SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Postselection technique for quantum
channels with application to QKDchannels with application to QKD
Matthias Christandl, University of Munich
joint with Robert König and Renato Renner
2
Outline
• MotivationMotivation
• FormalismFormalism
• Main Result• Main Result
• Proof• Proof
• Application to Quantum Cryptography• Application to Quantum Cryptography
Summary and Extension• Summary and Extension
3
Motivation: real versus ideal
• Car rideCar ride
– In the ideal car ride we have no accident
– In the real car ride we might have an accidentg
– We still take the car, if real ≈ ideal
• Quantum Key Distributiony
– In the ideal QKD scheme, Alice and Bob obtain
identical and perfectly secure strings (a key)
– In the real QKD scheme, Alice and Bob may obtain
non-identical and compromised strings
We still like to use QKD as long as real ≈ ideal– We still like to use QKD as long as real ≈ ideal
– Proving real ≈ ideal is a security proof
• Provide tool for comparing real and ideal processes• Provide tool for comparing real and ideal processes
4
Formalism: quantum evolutionq
Eρ σ
E positive and trace preserving
E
ρ σ
id
E ⊗ id positive and trace preserving
id
E ⊗ id positive and trace preserving
E completely positive and trace preserving (CPTP)
5
Formalism: quantum evolutionq
• Quantum Evolution
– completely positive and trace preserving (CPTP) map E
• Examples• Examples
– Quantum protocols (e.g. for QKD) (ideal or real)
– Quantum circuits
– Time evolution of a system with Hamiltonian H
– Car ride (ideal or real)
–– …
• Proving real ≈ ideal is done via proving that E ≈ F
– E and F are CPTP maps
• Need for distance measure on CPTP mapsNeed for distance measure on CPTP maps
– Diamond norm (Kitaev)
6
Formalism: diamond norm
• Maximal probability to decide between E and FMaximal probability to decide between E and F
p = ½ + ¼ ||E-F||
|| ||
E F
||E-F||:=maxρ || - ||1
E
id
F
id
ρ ρ
id id
=maxρ || ||1
E-F
ρρ || ||1
id
ρ
7
Formalism: diamond norm
• "If we cannot see a difference they are identical"If we cannot see a difference, they are identical
• Operational definition
• Strongest notion of distanceStrongest notion of distance
• Maximum is difficult to evaluate
• Diamond norm is related to completely bounded• Diamond norm is related to completely bounded
norm by duality
8
Our situation: map on n particlesp p
• is CPTPE : B(H⊗n) → B(H⊗n) is CPTPE : B(H ) → B(H )
Eρn σn
• State of n particles as input
• State of n particles as output• State of n particles as output
• State space of one particle H ∼= Cd
9
Our situation: permutation-covariancep
• E is permutation –covariant ifE is permutation covariant if
E = π† E π
†
πρn π ρn π†
10
Main result
• For E, F permutation-covariant on n particlesFor E, F permutation covariant on n particles
|| ||
E-F
• ||E-F|| ≤ poly(n) || ||1
Φ
id
id
• Φ is maximally entangled state between symmetric
subspace of andsubspace of and
|Φi =
1
poly(n)
X
i
|ii|ii where |ii o.n. basis of Symn(H⊗H)
11
Proof
• Lemma 1: The maximisation in the diamond norm isLemma 1: The maximisation in the diamond norm is
achieved on (purifications of) permutation-invariant
states
• Lemma 2: permutation-invariant states have
bosonic purifications
• Lemma 3: every bosonic state can be obtained by
post-selecting from a fixed state (with probability
1/ l ( ))1/poly(n))
f f f• Lemma 4: this fixed state is the purification of a de
Finetti state
12
Lemma 1: Maximum is taken on
i t tperm.-inv. states
∆:=
!|| || || ||
π∆E-F
id
ρn!|| ||1
id
ρ|| ||1= π
ρ|| ||1
π ∆
= π || π
id
π ∆
id
||1=
ρ
id
|| ||1 || id id
π
||1
13
Lemma 2: Permutation-invariant
t t h B i ifi tistates have Bosonic purifications
• ρ= π ρ π† for all πρ π ρ π for all π
• Define |Ψi = (ρ1/2⊗1) |Φi |Φi = |ii|ii
• ThenThen
π ⊗ π |Ψi = (π ⊗ π) (ρ1/2⊗1)|Φi
= (ρ1/2⊗1) (π ⊗ π) |Φi= (ρ ⊗1) (π ⊗ π) |Φi
= (ρ1/2⊗1) |Φi
= |Ψi= |Ψi
• Hence |Ψi is bosonic• Hence, |Ψi is bosonic
• |Ψi is also a purification of ρ
14
Purifications are equivalentq
|| π
id
π ∆
id
||1
ρ
|| π
id
π ∆
id
||1
ρ
|| id id
π
||1 || id id
π
||1
||
∆
||||
π
||
ρ
∆
||
id
||1= Ψ= || π
id id
π
||1
ρ
π
15
Lemma 3: Post-selection in
t l t titeleportation
Tr Ψ ·
Φ
Ψ
• Probability of success =1/dim Symn(Cd⊗Cd)
=1/poly(n)1/poly(n)
16
Post-selection
∆
||
∆
||
Ψ
|| ||
id
||
id
||1
Ψ
Tr Ψ ·
||
id
||1
=poly(n) Φ
||
∆
id||≤ poly(n)
id
||1
Φ
id
id
17
Lemma 4
• Φ is the maximally entangled state fromΦ is the maximally entangled state from
Symn(Cd⊗Cd) to a purifying system R
∆
Φ
id
id
18
Altogetherg
∆
ρ || || 
π ∆
||
ρ
||∆||=max || =max
id
ρ ||1 || π
id id
π
||1
||∆||=max || =max
∆
∆
||Ψ ||≤ poly(n)
∆
id≤ ||
id
||1Ψ ||≤ poly(n)
id
||Φ
id≤ max ||
19
QKD: real protocolQ p
EveDistribution
BobAlice
ρn
Permutation
• chosen at random
• communicated to Bob
Measurement
Classical
Communication
• Parameter Est.
• Error Correction
• Privacy Amplif.
(SA, SB)
20
QKD: real protocolQ p
EveDistribution
BobAlice
Distribution
ρn Input
Permutation
Measurement
Cl i l
ProtocolE
Permutation
Classical
Communication
• Parameter Est.
E C ti• Error Correction
• Privacy Amplif.
(SA, SB) Output
21
QKD: ideal protocolQ p
EveDistribution
BobAlice
Distribution
ρn Input
Permutation
Cl i l
ProtocolE
Measurement
Permutation
Classical
Communication
• Parameter Est.
E C ti• Error Correction
• Privacy Amplif.
(SA, SB) Output
S
(S, S) Perfect key
22
QKD: application of main resultQ pp
• For E, F permutation-covariant on n particlesFor E, F permutation covariant on n particles
|| ||
E-F
• ||E-F|| ≤ poly(n) || ||1
Φ
id
id
• We want a bound in terms of tensor product states,
not purifications of convex combinations of tensornot purifications of convex combinations of tensor
product states → remove second purification
23
QKD: removal of second purificationQ p
• The dimension of the second purification is poly(n)y( )
• Shortening the key by 2 log poly(n) bits with privacy
amplification gives
E-FE ' -F '
|| ||
Φ
id
Φ
id|| ||||||≤
trid
E-F
|||| id ||||≤max
24
QKD: collective vs general attacksQ g
• ||E'-F'|| ≤ poly(n) max || ||1
E-F
idid
• This shows that Eve’s optimal strategy is a
collective attack (attack each system in the same
way)
• The same security parameter by only reducing the
k l th b O(l ) bitkey length by O(log n) bits
• Improves over previous analyses using Renner’s
exponential de Finetti theoremexponential de Finetti theorem
• Practical relevance (finite key analysis)
25
Summaryy
• Real versus idealReal versus ideal
• perm covariant
E-F
E F perm. covariant
• ||E-F|| ≤ poly(n) || ||1
id
Φ
id
E, F
id
E-F
||E' F'|| ≤ poly(n) max || ||id• ||E'-F'|| ≤ poly(n) max || ||1
• Security against collective attack implies security
against general attacks
26
Generalisation: arbitrary group actiony g p
• For ∆ group-covariant (with Haar measure)For ∆ group covariant (with Haar measure)
|| ||
∆
id• ||∆|| ≤ poly(n) || ||1
id
Φ
id
id
27
Generalisation: arbitrary group actiony g p
• For ∆ group-covariant (with Haar measure)For ∆ group covariant (with Haar measure)
|| ||
∆
id• ||∆|| ≤ dim || ||1
id
Φ
id
id
Phys. Rev. Lett. 102,
020504 (2009)
arXiv:0809.3019

Weitere ähnliche Inhalte

Was ist angesagt?

Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
Aleksandr Yampolskiy
 
lecture 30
lecture 30lecture 30
lecture 30
sajinsc
 

Was ist angesagt? (20)

defense
defensedefense
defense
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
 
Undecidable Problems and Approximation Algorithms
Undecidable Problems and Approximation AlgorithmsUndecidable Problems and Approximation Algorithms
Undecidable Problems and Approximation Algorithms
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Strategic Argumentation is NP-complete
Strategic Argumentation is NP-completeStrategic Argumentation is NP-complete
Strategic Argumentation is NP-complete
 
More than Words: Advancing Prosodic Analysis
More than Words: Advancing Prosodic AnalysisMore than Words: Advancing Prosodic Analysis
More than Words: Advancing Prosodic Analysis
 
Np cooks theorem
Np cooks theoremNp cooks theorem
Np cooks theorem
 
Dynamic Programming - Part II
Dynamic Programming - Part IIDynamic Programming - Part II
Dynamic Programming - Part II
 
NP completeness
NP completenessNP completeness
NP completeness
 
Bron Kerbosch Algorithm - Presentation by Jun Zhai, Tianhang Qiang and Yizhen...
Bron Kerbosch Algorithm - Presentation by Jun Zhai, Tianhang Qiang and Yizhen...Bron Kerbosch Algorithm - Presentation by Jun Zhai, Tianhang Qiang and Yizhen...
Bron Kerbosch Algorithm - Presentation by Jun Zhai, Tianhang Qiang and Yizhen...
 
AA ppt9107
AA ppt9107AA ppt9107
AA ppt9107
 
Lecture26
Lecture26Lecture26
Lecture26
 
Multicasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix CompletionMulticasting in Linear Deterministic Relay Network by Matrix Completion
Multicasting in Linear Deterministic Relay Network by Matrix Completion
 
Undecidable Problems - COPING WITH THE LIMITATIONS OF ALGORITHM POWER
Undecidable Problems - COPING WITH THE LIMITATIONS OF ALGORITHM POWERUndecidable Problems - COPING WITH THE LIMITATIONS OF ALGORITHM POWER
Undecidable Problems - COPING WITH THE LIMITATIONS OF ALGORITHM POWER
 
Bruteforce algorithm
Bruteforce algorithmBruteforce algorithm
Bruteforce algorithm
 
NP-Completeness - II
NP-Completeness - IINP-Completeness - II
NP-Completeness - II
 
lecture 30
lecture 30lecture 30
lecture 30
 
Graph Traversal Algorithms - Breadth First Search
Graph Traversal Algorithms - Breadth First SearchGraph Traversal Algorithms - Breadth First Search
Graph Traversal Algorithms - Breadth First Search
 
Prime numbers
Prime numbersPrime numbers
Prime numbers
 
Binary symmetric channel review
Binary symmetric channel reviewBinary symmetric channel review
Binary symmetric channel review
 

Ähnlich wie Postselection technique for quantum channels and applications for qkd

IGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdfIGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdf
grssieee
 
Regret Minimization in Multi-objective Submodular Function Maximization
Regret Minimization in Multi-objective Submodular Function MaximizationRegret Minimization in Multi-objective Submodular Function Maximization
Regret Minimization in Multi-objective Submodular Function Maximization
Tasuku Soma
 
Core–periphery detection in networks with nonlinear Perron eigenvectors
Core–periphery detection in networks with nonlinear Perron eigenvectorsCore–periphery detection in networks with nonlinear Perron eigenvectors
Core–periphery detection in networks with nonlinear Perron eigenvectors
Francesco Tudisco
 
Neural Network
Neural NetworkNeural Network
Neural Network
samisounda
 
NIPS2007: learning using many examples
NIPS2007: learning using many examplesNIPS2007: learning using many examples
NIPS2007: learning using many examples
zukun
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou
vafopoulos
 

Ähnlich wie Postselection technique for quantum channels and applications for qkd (20)

IGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdfIGARSS2011 FR3.T08.3 BenDavid.pdf
IGARSS2011 FR3.T08.3 BenDavid.pdf
 
Lecture5.pptx
Lecture5.pptxLecture5.pptx
Lecture5.pptx
 
Density Based Clustering
Density Based ClusteringDensity Based Clustering
Density Based Clustering
 
lecture01_lecture01_lecture0001_ceva.pdf
lecture01_lecture01_lecture0001_ceva.pdflecture01_lecture01_lecture0001_ceva.pdf
lecture01_lecture01_lecture0001_ceva.pdf
 
High-dimensional polytopes defined by oracles: algorithms, computations and a...
High-dimensional polytopes defined by oracles: algorithms, computations and a...High-dimensional polytopes defined by oracles: algorithms, computations and a...
High-dimensional polytopes defined by oracles: algorithms, computations and a...
 
Regret Minimization in Multi-objective Submodular Function Maximization
Regret Minimization in Multi-objective Submodular Function MaximizationRegret Minimization in Multi-objective Submodular Function Maximization
Regret Minimization in Multi-objective Submodular Function Maximization
 
A star
A starA star
A star
 
Core–periphery detection in networks with nonlinear Perron eigenvectors
Core–periphery detection in networks with nonlinear Perron eigenvectorsCore–periphery detection in networks with nonlinear Perron eigenvectors
Core–periphery detection in networks with nonlinear Perron eigenvectors
 
Neural Network
Neural NetworkNeural Network
Neural Network
 
Waveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptxWaveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptx
 
Slides to RSA Presentation
Slides to RSA PresentationSlides to RSA Presentation
Slides to RSA Presentation
 
Waveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptxWaveform_codingUNIT-II_DC_-PPT.pptx
Waveform_codingUNIT-II_DC_-PPT.pptx
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Richard Everitt's slides
Richard Everitt's slidesRichard Everitt's slides
Richard Everitt's slides
 
NIPS2007: learning using many examples
NIPS2007: learning using many examplesNIPS2007: learning using many examples
NIPS2007: learning using many examples
 
Lecture 8: Decision Trees & k-Nearest Neighbors
Lecture 8: Decision Trees & k-Nearest NeighborsLecture 8: Decision Trees & k-Nearest Neighbors
Lecture 8: Decision Trees & k-Nearest Neighbors
 
Aco
AcoAco
Aco
 
2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou2010 3-24 cryptography stamatiou
2010 3-24 cryptography stamatiou
 
GMMNに基づく音声合成におけるグラム行列の
スパース近似の検討
GMMNに基づく音声合成におけるグラム行列の
スパース近似の検討GMMNに基づく音声合成におけるグラム行列の
スパース近似の検討
GMMNに基づく音声合成におけるグラム行列の
スパース近似の検討
 
Top school in noida
Top school in noidaTop school in noida
Top school in noida
 

Mehr von wtyru1989

Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
wtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
wtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
wtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
wtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
wtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
wtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
wtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
wtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
wtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
wtyru1989
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
wtyru1989
 

Mehr von wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
 
Qkd and de finetti theorem
Qkd and de finetti theoremQkd and de finetti theorem
Qkd and de finetti theorem
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
 
Em method
Em methodEm method
Em method
 
标量量化
标量量化标量量化
标量量化
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Postselection technique for quantum channels and applications for qkd

  • 1. Postselection technique for quantum channels with application to QKDchannels with application to QKD Matthias Christandl, University of Munich joint with Robert König and Renato Renner
  • 2. 2 Outline • MotivationMotivation • FormalismFormalism • Main Result• Main Result • Proof• Proof • Application to Quantum Cryptography• Application to Quantum Cryptography Summary and Extension• Summary and Extension
  • 3. 3 Motivation: real versus ideal • Car rideCar ride – In the ideal car ride we have no accident – In the real car ride we might have an accidentg – We still take the car, if real ≈ ideal • Quantum Key Distributiony – In the ideal QKD scheme, Alice and Bob obtain identical and perfectly secure strings (a key) – In the real QKD scheme, Alice and Bob may obtain non-identical and compromised strings We still like to use QKD as long as real ≈ ideal– We still like to use QKD as long as real ≈ ideal – Proving real ≈ ideal is a security proof • Provide tool for comparing real and ideal processes• Provide tool for comparing real and ideal processes
  • 4. 4 Formalism: quantum evolutionq Eρ σ E positive and trace preserving E ρ σ id E ⊗ id positive and trace preserving id E ⊗ id positive and trace preserving E completely positive and trace preserving (CPTP)
  • 5. 5 Formalism: quantum evolutionq • Quantum Evolution – completely positive and trace preserving (CPTP) map E • Examples• Examples – Quantum protocols (e.g. for QKD) (ideal or real) – Quantum circuits – Time evolution of a system with Hamiltonian H – Car ride (ideal or real) –– … • Proving real ≈ ideal is done via proving that E ≈ F – E and F are CPTP maps • Need for distance measure on CPTP mapsNeed for distance measure on CPTP maps – Diamond norm (Kitaev)
  • 6. 6 Formalism: diamond norm • Maximal probability to decide between E and FMaximal probability to decide between E and F p = ½ + ¼ ||E-F|| || || E F ||E-F||:=maxρ || - ||1 E id F id ρ ρ id id =maxρ || ||1 E-F ρρ || ||1 id ρ
  • 7. 7 Formalism: diamond norm • "If we cannot see a difference they are identical"If we cannot see a difference, they are identical • Operational definition • Strongest notion of distanceStrongest notion of distance • Maximum is difficult to evaluate • Diamond norm is related to completely bounded• Diamond norm is related to completely bounded norm by duality
  • 8. 8 Our situation: map on n particlesp p • is CPTPE : B(H⊗n) → B(H⊗n) is CPTPE : B(H ) → B(H ) Eρn σn • State of n particles as input • State of n particles as output• State of n particles as output • State space of one particle H ∼= Cd
  • 9. 9 Our situation: permutation-covariancep • E is permutation –covariant ifE is permutation covariant if E = π† E π † πρn π ρn π†
  • 10. 10 Main result • For E, F permutation-covariant on n particlesFor E, F permutation covariant on n particles || || E-F • ||E-F|| ≤ poly(n) || ||1 Φ id id • Φ is maximally entangled state between symmetric subspace of andsubspace of and |Φi = 1 poly(n) X i |ii|ii where |ii o.n. basis of Symn(H⊗H)
  • 11. 11 Proof • Lemma 1: The maximisation in the diamond norm isLemma 1: The maximisation in the diamond norm is achieved on (purifications of) permutation-invariant states • Lemma 2: permutation-invariant states have bosonic purifications • Lemma 3: every bosonic state can be obtained by post-selecting from a fixed state (with probability 1/ l ( ))1/poly(n)) f f f• Lemma 4: this fixed state is the purification of a de Finetti state
  • 12. 12 Lemma 1: Maximum is taken on i t tperm.-inv. states ∆:= !|| || || || π∆E-F id ρn!|| ||1 id ρ|| ||1= π ρ|| ||1 π ∆ = π || π id π ∆ id ||1= ρ id || ||1 || id id π ||1
  • 13. 13 Lemma 2: Permutation-invariant t t h B i ifi tistates have Bosonic purifications • ρ= π ρ π† for all πρ π ρ π for all π • Define |Ψi = (ρ1/2⊗1) |Φi |Φi = |ii|ii • ThenThen π ⊗ π |Ψi = (π ⊗ π) (ρ1/2⊗1)|Φi = (ρ1/2⊗1) (π ⊗ π) |Φi= (ρ ⊗1) (π ⊗ π) |Φi = (ρ1/2⊗1) |Φi = |Ψi= |Ψi • Hence |Ψi is bosonic• Hence, |Ψi is bosonic • |Ψi is also a purification of ρ
  • 14. 14 Purifications are equivalentq || π id π ∆ id ||1 ρ || π id π ∆ id ||1 ρ || id id π ||1 || id id π ||1 || ∆ |||| π || ρ ∆ || id ||1= Ψ= || π id id π ||1 ρ π
  • 15. 15 Lemma 3: Post-selection in t l t titeleportation Tr Ψ · Φ Ψ • Probability of success =1/dim Symn(Cd⊗Cd) =1/poly(n)1/poly(n)
  • 16. 16 Post-selection ∆ || ∆ || Ψ || || id || id ||1 Ψ Tr Ψ · || id ||1 =poly(n) Φ || ∆ id||≤ poly(n) id ||1 Φ id id
  • 17. 17 Lemma 4 • Φ is the maximally entangled state fromΦ is the maximally entangled state from Symn(Cd⊗Cd) to a purifying system R ∆ Φ id id
  • 18. 18 Altogetherg ∆ ρ || ||  π ∆ || ρ ||∆||=max || =max id ρ ||1 || π id id π ||1 ||∆||=max || =max ∆ ∆ ||Ψ ||≤ poly(n) ∆ id≤ || id ||1Ψ ||≤ poly(n) id ||Φ id≤ max ||
  • 19. 19 QKD: real protocolQ p EveDistribution BobAlice ρn Permutation • chosen at random • communicated to Bob Measurement Classical Communication • Parameter Est. • Error Correction • Privacy Amplif. (SA, SB)
  • 20. 20 QKD: real protocolQ p EveDistribution BobAlice Distribution ρn Input Permutation Measurement Cl i l ProtocolE Permutation Classical Communication • Parameter Est. E C ti• Error Correction • Privacy Amplif. (SA, SB) Output
  • 21. 21 QKD: ideal protocolQ p EveDistribution BobAlice Distribution ρn Input Permutation Cl i l ProtocolE Measurement Permutation Classical Communication • Parameter Est. E C ti• Error Correction • Privacy Amplif. (SA, SB) Output S (S, S) Perfect key
  • 22. 22 QKD: application of main resultQ pp • For E, F permutation-covariant on n particlesFor E, F permutation covariant on n particles || || E-F • ||E-F|| ≤ poly(n) || ||1 Φ id id • We want a bound in terms of tensor product states, not purifications of convex combinations of tensornot purifications of convex combinations of tensor product states → remove second purification
  • 23. 23 QKD: removal of second purificationQ p • The dimension of the second purification is poly(n)y( ) • Shortening the key by 2 log poly(n) bits with privacy amplification gives E-FE ' -F ' || || Φ id Φ id|| ||||||≤ trid E-F |||| id ||||≤max
  • 24. 24 QKD: collective vs general attacksQ g • ||E'-F'|| ≤ poly(n) max || ||1 E-F idid • This shows that Eve’s optimal strategy is a collective attack (attack each system in the same way) • The same security parameter by only reducing the k l th b O(l ) bitkey length by O(log n) bits • Improves over previous analyses using Renner’s exponential de Finetti theoremexponential de Finetti theorem • Practical relevance (finite key analysis)
  • 25. 25 Summaryy • Real versus idealReal versus ideal • perm covariant E-F E F perm. covariant • ||E-F|| ≤ poly(n) || ||1 id Φ id E, F id E-F ||E' F'|| ≤ poly(n) max || ||id• ||E'-F'|| ≤ poly(n) max || ||1 • Security against collective attack implies security against general attacks
  • 26. 26 Generalisation: arbitrary group actiony g p • For ∆ group-covariant (with Haar measure)For ∆ group covariant (with Haar measure) || || ∆ id• ||∆|| ≤ poly(n) || ||1 id Φ id id
  • 27. 27 Generalisation: arbitrary group actiony g p • For ∆ group-covariant (with Haar measure)For ∆ group covariant (with Haar measure) || || ∆ id• ||∆|| ≤ dim || ||1 id Φ id id Phys. Rev. Lett. 102, 020504 (2009) arXiv:0809.3019