Entropy bounds for multiparty device-independent cryptography
- URL: http://arxiv.org/abs/2004.14263v3
- Date: Fri, 18 Dec 2020 12:00:05 GMT
- Title: Entropy bounds for multiparty device-independent cryptography
- Authors: Federico Grasselli, Gl\'aucia Murta, Hermann Kampermann, Dagmar
Bru{\ss}
- Abstract summary: We show that genuine multipartite entanglement is necessary to certify the privacy of a party's outcome.
We obtain the entropy bounds thanks to two general results of independent interest.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Multiparty quantum cryptography based on distributed entanglement will find
its natural application in the upcoming quantum networks. The security of many
multipartite device-independent (DI) protocols, such as DI conference key
agreement, relies on bounding the von Neumann entropy of the parties' outcomes
conditioned on the eavesdropper's information, given the violation of a
multipartite Bell inequality. We consider three parties testing the
Mermin-Ardehali-Belinskii-Klyshko (MABK) inequality and certify the privacy of
their outcomes by bounding the conditional entropy of a single party's outcome
and the joint conditional entropy of two parties' outcomes. From the former
bound, we show that genuine multipartite entanglement is necessary to certify
the privacy of a party's outcome, while the latter significantly improve
previous results. We obtain the entropy bounds thanks to two general results of
independent interest. The first one drastically simplifies the quantum setup of
an $N$-partite Bell scenario. The second one provides an upper bound on the
violation of the MABK inequality by an arbitrary $N$-qubit state, as a function
of the state's parameters.
Related papers
- The multimode conditional quantum Entropy Power Inequality and the squashed entanglement of the extreme multimode bosonic Gaussian channels [53.253900735220796]
Inequality determines the minimum conditional von Neumann entropy of the output of the most general linear mixing of bosonic quantum modes.
Bosonic quantum systems constitute the mathematical model for the electromagnetic radiation in the quantum regime.
arXiv Detail & Related papers (2024-10-18T13:59:50Z) - Optimal quantum violations of n-locality inequalities with conditional
dependence on inputs [0.0]
Bell experiment in the network gives rise to a form of quantum nonlocality which is conceptually different from traditional multipartite Bell nonlocality.
We introduce an elegant sum-of-squares approach that enables the optimization in quantum theory without specifying the dimension of the quantum system.
arXiv Detail & Related papers (2023-11-08T11:51:04Z) - Multipartite entanglement theory with entanglement-nonincreasing
operations [91.3755431537592]
We extend the resource theory of entanglement for multipartite systems beyond the standard framework of local operations and classical communication.
We demonstrate that in this adjusted framework, the transformation rates between multipartite states are fundamentally dictated by the bipartite entanglement entropies of the respective quantum states.
arXiv Detail & Related papers (2023-05-30T12:53:56Z) - Experimental certification of more than one bit of quantum randomness in
the two inputs and two outputs scenario [0.0]
We present an experimental realization of recent Bell-type operators designed to provide private random numbers that are secure against adversaries with quantum resources.
We use semi-definite programming to provide lower bounds on the generated randomness in terms of both min-entropy and von Neumann entropy.
Our results demonstrate the first experiment that certifies close to two bits of randomness from binary measurements of two parties.
arXiv Detail & Related papers (2023-03-13T20:42:53Z) - Multipartite quantum cryptography based on the violation of Svetlichny's
inequality [12.717839871971517]
We present a quantum key distribution scheme in which three separated observers can securely share a set of keys.
We prove that the violation of Svetlichny's inequality can be utilized to test for eavesdropping.
arXiv Detail & Related papers (2023-02-23T04:23:43Z) - Boosting device-independent cryptography with tripartite nonlocality [0.0]
Device-independent (DI) protocols certify private randomness by observing nonlocal correlations when two or more parties test a Bell inequality.
Here, we consider tripartite DICKA and DIRE protocols based on testing multipartite Bell inequalities.
We show that DICKA and DIRE protocols employing tripartite Bell inequalities can significantly outperform their bipartite counterparts.
arXiv Detail & Related papers (2022-09-26T16:35:03Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Tight Exponential Analysis for Smoothing the Max-Relative Entropy and
for Quantum Privacy Amplification [56.61325554836984]
The max-relative entropy together with its smoothed version is a basic tool in quantum information theory.
We derive the exact exponent for the decay of the small modification of the quantum state in smoothing the max-relative entropy based on purified distance.
arXiv Detail & Related papers (2021-11-01T16:35:41Z) - Experimental violations of Leggett-Garg's inequalities on a quantum
computer [77.34726150561087]
We experimentally observe the violations of Leggett-Garg-Bell's inequalities on single and multi-qubit systems.
Our analysis highlights the limits of nowadays quantum platforms, showing that the above-mentioned correlation functions deviate from theoretical prediction as the number of qubits and the depth of the circuit grow.
arXiv Detail & Related papers (2021-09-06T14:35:15Z) - Computing conditional entropies for quantum correlations [10.549307055348596]
In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution.
We introduce the family of iterated mean quantum R'enyi divergences with parameters $alpha_k = 1+frac12k-1$ for positive integers $k$.
We show that the corresponding conditional entropies admit a particularly nice form which, in the context of device-independent optimization, can be relaxed to a semidefinite programming problem.
arXiv Detail & Related papers (2020-07-24T15:27:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.