From Information Theory Puzzles in Deletion Channels to Deniability in
Quantum Cryptography
- URL: http://arxiv.org/abs/2003.11663v1
- Date: Wed, 25 Mar 2020 22:20:47 GMT
- Title: From Information Theory Puzzles in Deletion Channels to Deniability in
Quantum Cryptography
- Authors: Arash Atashpendar
- Abstract summary: We first conjecture on the basis of experimental data that the entropy of the posterior is minimized by the constant strings.
We then establish a connection between covert communication and deniability to propose DC-QKE.
We present an efficient coercion-resistant and quantum-secure voting scheme, based on fully homomorphic encryption.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: From the output produced by a memoryless deletion channel with a uniformly
random input of known length $n$, one obtains a posterior distribution on the
channel input. The difference between the Shannon entropy of this distribution
and that of the uniform prior measures the amount of information about the
channel input which is conveyed by the output of length $m$. We first
conjecture on the basis of experimental data that the entropy of the posterior
is minimized by the constant strings $\texttt{000}\ldots$, $\texttt{111}\ldots$
and maximized by the alternating strings $\texttt{0101}\ldots$,
$\texttt{1010}\ldots$. We present related combinatorial theorems involving
binary (sub/super)-sequences and prove the minimal entropy conjecture for
single and double deletions using clustering techniques. We then prove the
minimization conjecture in the asymptotic limit using results from hidden word
statistics by showing how the analytic-combinatorial methods of Flajolet,
Szpankowski and Vall\'ee, relying on generating functions, can be applied to
resolve the case of fixed output length and $n\rightarrow\infty$.
Next, we revisit the notion of deniability in quantum key exchange (QKE). We
introduce and formalize the notion of coercer-deniable QKE. We then establish a
connection between covert communication and deniability to propose DC-QKE, a
simple and provably secure construction for coercer-deniable QKE. We relate
deniability to fundamental concepts in quantum information theory and suggest a
generic approach based on entanglement distillation for achieving
information-theoretic deniability, followed by an analysis of other closely
related results such as the relation between the impossibility of
unconditionally secure quantum bit commitment and deniability. Finally, we
present an efficient coercion-resistant and quantum-secure voting scheme, based
on fully homomorphic encryption.
Related papers
- Non-asymptotic bounds for forward processes in denoising diffusions: Ornstein-Uhlenbeck is hard to beat [49.1574468325115]
This paper presents explicit non-asymptotic bounds on the forward diffusion error in total variation (TV)
We parametrise multi-modal data distributions in terms of the distance $R$ to their furthest modes and consider forward diffusions with additive and multiplicative noise.
arXiv Detail & Related papers (2024-08-25T10:28:31Z) - Unveiling the Statistical Foundations of Chain-of-Thought Prompting Methods [59.779795063072655]
Chain-of-Thought (CoT) prompting and its variants have gained popularity as effective methods for solving multi-step reasoning problems.
We analyze CoT prompting from a statistical estimation perspective, providing a comprehensive characterization of its sample complexity.
arXiv Detail & Related papers (2024-08-25T04:07:18Z) - Learning with Norm Constrained, Over-parameterized, Two-layer Neural Networks [54.177130905659155]
Recent studies show that a reproducing kernel Hilbert space (RKHS) is not a suitable space to model functions by neural networks.
In this paper, we study a suitable function space for over- parameterized two-layer neural networks with bounded norms.
arXiv Detail & Related papers (2024-04-29T15:04:07Z) - Deterministic identification over channels with finite output: a
dimensional perspective on superlinear rates [53.66705737169404]
We consider the problem in its generality for memoryless channels with finite output, but arbitrary input alphabets.
Our main findings are that the maximum number of messages thus identifiable scales super-exponentially as $2R,nlog n$ with the block length $n$.
Results are shown to generalise directly to classical-quantum channels with finite-dimensional output quantum system.
arXiv Detail & Related papers (2024-02-14T11:59:30Z) - Stochastic Quantum Sampling for Non-Logconcave Distributions and
Estimating Partition Functions [13.16814860487575]
We present quantum algorithms for sampling from nonlogconcave probability distributions.
$f$ can be written as a finite sum $f(x):= frac1Nsum_k=1N f_k(x)$.
arXiv Detail & Related papers (2023-10-17T17:55:32Z) - Simple and Tighter Derivation of Achievability for Classical
Communication over Quantum Channels [7.88657961743755]
In this work, we show that the pretty-good measurement naturally plays a role as the union bound as well.
A judicious application of it considerably simplifies the derivation of one-shot achievability for classical-quantum (c-q) channel coding via an elegant three-line proof.
The proposed method applies to deriving one-shot achievability for classical data compression with quantum side information, entanglement-assisted classical communication over quantum channels, and various quantum network information-processing protocols.
arXiv Detail & Related papers (2022-08-03T15:12:01Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Realization of arbitrary doubly-controlled quantum phase gates [62.997667081978825]
We introduce a high-fidelity gate set inspired by a proposal for near-term quantum advantage in optimization problems.
By orchestrating coherent, multi-level control over three transmon qutrits, we synthesize a family of deterministic, continuous-angle quantum phase gates acting in the natural three-qubit computational basis.
arXiv Detail & Related papers (2021-08-03T17:49:09Z) - Simple and practical DIQKD security analysis via BB84-type uncertainty
relations and Pauli correlation constraints [0.0]
In this work, we describe how the conditional entropy can be bounded in the 2-input/2-output setting.
We illustrate the approach on a variant of the device-independent CHSH QKD protocol where both bases are used to generate the key.
arXiv Detail & Related papers (2021-07-19T14:08:43Z) - Computing conditional entropies for quantum correlations [10.549307055348596]
In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution.
We introduce the family of iterated mean quantum R'enyi divergences with parameters $alpha_k = 1+frac12k-1$ for positive integers $k$.
We show that the corresponding conditional entropies admit a particularly nice form which, in the context of device-independent optimization, can be relaxed to a semidefinite programming problem.
arXiv Detail & Related papers (2020-07-24T15:27:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.