Computing conditional entropies for quantum correlations
- URL: http://arxiv.org/abs/2007.12575v2
- Date: Fri, 21 Aug 2020 14:03:03 GMT
- Title: Computing conditional entropies for quantum correlations
- Authors: Peter Brown, Hamza Fawzi and Omar Fawzi
- Abstract summary: In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution.
We introduce the family of iterated mean quantum R'enyi divergences with parameters $alpha_k = 1+frac12k-1$ for positive integers $k$.
We show that the corresponding conditional entropies admit a particularly nice form which, in the context of device-independent optimization, can be relaxed to a semidefinite programming problem.
- Score: 10.549307055348596
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The rates of quantum cryptographic protocols are usually expressed in terms
of a conditional entropy minimized over a certain set of quantum states. In
particular, in the device-independent setting, the minimization is over all the
quantum states jointly held by the adversary and the parties that are
consistent with the statistics that are seen by the parties. Here, we introduce
a method to approximate such entropic quantities. Applied to the setting of
device-independent randomness generation and quantum key distribution, we
obtain improvements on protocol rates in various settings. In particular, we
find new upper bounds on the minimal global detection efficiency required to
perform device-independent quantum key distribution without additional
preprocessing. Furthermore, we show that our construction can be readily
combined with the entropy accumulation theorem in order to establish full
finite-key security proofs for these protocols. In order to achieve this we
introduce the family of iterated mean quantum R\'enyi divergences with
parameters $\alpha_k = 1+\frac{1}{2^{k}-1}$ for positive integers $k$. We then
show that the corresponding conditional entropies admit a particularly nice
form which, in the context of device-independent optimization, can be relaxed
to a semidefinite programming problem using the Navascu\'es-Pironio-Ac\'in
hierarchy.
Related papers
- Bounding the conditional von-Neumann entropy for device independent cryptography and randomness extraction [0.0]
This paper introduces a numerical framework for establishing lower bounds on the conditional von-Neumann entropy in device-independent quantum cryptography and randomness extraction scenarios.
The framework offers an adaptable tool for practical quantum cryptographic protocols, expanding secure communication in untrusted environments.
arXiv Detail & Related papers (2024-11-07T16:48:49Z) - Generalized quantum asymptotic equipartition [11.59751616011475]
We prove that all operationally relevant divergences converge to the quantum relative entropy between two sets of quantum states.
In particular, both the smoothed min-relative entropy between two sequential processes of quantum channels can be lower bounded by the sum of the regularized minimum output channel divergences.
We apply our generalized AEP to quantum resource theories and provide improved and efficient bounds for entanglement distillation, magic state distillation, and the entanglement cost of quantum states and channels.
arXiv Detail & Related papers (2024-11-06T16:33:16Z) - One-Shot Min-Entropy Calculation And Its Application To Quantum Cryptography [21.823963925581868]
We develop a one-shot lower bound calculation technique for the min-entropy of a classical-quantum state.
It gives an alternative tight finite-data analysis for the well-known BB84 quantum key distribution protocol.
It provides a security proof for a novel source-independent continuous-variable quantum random number generation protocol.
arXiv Detail & Related papers (2024-06-21T15:11:26Z) - Quantum process tomography of continuous-variable gates using coherent
states [49.299443295581064]
We demonstrate the use of coherent-state quantum process tomography (csQPT) for a bosonic-mode superconducting circuit.
We show results for this method by characterizing a logical quantum gate constructed using displacement and SNAP operations on an encoded qubit.
arXiv Detail & Related papers (2023-03-02T18:08:08Z) - Improved Quantum Algorithms for Fidelity Estimation [77.34726150561087]
We develop new and efficient quantum algorithms for fidelity estimation with provable performance guarantees.
Our algorithms use advanced quantum linear algebra techniques, such as the quantum singular value transformation.
We prove that fidelity estimation to any non-trivial constant additive accuracy is hard in general.
arXiv Detail & Related papers (2022-03-30T02:02:16Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Bounds on semi-device-independent quantum random number expansion
capabilities [0.0]
It's explicitly proved that the maximum certifiable entropy that can be obtained through this set of protocols is $-logleft[frac12left+frac1sqrt3right]$.
It's also established that certifiable entropy can be generated as soon as dimension witness crosses the classical bound, making the protocol noise-robust and useful in practical applications.
arXiv Detail & Related papers (2021-11-28T08:54:49Z) - Quantum Complementarity Approach to Device-Independent Security [2.782396962787398]
We show the complementarity security origin of device-independent quantum cryptography tasks.
We generalize the sample entropy in classical Shannon theory for the finite-size analysis.
Applying it to the data in a recent ion-trap-based device-independent quantum key distribution experiment, one could reduce the requirement on data size to less than a third.
arXiv Detail & Related papers (2021-11-27T09:42:44Z) - Tight Exponential Analysis for Smoothing the Max-Relative Entropy and
for Quantum Privacy Amplification [56.61325554836984]
The max-relative entropy together with its smoothed version is a basic tool in quantum information theory.
We derive the exact exponent for the decay of the small modification of the quantum state in smoothing the max-relative entropy based on purified distance.
arXiv Detail & Related papers (2021-11-01T16:35:41Z) - Realization of arbitrary doubly-controlled quantum phase gates [62.997667081978825]
We introduce a high-fidelity gate set inspired by a proposal for near-term quantum advantage in optimization problems.
By orchestrating coherent, multi-level control over three transmon qutrits, we synthesize a family of deterministic, continuous-angle quantum phase gates acting in the natural three-qubit computational basis.
arXiv Detail & Related papers (2021-08-03T17:49:09Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.