SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Quantum Key Distribution
and de Finetti’s Theorem
Matthias Christandl
Institute for Theoretical Physics, ETH Zurich
June 2010
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Overview
Introduction to Quantum Key Distribution
Two tools for proving security:
De Finetti’s Theorem
Post-Selection Technique
Summary
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Alice und Bob want to communicate in secrecy, but their
phone is tapped.
Alice
Eve
Bob
phone
If they share key (string of secret random numbers),
Alice Eve Bob
message
+key
--------------
cipher cipher
- key
--------------
message
cipher is random and message secure (Vernam, 1926)
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
key is as long as the message
Shannon (1949): this is optimal
secret communication ˆ= key distribution
possible key distribution schemes:
Alice and Bob meet ⇒ impractical
Weaker level of security
assumptions on speed of Eve’s computer
(public key cryptography)
assumptions on size of Eve’s harddrive
(bounded storage model)
Use quantum mechanical effects
(Bennett & Brassard 1984, Ekert 1991)
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Quantum mechanics governs atoms and photons
Spin-1
2
system: points on the sphere
cos θ
eiϕ
sin θ
= cos θ|0 + eiϕ
sin θ|1 ∈ C2
unit of information, the quantum bit or ”qubit”
we measure a qubit along a basis
if basis is {|0 , |1 }, we obtain ’0’ with probability cos2
θ.
in general: express qubit in basis and consider
|amplitude|2
.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The state of two qubits: |ψ ∈ C2
⊗ C2
, ψ||ψ = 1
|ψ = ψ00|0 ⊗ |0 + ψ01|0 ⊗ |1 + ψ10|1 ⊗ |0 + ψ11|1 ⊗ |1
= ψ00|0 |0 + ψ01|0 |1 + ψ10|1 |0 + ψ11|1 |1
each qubit is measured in basis {|0 , |1 }
measurement basis {|0 |0 , |0 |1 , |1 |0 , |1 |1 }
obtain ’ij’ with probability |ψij |2
.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Entangled state of two qubits 1√
2
(|0 A|0 B + |1 A|1 B)
New basis
|+ =
1
√
2
(|0 + |1 ) |− =
1
√
2
(|0 − |1 )
easy calculation
1
√
2
(|0 A|0 B + |1 A|1 B) =
1
√
2
(|+ A|+ B + |− A|− B)
Alice and Bob measure in basis {|0 , |1 } ⇒ same result
Alice and Bob measure in basis {|+ , |− } ⇒ same result
Converse is true, too:
same measurement result ⇒ they have state
1√
2
(|0 A|0 B + |1 A|1 B)
Alice and Bob can test whether or not they have the
state 1√
2
(|0 A|0 B + |1 A|1 B)!
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Assume that Alice and Bob have the state
|φ AB = 1√
2
(|0 A|0 B + |1 A|1 B)
and measure in the same basis.
Can someone else guess the result?
No! The measurement result is secure!
Total state of Alice, Bob and Eve
|ψ ABE = |φ AB ⊗ |φ E ,
because Alice and Bob have a pure state
Eve is not at all correlated with Alice and Bob!
Monogamy of entanglement
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1
1 1
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2
1 2 1 2
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Error-free? |φ AB
?
= 1√
2
(|0 A|0 B + |1 A|1 B )
phone
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Error-free? |φ AB
?
= 1√
2
(|0 A|0 B + |1 A|1 B )
phone
If YES: key. If NO: no key
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Proof works as long as |Ψ n
ABC = |ψ ⊗n
ABE .
Alice Bob
But why should Eve prepare such a state?
Why not the following?
Alice Bob
We can assume: π|Ψ n
ABC = |Ψ n
ABC for all π ∈ Sn.
Goal: two methods that reduce second to first case!
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
De Finetti’s Theorem
De Finetti’s Theorem (Diaconis and Freedman, 1980)
Drawing balls from an urn with or without replacement results
in almost the same probability distribution.
If k are drawn out of n, then
||Pk
−
i
pi Q×k
i ||1 ≤ const
k
n
.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
De Finetti’s Theorem
Quantum generalisations by Størmer, Hudson & Moody, and
Werner et al.. (n = ∞)
Quantum De Finetti Theorem
Christandl, K¨onig, Mitchison, Renner, Comm. Math. Phys. 273, 473498 (2007)
Let |Ψ n
be a permutation-invariant state: π|Ψ n
= |Ψ n
for
all π ∈ Sn, then
||ρk
−
i
pi |ψ ψ|⊗k
i ||1 ≤ const
k
n
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
De Finetti’s Theorem
Alice and Bob select a random sample of pairs
(after pairs have been distributed!)
Alice BobAlice Bob
Quantum de Finetti
⇒ can use proof from before (tensor product)
⇒ proof of the security of Quantum Key Distribution!
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
De Finetti’s Theorem
Closer look: deviation from perfect key (due to quantum
de Finetti theorem)
≈ k/n
n: number of pairs that Eve distributed
k: number of bits of key
key rate r ≈ k/n ≈ ≈ 0 ⇒ not good enough
need replacement for de Finetti theorem
Renner’s exp. de Finetti theorem, involved, non-optimal
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
Statistical process Λ
Input: n-bit string
Output: success or failure
Lemma
If for any i.i.d. distribution
Prob[failure] ≤ ,
then
Prob[failure] ≤ (n + 1)
for any permutation-invariant distribution.
Typically, ≈ 2−αn
, in information-theoretic tasks.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
Proof: P permutation-invariant distribution on n bits:
P =
n
k=0
pkQk.
Qk equal probability for all strings with k zeros.
Take P as n-fold i.i.d distribution, where ’0’ has probability r.
r*n k
p_k
Certainly, prn ≥ 1/(n + 1) ⇒ Qrn ≤ (n + 1)Pr .
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
Qrn ≤ (n + 1)Pr .
Prob[failure]P =
k
pkProb[failure]Qk
≤
k
pk(n + 1)Prob[failure]Pk/n
≤ (n + 1)
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
Quantum operation Λ
Input: n-qubit state
Output: success or failure (classical bit)
Post-selection Technique
Christandl, K¨onig, Renner, Phys. Rev. Lett. 102, 020504 (2009)
For any input |Ψ n
= |ψ ⊗n
Prob[failure] ≤ ,
then
Prob[failure] ≤ n3
for any state permutation-invariant state |Ψ .
Typically, ≈ 2−αn
, in information-theoretic tasks.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
The Quantum Key Distribution Protocol
Distribution |Ψ n
ABC = |ψ ⊗n
ABE
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Error-free? phone
If YES: key. If NO: no key
By assumption: Prob[failure] ≤
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
The Quantum Key Distribution Protocol
Distribution |Ψ n
ABC permutation-invariant (or general)
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Error-free? phone
If YES: key. If NO: no key
Post-selection tech.: Prob[failure] ≤ poly(n) ≈ poly(n)2−δ2n
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
security proof against the most general attacks
optimal security parameters
relevant in current experiments (since n ≈ 105
)
Eve’s best attack |Ψn
ABE = |ψABE
⊗n
conceptual and technical simplification of security proofs
Other applications: Quantum Reverse Shannon Theorem
Berta, Christandl and Renner, arXiv:0912.3805
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Summary
Quantum Key Distribution
Alice BobAlice Bob
Quantum de Finetti
De Finetti’s Theorem
Post-Selection Technique
optimal security parameters
applications outside quantum cryptography:
quantum Shannon theory and quantum tomography
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem

Weitere ähnliche Inhalte

Was ist angesagt?

Sienna 4 divideandconquer
Sienna 4 divideandconquerSienna 4 divideandconquer
Sienna 4 divideandconquerchidabdu
 
Direct method for soliton solution
Direct method for soliton solutionDirect method for soliton solution
Direct method for soliton solutionMOHANRAJ PHYSICS
 
Lesson 27: Integration by Substitution (Section 041 slides)
Lesson 27: Integration by Substitution (Section 041 slides)Lesson 27: Integration by Substitution (Section 041 slides)
Lesson 27: Integration by Substitution (Section 041 slides)Matthew Leingang
 
2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda2012 mdsp pr09 pca lda
2012 mdsp pr09 pca ldanozomuhamada
 
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...Steven Duplij (Stepan Douplii)
 
Chapter 4 dis 2011
Chapter 4 dis 2011Chapter 4 dis 2011
Chapter 4 dis 2011noraidawati
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Alexander Decker
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...Alexander Decker
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...Alexander Decker
 
Lesson 26: Integration by Substitution (handout)
Lesson 26: Integration by Substitution (handout)Lesson 26: Integration by Substitution (handout)
Lesson 26: Integration by Substitution (handout)Matthew Leingang
 
redes neuronales tipo Som
redes neuronales tipo Somredes neuronales tipo Som
redes neuronales tipo SomESCOM
 
Self Organinising neural networks
Self Organinising  neural networksSelf Organinising  neural networks
Self Organinising neural networksESCOM
 
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...IRJET Journal
 
2012 mdsp pr10 ica
2012 mdsp pr10 ica2012 mdsp pr10 ica
2012 mdsp pr10 icanozomuhamada
 
Solving the Poisson Equation
Solving the Poisson EquationSolving the Poisson Equation
Solving the Poisson EquationShahzaib Malik
 
Probability distributions for ml
Probability distributions for mlProbability distributions for ml
Probability distributions for mlSung Yub Kim
 
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...IJLT EMAS
 

Was ist angesagt? (20)

Sienna 4 divideandconquer
Sienna 4 divideandconquerSienna 4 divideandconquer
Sienna 4 divideandconquer
 
Direct method for soliton solution
Direct method for soliton solutionDirect method for soliton solution
Direct method for soliton solution
 
Lesson 27: Integration by Substitution (Section 041 slides)
Lesson 27: Integration by Substitution (Section 041 slides)Lesson 27: Integration by Substitution (Section 041 slides)
Lesson 27: Integration by Substitution (Section 041 slides)
 
2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda
 
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
 
Cdc18 dg lee
Cdc18 dg leeCdc18 dg lee
Cdc18 dg lee
 
Chapter 4 dis 2011
Chapter 4 dis 2011Chapter 4 dis 2011
Chapter 4 dis 2011
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
 
Lesson 26: Integration by Substitution (handout)
Lesson 26: Integration by Substitution (handout)Lesson 26: Integration by Substitution (handout)
Lesson 26: Integration by Substitution (handout)
 
Maurice_Hayward_FR
Maurice_Hayward_FRMaurice_Hayward_FR
Maurice_Hayward_FR
 
redes neuronales tipo Som
redes neuronales tipo Somredes neuronales tipo Som
redes neuronales tipo Som
 
Self Organinising neural networks
Self Organinising  neural networksSelf Organinising  neural networks
Self Organinising neural networks
 
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
 
2012 mdsp pr10 ica
2012 mdsp pr10 ica2012 mdsp pr10 ica
2012 mdsp pr10 ica
 
Statistical Physics Assignment Help
Statistical Physics Assignment Help Statistical Physics Assignment Help
Statistical Physics Assignment Help
 
Solving the Poisson Equation
Solving the Poisson EquationSolving the Poisson Equation
Solving the Poisson Equation
 
Probability distributions for ml
Probability distributions for mlProbability distributions for ml
Probability distributions for ml
 
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
 

Ähnlich wie Qkd and de finetti theorem

Towards "evidence based physics"
Towards "evidence based physics"Towards "evidence based physics"
Towards "evidence based physics"Richard Gill
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlwtyru1989
 
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...Catarina Moreira
 
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VECUnit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VECsundarKanagaraj1
 
Comparing 3-D Interpolation Techniques
Comparing 3-D Interpolation TechniquesComparing 3-D Interpolation Techniques
Comparing 3-D Interpolation TechniquesBinu Enchakalody
 
Epidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
Epidemiology Meets Quantum: Statistics, Causality, and Bell's TheoremEpidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
Epidemiology Meets Quantum: Statistics, Causality, and Bell's TheoremRichard Gill
 
Some Results on Common Fixed Point Theorems in Hilbert Space
Some Results on Common Fixed Point Theorems in Hilbert SpaceSome Results on Common Fixed Point Theorems in Hilbert Space
Some Results on Common Fixed Point Theorems in Hilbert SpaceBRNSS Publication Hub
 
L05 Mathematical Induction in Discrete Mathmatics.ppt
L05 Mathematical Induction in Discrete Mathmatics.pptL05 Mathematical Induction in Discrete Mathmatics.ppt
L05 Mathematical Induction in Discrete Mathmatics.pptgbikorno
 
Introduction to Bayesian Inference
Introduction to Bayesian InferenceIntroduction to Bayesian Inference
Introduction to Bayesian InferencePeter Chapman
 
Quantum technology
Quantum technologyQuantum technology
Quantum technologyeaiti
 
The Binomial,poisson _ Normal Distribution (1).ppt
The Binomial,poisson _ Normal Distribution (1).pptThe Binomial,poisson _ Normal Distribution (1).ppt
The Binomial,poisson _ Normal Distribution (1).pptIjaz Manzoor
 
Mathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxMathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxgbikorno
 
Mathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxMathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxgbikorno
 

Ähnlich wie Qkd and de finetti theorem (18)

Towards "evidence based physics"
Towards "evidence based physics"Towards "evidence based physics"
Towards "evidence based physics"
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
 
probability assignment help (2)
probability assignment help (2)probability assignment help (2)
probability assignment help (2)
 
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
 
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VECUnit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
 
Comparing 3-D Interpolation Techniques
Comparing 3-D Interpolation TechniquesComparing 3-D Interpolation Techniques
Comparing 3-D Interpolation Techniques
 
1542 inner products
1542 inner products1542 inner products
1542 inner products
 
Epidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
Epidemiology Meets Quantum: Statistics, Causality, and Bell's TheoremEpidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
Epidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
 
5_AJMS_231_19_RA.pdf
5_AJMS_231_19_RA.pdf5_AJMS_231_19_RA.pdf
5_AJMS_231_19_RA.pdf
 
Some Results on Common Fixed Point Theorems in Hilbert Space
Some Results on Common Fixed Point Theorems in Hilbert SpaceSome Results on Common Fixed Point Theorems in Hilbert Space
Some Results on Common Fixed Point Theorems in Hilbert Space
 
L05 Mathematical Induction in Discrete Mathmatics.ppt
L05 Mathematical Induction in Discrete Mathmatics.pptL05 Mathematical Induction in Discrete Mathmatics.ppt
L05 Mathematical Induction in Discrete Mathmatics.ppt
 
Introduction to Bayesian Inference
Introduction to Bayesian InferenceIntroduction to Bayesian Inference
Introduction to Bayesian Inference
 
Np cooks theorem
Np cooks theoremNp cooks theorem
Np cooks theorem
 
Quantum technology
Quantum technologyQuantum technology
Quantum technology
 
The Binomial,poisson _ Normal Distribution (1).ppt
The Binomial,poisson _ Normal Distribution (1).pptThe Binomial,poisson _ Normal Distribution (1).ppt
The Binomial,poisson _ Normal Distribution (1).ppt
 
Bell in paris
Bell in parisBell in paris
Bell in paris
 
Mathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxMathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptx
 
Mathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxMathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptx
 

Mehr von wtyru1989

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurementwtyru1989
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperialwtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemwtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementwtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecturewtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formationwtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rarewtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationswtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementwtyru1989
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectorswtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theorywtyru1989
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdwtyru1989
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codeswtyru1989
 
标量量化
标量量化标量量化
标量量化wtyru1989
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012wtyru1989
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1wtyru1989
 
Tsinghua visit
Tsinghua visitTsinghua visit
Tsinghua visitwtyru1989
 

Mehr von wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
 
Em method
Em methodEm method
Em method
 
标量量化
标量量化标量量化
标量量化
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1
 
Tsinghua visit
Tsinghua visitTsinghua visit
Tsinghua visit
 

Kürzlich hochgeladen

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Qkd and de finetti theorem

  • 1. Quantum Key Distribution and de Finetti’s Theorem Matthias Christandl Institute for Theoretical Physics, ETH Zurich June 2010 Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 2. Overview Introduction to Quantum Key Distribution Two tools for proving security: De Finetti’s Theorem Post-Selection Technique Summary Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 3. Quantum Key Distribution Alice und Bob want to communicate in secrecy, but their phone is tapped. Alice Eve Bob phone If they share key (string of secret random numbers), Alice Eve Bob message +key -------------- cipher cipher - key -------------- message cipher is random and message secure (Vernam, 1926) Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 4. Quantum Key Distribution key is as long as the message Shannon (1949): this is optimal secret communication ˆ= key distribution possible key distribution schemes: Alice and Bob meet ⇒ impractical Weaker level of security assumptions on speed of Eve’s computer (public key cryptography) assumptions on size of Eve’s harddrive (bounded storage model) Use quantum mechanical effects (Bennett & Brassard 1984, Ekert 1991) Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 5. Quantum Key Distribution Quantum mechanics governs atoms and photons Spin-1 2 system: points on the sphere cos θ eiϕ sin θ = cos θ|0 + eiϕ sin θ|1 ∈ C2 unit of information, the quantum bit or ”qubit” we measure a qubit along a basis if basis is {|0 , |1 }, we obtain ’0’ with probability cos2 θ. in general: express qubit in basis and consider |amplitude|2 . Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 6. Quantum Key Distribution The state of two qubits: |ψ ∈ C2 ⊗ C2 , ψ||ψ = 1 |ψ = ψ00|0 ⊗ |0 + ψ01|0 ⊗ |1 + ψ10|1 ⊗ |0 + ψ11|1 ⊗ |1 = ψ00|0 |0 + ψ01|0 |1 + ψ10|1 |0 + ψ11|1 |1 each qubit is measured in basis {|0 , |1 } measurement basis {|0 |0 , |0 |1 , |1 |0 , |1 |1 } obtain ’ij’ with probability |ψij |2 . Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 7. Quantum Key Distribution Entangled state of two qubits 1√ 2 (|0 A|0 B + |1 A|1 B) New basis |+ = 1 √ 2 (|0 + |1 ) |− = 1 √ 2 (|0 − |1 ) easy calculation 1 √ 2 (|0 A|0 B + |1 A|1 B) = 1 √ 2 (|+ A|+ B + |− A|− B) Alice and Bob measure in basis {|0 , |1 } ⇒ same result Alice and Bob measure in basis {|+ , |− } ⇒ same result Converse is true, too: same measurement result ⇒ they have state 1√ 2 (|0 A|0 B + |1 A|1 B) Alice and Bob can test whether or not they have the state 1√ 2 (|0 A|0 B + |1 A|1 B)! Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 8. Quantum Key Distribution Assume that Alice and Bob have the state |φ AB = 1√ 2 (|0 A|0 B + |1 A|1 B) and measure in the same basis. Can someone else guess the result? No! The measurement result is secure! Total state of Alice, Bob and Eve |ψ ABE = |φ AB ⊗ |φ E , because Alice and Bob have a pure state Eve is not at all correlated with Alice and Bob! Monogamy of entanglement Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 9. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 1 1 Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 10. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 1 2 1 2 Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 11. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 12. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 13. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Error-free? |φ AB ? = 1√ 2 (|0 A|0 B + |1 A|1 B ) phone Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 14. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Error-free? |φ AB ? = 1√ 2 (|0 A|0 B + |1 A|1 B ) phone If YES: key. If NO: no key Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 15. Quantum Key Distribution Proof works as long as |Ψ n ABC = |ψ ⊗n ABE . Alice Bob But why should Eve prepare such a state? Why not the following? Alice Bob We can assume: π|Ψ n ABC = |Ψ n ABC for all π ∈ Sn. Goal: two methods that reduce second to first case! Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 16. De Finetti’s Theorem De Finetti’s Theorem (Diaconis and Freedman, 1980) Drawing balls from an urn with or without replacement results in almost the same probability distribution. If k are drawn out of n, then ||Pk − i pi Q×k i ||1 ≤ const k n . Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 17. De Finetti’s Theorem Quantum generalisations by Størmer, Hudson & Moody, and Werner et al.. (n = ∞) Quantum De Finetti Theorem Christandl, K¨onig, Mitchison, Renner, Comm. Math. Phys. 273, 473498 (2007) Let |Ψ n be a permutation-invariant state: π|Ψ n = |Ψ n for all π ∈ Sn, then ||ρk − i pi |ψ ψ|⊗k i ||1 ≤ const k n Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 18. De Finetti’s Theorem Alice and Bob select a random sample of pairs (after pairs have been distributed!) Alice BobAlice Bob Quantum de Finetti ⇒ can use proof from before (tensor product) ⇒ proof of the security of Quantum Key Distribution! Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 19. De Finetti’s Theorem Closer look: deviation from perfect key (due to quantum de Finetti theorem) ≈ k/n n: number of pairs that Eve distributed k: number of bits of key key rate r ≈ k/n ≈ ≈ 0 ⇒ not good enough need replacement for de Finetti theorem Renner’s exp. de Finetti theorem, involved, non-optimal Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 20. Post-Selection Technique Statistical process Λ Input: n-bit string Output: success or failure Lemma If for any i.i.d. distribution Prob[failure] ≤ , then Prob[failure] ≤ (n + 1) for any permutation-invariant distribution. Typically, ≈ 2−αn , in information-theoretic tasks. Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 21. Post-Selection Technique Proof: P permutation-invariant distribution on n bits: P = n k=0 pkQk. Qk equal probability for all strings with k zeros. Take P as n-fold i.i.d distribution, where ’0’ has probability r. r*n k p_k Certainly, prn ≥ 1/(n + 1) ⇒ Qrn ≤ (n + 1)Pr . Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 22. Post-Selection Technique Qrn ≤ (n + 1)Pr . Prob[failure]P = k pkProb[failure]Qk ≤ k pk(n + 1)Prob[failure]Pk/n ≤ (n + 1) Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 23. Post-Selection Technique Quantum operation Λ Input: n-qubit state Output: success or failure (classical bit) Post-selection Technique Christandl, K¨onig, Renner, Phys. Rev. Lett. 102, 020504 (2009) For any input |Ψ n = |ψ ⊗n Prob[failure] ≤ , then Prob[failure] ≤ n3 for any state permutation-invariant state |Ψ . Typically, ≈ 2−αn , in information-theoretic tasks. Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 24. Post-Selection Technique The Quantum Key Distribution Protocol Distribution |Ψ n ABC = |ψ ⊗n ABE Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Error-free? phone If YES: key. If NO: no key By assumption: Prob[failure] ≤ Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 25. Post-Selection Technique The Quantum Key Distribution Protocol Distribution |Ψ n ABC permutation-invariant (or general) Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Error-free? phone If YES: key. If NO: no key Post-selection tech.: Prob[failure] ≤ poly(n) ≈ poly(n)2−δ2n Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 26. Post-Selection Technique security proof against the most general attacks optimal security parameters relevant in current experiments (since n ≈ 105 ) Eve’s best attack |Ψn ABE = |ψABE ⊗n conceptual and technical simplification of security proofs Other applications: Quantum Reverse Shannon Theorem Berta, Christandl and Renner, arXiv:0912.3805 Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 27. Summary Quantum Key Distribution Alice BobAlice Bob Quantum de Finetti De Finetti’s Theorem Post-Selection Technique optimal security parameters applications outside quantum cryptography: quantum Shannon theory and quantum tomography Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem