SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
Quantum Key Distribution
and de Finetti’s Theorem
Matthias Christandl
Institute for Theoretical Physics, ETH Zurich
June 2010
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Overview
Introduction to Quantum Key Distribution
Two tools for proving security:
De Finetti’s Theorem
Post-Selection Technique
Summary
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Alice und Bob want to communicate in secrecy, but their
phone is tapped.
Alice
Eve
Bob
phone
If they share key (string of secret random numbers),
Alice Eve Bob
message
+key
--------------
cipher cipher
- key
--------------
message
cipher is random and message secure (Vernam, 1926)
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
key is as long as the message
Shannon (1949): this is optimal
secret communication ˆ= key distribution
possible key distribution schemes:
Alice and Bob meet ⇒ impractical
Weaker level of security
assumptions on speed of Eve’s computer
(public key cryptography)
assumptions on size of Eve’s harddrive
(bounded storage model)
Use quantum mechanical effects
(Bennett & Brassard 1984, Ekert 1991)
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Quantum mechanics governs atoms and photons
Spin-1
2
system: points on the sphere
cos θ
eiϕ
sin θ
= cos θ|0 + eiϕ
sin θ|1 ∈ C2
unit of information, the quantum bit or ”qubit”
we measure a qubit along a basis
if basis is {|0 , |1 }, we obtain ’0’ with probability cos2
θ.
in general: express qubit in basis and consider
|amplitude|2
.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The state of two qubits: |ψ ∈ C2
⊗ C2
, ψ||ψ = 1
|ψ = ψ00|0 ⊗ |0 + ψ01|0 ⊗ |1 + ψ10|1 ⊗ |0 + ψ11|1 ⊗ |1
= ψ00|0 |0 + ψ01|0 |1 + ψ10|1 |0 + ψ11|1 |1
each qubit is measured in basis {|0 , |1 }
measurement basis {|0 |0 , |0 |1 , |1 |0 , |1 |1 }
obtain ’ij’ with probability |ψij |2
.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Entangled state of two qubits 1√
2
(|0 A|0 B + |1 A|1 B)
New basis
|+ =
1
√
2
(|0 + |1 ) |− =
1
√
2
(|0 − |1 )
easy calculation
1
√
2
(|0 A|0 B + |1 A|1 B) =
1
√
2
(|+ A|+ B + |− A|− B)
Alice and Bob measure in basis {|0 , |1 } ⇒ same result
Alice and Bob measure in basis {|+ , |− } ⇒ same result
Converse is true, too:
same measurement result ⇒ they have state
1√
2
(|0 A|0 B + |1 A|1 B)
Alice and Bob can test whether or not they have the
state 1√
2
(|0 A|0 B + |1 A|1 B)!
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Assume that Alice and Bob have the state
|φ AB = 1√
2
(|0 A|0 B + |1 A|1 B)
and measure in the same basis.
Can someone else guess the result?
No! The measurement result is secure!
Total state of Alice, Bob and Eve
|ψ ABE = |φ AB ⊗ |φ E ,
because Alice and Bob have a pure state
Eve is not at all correlated with Alice and Bob!
Monogamy of entanglement
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1
1 1
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2
1 2 1 2
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Error-free? |φ AB
?
= 1√
2
(|0 A|0 B + |1 A|1 B )
phone
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
The Quantum Key Distribution Protocol
Distribution
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Error-free? |φ AB
?
= 1√
2
(|0 A|0 B + |1 A|1 B )
phone
If YES: key. If NO: no key
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Quantum Key Distribution
Proof works as long as |Ψ n
ABC = |ψ ⊗n
ABE .
Alice Bob
But why should Eve prepare such a state?
Why not the following?
Alice Bob
We can assume: π|Ψ n
ABC = |Ψ n
ABC for all π ∈ Sn.
Goal: two methods that reduce second to first case!
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
De Finetti’s Theorem
De Finetti’s Theorem (Diaconis and Freedman, 1980)
Drawing balls from an urn with or without replacement results
in almost the same probability distribution.
If k are drawn out of n, then
||Pk
−
i
pi Q×k
i ||1 ≤ const
k
n
.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
De Finetti’s Theorem
Quantum generalisations by Størmer, Hudson & Moody, and
Werner et al.. (n = ∞)
Quantum De Finetti Theorem
Christandl, K¨onig, Mitchison, Renner, Comm. Math. Phys. 273, 473498 (2007)
Let |Ψ n
be a permutation-invariant state: π|Ψ n
= |Ψ n
for
all π ∈ Sn, then
||ρk
−
i
pi |ψ ψ|⊗k
i ||1 ≤ const
k
n
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
De Finetti’s Theorem
Alice and Bob select a random sample of pairs
(after pairs have been distributed!)
Alice BobAlice Bob
Quantum de Finetti
⇒ can use proof from before (tensor product)
⇒ proof of the security of Quantum Key Distribution!
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
De Finetti’s Theorem
Closer look: deviation from perfect key (due to quantum
de Finetti theorem)
≈ k/n
n: number of pairs that Eve distributed
k: number of bits of key
key rate r ≈ k/n ≈ ≈ 0 ⇒ not good enough
need replacement for de Finetti theorem
Renner’s exp. de Finetti theorem, involved, non-optimal
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
Statistical process Λ
Input: n-bit string
Output: success or failure
Lemma
If for any i.i.d. distribution
Prob[failure] ≤ ,
then
Prob[failure] ≤ (n + 1)
for any permutation-invariant distribution.
Typically, ≈ 2−αn
, in information-theoretic tasks.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
Proof: P permutation-invariant distribution on n bits:
P =
n
k=0
pkQk.
Qk equal probability for all strings with k zeros.
Take P as n-fold i.i.d distribution, where ’0’ has probability r.
r*n k
p_k
Certainly, prn ≥ 1/(n + 1) ⇒ Qrn ≤ (n + 1)Pr .
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
Qrn ≤ (n + 1)Pr .
Prob[failure]P =
k
pkProb[failure]Qk
≤
k
pk(n + 1)Prob[failure]Pk/n
≤ (n + 1)
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
Quantum operation Λ
Input: n-qubit state
Output: success or failure (classical bit)
Post-selection Technique
Christandl, K¨onig, Renner, Phys. Rev. Lett. 102, 020504 (2009)
For any input |Ψ n
= |ψ ⊗n
Prob[failure] ≤ ,
then
Prob[failure] ≤ n3
for any state permutation-invariant state |Ψ .
Typically, ≈ 2−αn
, in information-theoretic tasks.
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
The Quantum Key Distribution Protocol
Distribution |Ψ n
ABC = |ψ ⊗n
ABE
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Error-free? phone
If YES: key. If NO: no key
By assumption: Prob[failure] ≤
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
The Quantum Key Distribution Protocol
Distribution |Ψ n
ABC permutation-invariant (or general)
Alice
Eve
Bob
glass fibre
1 2 n
1 2 n 1 2 n
Measurement with {|0 , |1 } or {|+ , |− }
0 1 1 0 0 1
FE



FE



FE



FE



FE



FE



Error-free? phone
If YES: key. If NO: no key
Post-selection tech.: Prob[failure] ≤ poly(n) ≈ poly(n)2−δ2n
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Post-Selection Technique
security proof against the most general attacks
optimal security parameters
relevant in current experiments (since n ≈ 105
)
Eve’s best attack |Ψn
ABE = |ψABE
⊗n
conceptual and technical simplification of security proofs
Other applications: Quantum Reverse Shannon Theorem
Berta, Christandl and Renner, arXiv:0912.3805
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
Summary
Quantum Key Distribution
Alice BobAlice Bob
Quantum de Finetti
De Finetti’s Theorem
Post-Selection Technique
optimal security parameters
applications outside quantum cryptography:
quantum Shannon theory and quantum tomography
Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem

Weitere ähnliche Inhalte

Was ist angesagt?

Sienna 4 divideandconquer
Sienna 4 divideandconquerSienna 4 divideandconquer
Sienna 4 divideandconquerchidabdu
 
Direct method for soliton solution
Direct method for soliton solutionDirect method for soliton solution
Direct method for soliton solutionMOHANRAJ PHYSICS
 
Lesson 27: Integration by Substitution (Section 041 slides)
Lesson 27: Integration by Substitution (Section 041 slides)Lesson 27: Integration by Substitution (Section 041 slides)
Lesson 27: Integration by Substitution (Section 041 slides)Matthew Leingang
 
2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda2012 mdsp pr09 pca lda
2012 mdsp pr09 pca ldanozomuhamada
 
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...Steven Duplij (Stepan Douplii)
 
Chapter 4 dis 2011
Chapter 4 dis 2011Chapter 4 dis 2011
Chapter 4 dis 2011noraidawati
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Alexander Decker
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...Alexander Decker
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...Alexander Decker
 
Lesson 26: Integration by Substitution (handout)
Lesson 26: Integration by Substitution (handout)Lesson 26: Integration by Substitution (handout)
Lesson 26: Integration by Substitution (handout)Matthew Leingang
 
redes neuronales tipo Som
redes neuronales tipo Somredes neuronales tipo Som
redes neuronales tipo SomESCOM
 
Self Organinising neural networks
Self Organinising  neural networksSelf Organinising  neural networks
Self Organinising neural networksESCOM
 
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...IRJET Journal
 
2012 mdsp pr10 ica
2012 mdsp pr10 ica2012 mdsp pr10 ica
2012 mdsp pr10 icanozomuhamada
 
Solving the Poisson Equation
Solving the Poisson EquationSolving the Poisson Equation
Solving the Poisson EquationShahzaib Malik
 
Probability distributions for ml
Probability distributions for mlProbability distributions for ml
Probability distributions for mlSung Yub Kim
 
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...IJLT EMAS
 

Was ist angesagt? (20)

Sienna 4 divideandconquer
Sienna 4 divideandconquerSienna 4 divideandconquer
Sienna 4 divideandconquer
 
Direct method for soliton solution
Direct method for soliton solutionDirect method for soliton solution
Direct method for soliton solution
 
Lesson 27: Integration by Substitution (Section 041 slides)
Lesson 27: Integration by Substitution (Section 041 slides)Lesson 27: Integration by Substitution (Section 041 slides)
Lesson 27: Integration by Substitution (Section 041 slides)
 
2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda2012 mdsp pr09 pca lda
2012 mdsp pr09 pca lda
 
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
Steven Duplij, "Higher braid groups and regular semigroups from polyadic bina...
 
Cdc18 dg lee
Cdc18 dg leeCdc18 dg lee
Cdc18 dg lee
 
Chapter 4 dis 2011
Chapter 4 dis 2011Chapter 4 dis 2011
Chapter 4 dis 2011
 
Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...Numerical solution of fuzzy hybrid differential equation by third order runge...
Numerical solution of fuzzy hybrid differential equation by third order runge...
 
11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...11.numerical solution of fuzzy hybrid differential equation by third order ru...
11.numerical solution of fuzzy hybrid differential equation by third order ru...
 
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
11.[8 17]numerical solution of fuzzy hybrid differential equation by third or...
 
Lesson 26: Integration by Substitution (handout)
Lesson 26: Integration by Substitution (handout)Lesson 26: Integration by Substitution (handout)
Lesson 26: Integration by Substitution (handout)
 
Maurice_Hayward_FR
Maurice_Hayward_FRMaurice_Hayward_FR
Maurice_Hayward_FR
 
redes neuronales tipo Som
redes neuronales tipo Somredes neuronales tipo Som
redes neuronales tipo Som
 
Self Organinising neural networks
Self Organinising  neural networksSelf Organinising  neural networks
Self Organinising neural networks
 
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
IRJET- Wavelet based Galerkin Method for the Numerical Solution of One Dimens...
 
2012 mdsp pr10 ica
2012 mdsp pr10 ica2012 mdsp pr10 ica
2012 mdsp pr10 ica
 
Statistical Physics Assignment Help
Statistical Physics Assignment Help Statistical Physics Assignment Help
Statistical Physics Assignment Help
 
Solving the Poisson Equation
Solving the Poisson EquationSolving the Poisson Equation
Solving the Poisson Equation
 
Probability distributions for ml
Probability distributions for mlProbability distributions for ml
Probability distributions for ml
 
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
Optimum Solution of Quadratic Programming Problem: By Wolfe’s Modified Simple...
 

Ähnlich wie Qkd and de finetti theorem

Towards "evidence based physics"
Towards "evidence based physics"Towards "evidence based physics"
Towards "evidence based physics"Richard Gill
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlwtyru1989
 
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...Catarina Moreira
 
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VECUnit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VECsundarKanagaraj1
 
Comparing 3-D Interpolation Techniques
Comparing 3-D Interpolation TechniquesComparing 3-D Interpolation Techniques
Comparing 3-D Interpolation TechniquesBinu Enchakalody
 
Epidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
Epidemiology Meets Quantum: Statistics, Causality, and Bell's TheoremEpidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
Epidemiology Meets Quantum: Statistics, Causality, and Bell's TheoremRichard Gill
 
Some Results on Common Fixed Point Theorems in Hilbert Space
Some Results on Common Fixed Point Theorems in Hilbert SpaceSome Results on Common Fixed Point Theorems in Hilbert Space
Some Results on Common Fixed Point Theorems in Hilbert SpaceBRNSS Publication Hub
 
L05 Mathematical Induction in Discrete Mathmatics.ppt
L05 Mathematical Induction in Discrete Mathmatics.pptL05 Mathematical Induction in Discrete Mathmatics.ppt
L05 Mathematical Induction in Discrete Mathmatics.pptgbikorno
 
Introduction to Bayesian Inference
Introduction to Bayesian InferenceIntroduction to Bayesian Inference
Introduction to Bayesian InferencePeter Chapman
 
Quantum technology
Quantum technologyQuantum technology
Quantum technologyeaiti
 
The Binomial,poisson _ Normal Distribution (1).ppt
The Binomial,poisson _ Normal Distribution (1).pptThe Binomial,poisson _ Normal Distribution (1).ppt
The Binomial,poisson _ Normal Distribution (1).pptIjaz Manzoor
 
Mathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxMathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxgbikorno
 
Mathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxMathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxgbikorno
 

Ähnlich wie Qkd and de finetti theorem (18)

Towards "evidence based physics"
Towards "evidence based physics"Towards "evidence based physics"
Towards "evidence based physics"
 
Encrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandlEncrypting with entanglement matthias christandl
Encrypting with entanglement matthias christandl
 
probability assignment help (2)
probability assignment help (2)probability assignment help (2)
probability assignment help (2)
 
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
The Relation Between Acausality and Interference in Quantum-Like Bayesian Net...
 
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VECUnit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
Unit IV UNCERTAINITY AND STATISTICAL REASONING in AI K.Sundar,AP/CSE,VEC
 
Comparing 3-D Interpolation Techniques
Comparing 3-D Interpolation TechniquesComparing 3-D Interpolation Techniques
Comparing 3-D Interpolation Techniques
 
1542 inner products
1542 inner products1542 inner products
1542 inner products
 
Epidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
Epidemiology Meets Quantum: Statistics, Causality, and Bell's TheoremEpidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
Epidemiology Meets Quantum: Statistics, Causality, and Bell's Theorem
 
5_AJMS_231_19_RA.pdf
5_AJMS_231_19_RA.pdf5_AJMS_231_19_RA.pdf
5_AJMS_231_19_RA.pdf
 
Some Results on Common Fixed Point Theorems in Hilbert Space
Some Results on Common Fixed Point Theorems in Hilbert SpaceSome Results on Common Fixed Point Theorems in Hilbert Space
Some Results on Common Fixed Point Theorems in Hilbert Space
 
L05 Mathematical Induction in Discrete Mathmatics.ppt
L05 Mathematical Induction in Discrete Mathmatics.pptL05 Mathematical Induction in Discrete Mathmatics.ppt
L05 Mathematical Induction in Discrete Mathmatics.ppt
 
Introduction to Bayesian Inference
Introduction to Bayesian InferenceIntroduction to Bayesian Inference
Introduction to Bayesian Inference
 
Np cooks theorem
Np cooks theoremNp cooks theorem
Np cooks theorem
 
Quantum technology
Quantum technologyQuantum technology
Quantum technology
 
The Binomial,poisson _ Normal Distribution (1).ppt
The Binomial,poisson _ Normal Distribution (1).pptThe Binomial,poisson _ Normal Distribution (1).ppt
The Binomial,poisson _ Normal Distribution (1).ppt
 
Bell in paris
Bell in parisBell in paris
Bell in paris
 
Mathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxMathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptx
 
Mathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptxMathematical Reasoning in Discrete Mathmatics.pptx
Mathematical Reasoning in Discrete Mathmatics.pptx
 

Mehr von wtyru1989

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurementwtyru1989
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperialwtyru1989
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemwtyru1989
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementwtyru1989
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecturewtyru1989
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptographywtyru1989
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formationwtyru1989
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rarewtyru1989
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationswtyru1989
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementwtyru1989
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectorswtyru1989
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theorywtyru1989
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdwtyru1989
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07wtyru1989
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codeswtyru1989
 
标量量化
标量量化标量量化
标量量化wtyru1989
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012wtyru1989
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1wtyru1989
 
Tsinghua visit
Tsinghua visitTsinghua visit
Tsinghua visitwtyru1989
 

Mehr von wtyru1989 (20)

Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Gaussian discord imperial
Gaussian discord imperialGaussian discord imperial
Gaussian discord imperial
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Manipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglementManipulating continuous variable photonic entanglement
Manipulating continuous variable photonic entanglement
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
The security of quantum cryptography
The security of quantum cryptographyThe security of quantum cryptography
The security of quantum cryptography
 
Entanglement of formation
Entanglement of formationEntanglement of formation
Entanglement of formation
 
Bound entanglement is not rare
Bound entanglement is not rareBound entanglement is not rare
Bound entanglement is not rare
 
Continuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applicationsContinuous variable quantum entanglement and its applications
Continuous variable quantum entanglement and its applications
 
Relative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglementRelative entropy and_squahed_entanglement
Relative entropy and_squahed_entanglement
 
Lect12 photodiode detectors
Lect12 photodiode detectorsLect12 photodiode detectors
Lect12 photodiode detectors
 
Towards a one shot entanglement theory
Towards a one shot entanglement theoryTowards a one shot entanglement theory
Towards a one shot entanglement theory
 
Postselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkdPostselection technique for quantum channels and applications for qkd
Postselection technique for quantum channels and applications for qkd
 
Dic rd theory_quantization_07
Dic rd theory_quantization_07Dic rd theory_quantization_07
Dic rd theory_quantization_07
 
Lattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codesLattices, sphere packings, spherical codes
Lattices, sphere packings, spherical codes
 
Em method
Em methodEm method
Em method
 
标量量化
标量量化标量量化
标量量化
 
Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012Fully understanding cmrr taiwan-2012
Fully understanding cmrr taiwan-2012
 
Op amp tutorial-1
Op amp tutorial-1Op amp tutorial-1
Op amp tutorial-1
 
Tsinghua visit
Tsinghua visitTsinghua visit
Tsinghua visit
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Qkd and de finetti theorem

  • 1. Quantum Key Distribution and de Finetti’s Theorem Matthias Christandl Institute for Theoretical Physics, ETH Zurich June 2010 Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 2. Overview Introduction to Quantum Key Distribution Two tools for proving security: De Finetti’s Theorem Post-Selection Technique Summary Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 3. Quantum Key Distribution Alice und Bob want to communicate in secrecy, but their phone is tapped. Alice Eve Bob phone If they share key (string of secret random numbers), Alice Eve Bob message +key -------------- cipher cipher - key -------------- message cipher is random and message secure (Vernam, 1926) Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 4. Quantum Key Distribution key is as long as the message Shannon (1949): this is optimal secret communication ˆ= key distribution possible key distribution schemes: Alice and Bob meet ⇒ impractical Weaker level of security assumptions on speed of Eve’s computer (public key cryptography) assumptions on size of Eve’s harddrive (bounded storage model) Use quantum mechanical effects (Bennett & Brassard 1984, Ekert 1991) Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 5. Quantum Key Distribution Quantum mechanics governs atoms and photons Spin-1 2 system: points on the sphere cos θ eiϕ sin θ = cos θ|0 + eiϕ sin θ|1 ∈ C2 unit of information, the quantum bit or ”qubit” we measure a qubit along a basis if basis is {|0 , |1 }, we obtain ’0’ with probability cos2 θ. in general: express qubit in basis and consider |amplitude|2 . Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 6. Quantum Key Distribution The state of two qubits: |ψ ∈ C2 ⊗ C2 , ψ||ψ = 1 |ψ = ψ00|0 ⊗ |0 + ψ01|0 ⊗ |1 + ψ10|1 ⊗ |0 + ψ11|1 ⊗ |1 = ψ00|0 |0 + ψ01|0 |1 + ψ10|1 |0 + ψ11|1 |1 each qubit is measured in basis {|0 , |1 } measurement basis {|0 |0 , |0 |1 , |1 |0 , |1 |1 } obtain ’ij’ with probability |ψij |2 . Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 7. Quantum Key Distribution Entangled state of two qubits 1√ 2 (|0 A|0 B + |1 A|1 B) New basis |+ = 1 √ 2 (|0 + |1 ) |− = 1 √ 2 (|0 − |1 ) easy calculation 1 √ 2 (|0 A|0 B + |1 A|1 B) = 1 √ 2 (|+ A|+ B + |− A|− B) Alice and Bob measure in basis {|0 , |1 } ⇒ same result Alice and Bob measure in basis {|+ , |− } ⇒ same result Converse is true, too: same measurement result ⇒ they have state 1√ 2 (|0 A|0 B + |1 A|1 B) Alice and Bob can test whether or not they have the state 1√ 2 (|0 A|0 B + |1 A|1 B)! Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 8. Quantum Key Distribution Assume that Alice and Bob have the state |φ AB = 1√ 2 (|0 A|0 B + |1 A|1 B) and measure in the same basis. Can someone else guess the result? No! The measurement result is secure! Total state of Alice, Bob and Eve |ψ ABE = |φ AB ⊗ |φ E , because Alice and Bob have a pure state Eve is not at all correlated with Alice and Bob! Monogamy of entanglement Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 9. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 1 1 Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 10. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 1 2 1 2 Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 11. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 12. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 13. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Error-free? |φ AB ? = 1√ 2 (|0 A|0 B + |1 A|1 B ) phone Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 14. Quantum Key Distribution The Quantum Key Distribution Protocol Distribution Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Error-free? |φ AB ? = 1√ 2 (|0 A|0 B + |1 A|1 B ) phone If YES: key. If NO: no key Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 15. Quantum Key Distribution Proof works as long as |Ψ n ABC = |ψ ⊗n ABE . Alice Bob But why should Eve prepare such a state? Why not the following? Alice Bob We can assume: π|Ψ n ABC = |Ψ n ABC for all π ∈ Sn. Goal: two methods that reduce second to first case! Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 16. De Finetti’s Theorem De Finetti’s Theorem (Diaconis and Freedman, 1980) Drawing balls from an urn with or without replacement results in almost the same probability distribution. If k are drawn out of n, then ||Pk − i pi Q×k i ||1 ≤ const k n . Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 17. De Finetti’s Theorem Quantum generalisations by Størmer, Hudson & Moody, and Werner et al.. (n = ∞) Quantum De Finetti Theorem Christandl, K¨onig, Mitchison, Renner, Comm. Math. Phys. 273, 473498 (2007) Let |Ψ n be a permutation-invariant state: π|Ψ n = |Ψ n for all π ∈ Sn, then ||ρk − i pi |ψ ψ|⊗k i ||1 ≤ const k n Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 18. De Finetti’s Theorem Alice and Bob select a random sample of pairs (after pairs have been distributed!) Alice BobAlice Bob Quantum de Finetti ⇒ can use proof from before (tensor product) ⇒ proof of the security of Quantum Key Distribution! Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 19. De Finetti’s Theorem Closer look: deviation from perfect key (due to quantum de Finetti theorem) ≈ k/n n: number of pairs that Eve distributed k: number of bits of key key rate r ≈ k/n ≈ ≈ 0 ⇒ not good enough need replacement for de Finetti theorem Renner’s exp. de Finetti theorem, involved, non-optimal Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 20. Post-Selection Technique Statistical process Λ Input: n-bit string Output: success or failure Lemma If for any i.i.d. distribution Prob[failure] ≤ , then Prob[failure] ≤ (n + 1) for any permutation-invariant distribution. Typically, ≈ 2−αn , in information-theoretic tasks. Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 21. Post-Selection Technique Proof: P permutation-invariant distribution on n bits: P = n k=0 pkQk. Qk equal probability for all strings with k zeros. Take P as n-fold i.i.d distribution, where ’0’ has probability r. r*n k p_k Certainly, prn ≥ 1/(n + 1) ⇒ Qrn ≤ (n + 1)Pr . Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 22. Post-Selection Technique Qrn ≤ (n + 1)Pr . Prob[failure]P = k pkProb[failure]Qk ≤ k pk(n + 1)Prob[failure]Pk/n ≤ (n + 1) Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 23. Post-Selection Technique Quantum operation Λ Input: n-qubit state Output: success or failure (classical bit) Post-selection Technique Christandl, K¨onig, Renner, Phys. Rev. Lett. 102, 020504 (2009) For any input |Ψ n = |ψ ⊗n Prob[failure] ≤ , then Prob[failure] ≤ n3 for any state permutation-invariant state |Ψ . Typically, ≈ 2−αn , in information-theoretic tasks. Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 24. Post-Selection Technique The Quantum Key Distribution Protocol Distribution |Ψ n ABC = |ψ ⊗n ABE Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Error-free? phone If YES: key. If NO: no key By assumption: Prob[failure] ≤ Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 25. Post-Selection Technique The Quantum Key Distribution Protocol Distribution |Ψ n ABC permutation-invariant (or general) Alice Eve Bob glass fibre 1 2 n 1 2 n 1 2 n Measurement with {|0 , |1 } or {|+ , |− } 0 1 1 0 0 1 FE FE FE FE FE FE Error-free? phone If YES: key. If NO: no key Post-selection tech.: Prob[failure] ≤ poly(n) ≈ poly(n)2−δ2n Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 26. Post-Selection Technique security proof against the most general attacks optimal security parameters relevant in current experiments (since n ≈ 105 ) Eve’s best attack |Ψn ABE = |ψABE ⊗n conceptual and technical simplification of security proofs Other applications: Quantum Reverse Shannon Theorem Berta, Christandl and Renner, arXiv:0912.3805 Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem
  • 27. Summary Quantum Key Distribution Alice BobAlice Bob Quantum de Finetti De Finetti’s Theorem Post-Selection Technique optimal security parameters applications outside quantum cryptography: quantum Shannon theory and quantum tomography Matthias Christandl Quantum Key Distribution and de Finetti’s Theorem