Marginal-constrained entropy accumulation theorem
- URL: http://arxiv.org/abs/2502.02563v2
- Date: Thu, 13 Feb 2025 18:21:57 GMT
- Title: Marginal-constrained entropy accumulation theorem
- Authors: Amir Arqand, Ernest Y. -Z. Tan,
- Abstract summary: We show that channel conditional entropies are equal to their regularized version, and more generally, additive across tensor products of channels.
For the purposes of cryptography, applying our chain rule to sequences of channels yields a new variant of R'enyi entropy accumulation.
- Score: 0.0
- License:
- Abstract: We derive a novel chain rule for a family of channel conditional entropies, covering von Neumann and sandwiched R\'{e}nyi entropies. In the process, we show that these channel conditional entropies are equal to their regularized version, and more generally, additive across tensor products of channels. For the purposes of cryptography, applying our chain rule to sequences of channels yields a new variant of R\'{e}nyi entropy accumulation, in which we can impose some specific forms of marginal-state constraint on the input states to each individual channel. This generalizes a recently introduced security proof technique that was developed to analyze prepare-and-measure QKD with no limitations on the repetition rate. In particular, our generalization yields ``fully adaptive'' protocols that can in principle update the entropy estimation procedure during the protocol itself, similar to the quantum probability estimation framework.
Related papers
- Additivity and chain rules for quantum entropies via multi-index Schatten norms [6.574756524825567]
We establish a general additivity statement for the optimized sandwiched R'enyi entropy of quantum channels.
As an application, we strengthen the additivity statement of [Van Himbeeck and Brown, 2025] thus allowing the analysis of time-adaptive quantum cryptographic protocols.
arXiv Detail & Related papers (2025-02-03T18:44:59Z) - Generalized Rényi entropy accumulation theorem and generalized quantum probability estimation [0.0]
entropy accumulation theorem is a powerful tool in the security analysis of many device-dependent and device-independent cryptography protocols.
It relies on the construction of an affine min-tradeoff function, which can often be challenging to construct optimally in practice.
We deriving a new entropy accumulation bound, which yields significantly better finite-size performance.
arXiv Detail & Related papers (2024-05-09T17:11:00Z) - Adaptive Annealed Importance Sampling with Constant Rate Progress [68.8204255655161]
Annealed Importance Sampling (AIS) synthesizes weighted samples from an intractable distribution.
We propose the Constant Rate AIS algorithm and its efficient implementation for $alpha$-divergences.
arXiv Detail & Related papers (2023-06-27T08:15:28Z) - On the Importance of Gradient Norm in PAC-Bayesian Bounds [92.82627080794491]
We propose a new generalization bound that exploits the contractivity of the log-Sobolev inequalities.
We empirically analyze the effect of this new loss-gradient norm term on different neural architectures.
arXiv Detail & Related papers (2022-10-12T12:49:20Z) - Generalised entropy accumulation [14.595665255353206]
This is a generalisation of the entropy accumulation theorem (EAT)
Due to its more general model of side-information, our generalised EAT can be applied more easily and to a broader range of cryptographic protocols.
As examples, we give the first multi-round security proof for blind expansion and a simplified analysis of the E91 QKD protocol.
arXiv Detail & Related papers (2022-03-09T19:00:05Z) - Commitment capacity of classical-quantum channels [70.51146080031752]
We define various notions of commitment capacity for classical-quantum channels.
We prove matching upper and lower bound on it in terms of the conditional entropy.
arXiv Detail & Related papers (2022-01-17T10:41:50Z) - Device-independent lower bounds on the conditional von Neumann entropy [10.2138250640885]
We introduce a numerical method to compute lower bounds on rates of quantum protocols.
We find substantial improvements over all previous numerical techniques.
Our method is compatible with the entropy accumulation theorem.
arXiv Detail & Related papers (2021-06-25T15:24:12Z) - R\'enyi divergence inequalities via interpolation, with applications to
generalised entropic uncertainty relations [91.3755431537592]
We investigate quantum R'enyi entropic quantities, specifically those derived from'sandwiched' divergence.
We present R'enyi mutual information decomposition rules, a new approach to the R'enyi conditional entropy tripartite chain rules and a more general bipartite comparison.
arXiv Detail & Related papers (2021-06-19T04:06:23Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Computing conditional entropies for quantum correlations [10.549307055348596]
In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution.
We introduce the family of iterated mean quantum R'enyi divergences with parameters $alpha_k = 1+frac12k-1$ for positive integers $k$.
We show that the corresponding conditional entropies admit a particularly nice form which, in the context of device-independent optimization, can be relaxed to a semidefinite programming problem.
arXiv Detail & Related papers (2020-07-24T15:27:51Z) - Approximation Schemes for ReLU Regression [80.33702497406632]
We consider the fundamental problem of ReLU regression.
The goal is to output the best fitting ReLU with respect to square loss given to draws from some unknown distribution.
arXiv Detail & Related papers (2020-05-26T16:26:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.