Equivalence of three classical algorithms with quantum side information:
Privacy amplification, error correction, and data compression
- URL: http://arxiv.org/abs/2009.08823v2
- Date: Fri, 5 Nov 2021 00:20:05 GMT
- Title: Equivalence of three classical algorithms with quantum side information:
Privacy amplification, error correction, and data compression
- Authors: Toyohiro Tsurumaru
- Abstract summary: Privacy amplification (PA) is an indispensable component in classical and quantum cryptography.
Error correction (EC) and data compression (DC) algorithms are also indispensable in classical and quantum information theory.
We show that they all become equivalent in the one-shot scenario.
- Score: 6.09170287691728
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Privacy amplification (PA) is an indispensable component in classical and
quantum cryptography. Error correction (EC) and data compression (DC)
algorithms are also indispensable in classical and quantum information theory.
We here study these three algorithms (PA, EC, and DC) in the presence of
quantum side information, and show that they all become equivalent in the
one-shot scenario. As an application of this equivalence, we take previously
known security bounds of PA, and translate them into coding theorems for EC and
DC which have not been obtained previously. Further, we apply these results to
simplify and improve our previous result that the two prevalent approaches to
the security proof of quantum key distribution (QKD) are equivalent. We also
propose a new method to simplify the security proof of QKD.
Related papers
- Quantum Subroutine for Variance Estimation: Algorithmic Design and Applications [80.04533958880862]
Quantum computing sets the foundation for new ways of designing algorithms.
New challenges arise concerning which field quantum speedup can be achieved.
Looking for the design of quantum subroutines that are more efficient than their classical counterpart poses solid pillars to new powerful quantum algorithms.
arXiv Detail & Related papers (2024-02-26T09:32:07Z) - Dimensional advantage in secure information trading via the noisy dense
coding protocol [0.0]
We present the DC-based QKD protocol for higher dimensional systems.
We report the lower bounds on secret key rate, when the shared state is a two-qudit maximally entangled state.
We prove that the set of useless states in the DC-based QKD protocol is convex and compact.
arXiv Detail & Related papers (2023-10-31T17:50:48Z) - Improving the performance of quantum cryptography by using the
encryption of the error correction data [0.0]
We introduce the idea of encrypting classical communication related to error-correction in order to decrease the amount of information available to the eavesdropper.
We analyze the applicability of the method in the context of additional assumptions concerning the eavesdropper's quantum memory coherence time.
arXiv Detail & Related papers (2023-06-21T15:42:54Z) - Encryption with Quantum Public Keys [1.7725414095035827]
We study the question of building quantum public-key encryption schemes from one-way functions and even weaker assumptions.
We propose three schemes for quantum public-key encryption from one-way functions, pseudorandom function-like states with proof of deletion and pseudorandom function-like states, respectively.
arXiv Detail & Related papers (2023-03-09T16:17:19Z) - Gaussian conversion protocol for heralded generation of qunaught states [66.81715281131143]
bosonic codes map qubit-type quantum information onto the larger bosonic Hilbert space.
We convert between two instances of these codes GKP qunaught states and four-foldsymmetric binomial states corresponding to a zero-logical encoded qubit.
We obtain GKP qunaught states with a fidelity of over 98% and a probability of approximately 3.14%.
arXiv Detail & Related papers (2023-01-24T14:17:07Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - A general framework for the composition of quantum homomorphic
encryption \& quantum error correction [6.85316573653194]
Two essential primitives for universal, cloud-based quantum computation are quantum homomorphic encryption with information-theoretic security and quantum error correction.
We apply our framework to both discrete- and continuous-variable models for quantum computation.
arXiv Detail & Related papers (2022-04-22T02:47:07Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Security of the decoy state method for quantum key distribution [0.0]
Quantum cryptography or, more precisely, quantum key distribution (QKD) is one of the advanced areas in the field of quantum technologies.
This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols.
arXiv Detail & Related papers (2021-01-25T14:33:04Z) - Using Quantum Metrological Bounds in Quantum Error Correction: A Simple
Proof of the Approximate Eastin-Knill Theorem [77.34726150561087]
We present a proof of the approximate Eastin-Knill theorem, which connects the quality of a quantum error-correcting code with its ability to achieve a universal set of logical gates.
Our derivation employs powerful bounds on the quantum Fisher information in generic quantum metrological protocols.
arXiv Detail & Related papers (2020-04-24T17:58:10Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.