017 Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 1 / 13

Setup I Given a quantum channel N and a quantum key distribution (QKD) protocol that uses it n times, how much key can be generated? A 1 N B1 A 2 N B2 A n N B n KA LOCC A1 B1 LOCC A2 B2 LOCC LOCC A n B n LOCC K B Non-asymptotic private capacity: maximum rate of ε-close secret key achievable using the channel n times with two-way classical communication (LOCC) assistance ˆP N (n, ε) := sup { P : (n, P, ε) is achievable for N using LOCC }. (1) Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 2 / 13

Setup II Practical question: how to characterize ˆP N (n, ε) for all n 1 and ε (0, 1)? The answers give the fundamental limitations of QKD. Upper bounds on ˆP N (n, ε) can be used as benchmarks for quantum repeaters [Lütkenhaus]. Today, I will present the tightest known upper bound on ˆP N (n, ε) for several channels of practical interest. Interesting special case: single-mode phase-insensitive bosonic Gaussian channels. Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 3 / 13

Overview 1 Main Results (Examples) 2 Proof Idea: Meta Converse 3 Conclusion Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 4 / 13

Main Result: Gaussian Channels I Converse bounds for single-mode phase-insensitive bosonic Gaussian channels, most importantly the photon loss channel L η : ˆb = ηâ + 1 ηê (2) where transmissivity η [0, 1] and environment in vacuum state. Our approach gives a complete proof for the following weak converse bound, stated in [Pirandola et al. 2016]: P (L η ) := lim lim ε 0 n ( ) 1 ˆP N η (n, ε) log, (3) 1 η ( which is actually tight in the asymptotic limit, i.e., P (N η ) = log Drawback: an asymptotic statement, and thus says little for practical protocols (called a weak converse bound). 1 1 η ). Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 5 / 13

Main Result: Gaussian Channels II We show the non-asymptotic converse bound ( where C(ε) := log 6 + 2 log ( ) 1 ˆP L η (n, ε) log + C(ε), (4) 1 η n 1+ε 1 ε ) (other choices possible). Can be used to assess the performance of any practical quantum repeater which uses a loss channel n times for desired security ε. Other variations of this bound are possible if η is not the same for each channel use, if η is chosen adversarially, etc. We give similar bounds for the quantum-limited amplifier channel (tight), thermalizing channels, amplifier channels, and additive noise channels. Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 6 / 13

Main Result: Dephasing Channels I Asymptotic result [Pirandola et al. 2016] for the qubit dephasing channel with γ (0, 1) is P (Z γ ) := lim Z γ : ρ (1 γ) ρ + γzρz lim ε 0 n ˆP Z γ (n, ε) = 1 h(γ), (5) with the binary entropy h(γ) := γ log γ (1 γ) log(1 γ). By combining with [Tomamichel et al. 2016] we show the expansion ˆP Z γ (n, ε) = 1 h(γ) + v(γ) n Φ 1 (ε) + log n 2n + O ( ) 1, (6) n with Φ the cumulative standard Gaussian distribution and the binary entropy variance v(γ) := γ(log γ + h(γ)) 2 + (1 γ)(log(1 γ) + h(γ)) 2. Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 7 / 13

Main Result: Dephasing Channels II For the dephasing parameter γ = 0.1 we get (figure from [Tomamichel et al. 2016]): Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 8 / 13

Proof Idea: Meta Converse I Meta converse approach from classical channel coding [Polyanskiy et al. 2010], uses connection to hypothesis testing. In the quantum regime, e.g., for classical communication [Tomamichel & Tan 2015] or quantum communication [Tomamichel et al. 2014 & 2016]. We extend this approach to private communication. Hypothesis testing relative entropy defined for a state ρ, positive semi-definite operator σ, and ε [0, 1] as D ε H(ρ σ) := log inf { Tr[Λσ] : 0 Λ I Tr[Λρ] 1 ε }. (7) The ε-relative entropy of entanglement is defined as E ε R(A; B) ρ := inf DH(ρ ε AB σ AB ), (8) σ AB S(A:B) where S(A : B) is the set of separable states (cf. relative entropy of entanglement). Channel s ε-relative entropy of entanglement is then given as E ε R(N ) := sup ER(A; ε B) ρ, (9) ψ AA H AA where ρ AB := N A B(ψ AA ). Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 9 / 13

Proof Idea: Meta Converse II Goal is the creation of log K bits of key, i.e., states γ ABE with (M A M B )(γ ABE ) = 1 K i i A i i B σ E (10) i for some state σ E and measurement channels M A, M B. In one-to-one correspondence with pure states γ AA BB E such that [Horodecki et al. 2005 & 2009] γ ABA B = U ABA B (Φ AB θ A B )U ABA B, (11) where Φ AB maximally entangled, U ABA B each U ij A B a unitary, and θ A B a state. Work in the latter, bipartite picture. = i,j i i A j j B U ij A B with Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 10 / 13

Proof Idea: Meta Converse III Let ε [0, 1] and let ρ ABA B be an ε-approximate γ-private state. The probability for ρ ABA B to pass the γ-privacy test satisfies Tr{Π ABA B ρ ABA B } 1 ε, (12) where Π ABA B U ABA B (Φ AB I A B )U ABA B is a projective γ-privacy test. For separable states σ AA BB (useless for private communication) and a state with log K bits of key we have [Horodecki et al. 2009] γ AA BB Tr{Π ABA B σ AA BB } 1 K, (13) The monotonicity of the channel s ε-relative entropy of entanglement E ε R(N ) with respect to LOCC together with (13) implies the meta converse ˆP N (1, ε) E ε R(N ) (LOCC pre- and post-processing assistance). (14) For n channel uses this gives ˆP N (n, ε) 1 n E ε R( N n ). Finite block-length version of relative entropy of entanglement upper bound [Horodecki et al. 2005 & 2009]. One can then evaluate the meta converse for specific channels of interest. Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 11 / 13

Conclusion Our meta converse ˆP N (1, ε) E ε R(N ) gives bounds for the private transmission capabilities of quantum channels. These give the fundamental limitations of QKD and thus can be used as benchmarks for quantum repeaters. Can our bound be improved for the photon loss channel ) ˆP L 1 η (n, ε) log( + C(ε) ( ) 1 + ε with C(ε) = log 6 + 2 log 1 η n 1 ε ( ) to C (ε) := log? 1 1 ε Corresponding matching achievability? (Tight analysis of random coding in infinite dimensions needed.) Tight finite-energy bounds for single-mode phase-insensitive bosonic Gaussian channels? Understand more channels, for example such with P > 0 but zero quantum capacity [Horodecki et al. 2008]? (15) Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 12 / 13

Extra: Gaussian Formulas For Gaussian channels we need formulas for the relative entropy D(ρ σ) and the relative entropy variance V (ρ σ). From [Chen 2005, Pirandola et al. 2015] and [Wilde et al. 2016], respectively: writing zero-mean Gaussian states in exponential form as { ρ = Zρ 1/2 exp 1 } 2 ˆx T G ρˆx with (16) Z ρ := det(v ρ + iω/2), G ρ := 2iΩ arcoth(2v ρ iω), (17) and V ρ the Wigner function covariance matrix for ρ, we have D(ρ σ) = 1 2 ( log ( Zσ Z ρ ) ) Tr [ V ρ ] (18) V (ρ σ) = 1 2 Tr{ V ρ V ρ } + 1 Tr{ Ω Ω}, (19) 8 where := G ρ G σ. Mark M. Wilde (LSU) Converse bounds for private communication QIP 2017 Seattle - January 20, 2017 13 / 13