Randomizing Quantum States - PowerPoint PPT Presentation

1 / 53
About This Presentation
Title:

Randomizing Quantum States

Description:

Randomizing Quantum States. Charles Bennett. Patrick Hayden. Debbie ... Ethel Watts Mumford. There is no knowledge that is not power. -Ralph Waldo Emerson ... – PowerPoint PPT presentation

Number of Views:29
Avg rating:3.0/5.0
Slides: 54
Provided by: patrick183
Category:

less

Transcript and Presenter's Notes

Title: Randomizing Quantum States


1
Randomizing Quantum States
  • Charles Bennett
  • Patrick Hayden
  • Debbie Leung
  • Peter Shor
  • Andreas Winter
  • RSP quant-ph/0307100 RAND quant-ph/0307104

2
One-time pad
Message
Shared key
3
Private quantum channels
4
Relax security criterion
A CPTP map is e-randomizing if for all
states ,
5
Approximate PQC
Can encrypt a quantum state using 1 secret random
bit per encrypted qubit asymptotically.
6
Remote state preparationNon-oblivious
teleportation
A circuit that needs no introduction
7
Remote state preparationNon-oblivious
teleportation
Allow Alice to perform an arbitrary f-dependent
measurement
8
From randomization to RSP
Circuit for teleportation
l qubits
k 2l bits
Before receiving k Bob knows nothing
(Private quantum channel!)
9
From randomization to RSP
Circuit for remote state preparation
l qubits
k lo(l) bits
Before receiving k, Bob knows nothing
(Approximate private quantum channel!)
10
Knowledge is power
All you need in this life is ignorance and
confidence, and then success is sure. -Mark
Twain
Oblivious Alice (Teleportation) 1 ebit 2
cbits per 1 qubit sent
There is no knowledge that is not power. -Ralph
Waldo Emerson
Non-Oblivious Alice (RSP) 1 ebit 1 cbit per 1
qubit sent
Knowledge is power, if you know it about the
right person. -Ethel Watts Mumford
11
Randomization and nonlocality
Does an e-randomizing R destroy all correlations
with the environment?
True for separable ? (easy). Not true for
entangled inputs!
12
Rank argument
Recall e-randomizing map
Act on half of a maximally entangled state
has rank no more than nd log d

13
Characterizing leftover correlations
What does randomization map do to entangled
inputs?
R
?Charlie prepares maximally entangled state k
then randomizes it.
14
Characterizing leftover correlations
What does randomization map do to entangled
inputs?
R
X
Y
?Charlie prepares maximally entangled state k
then randomizes it.
?Alice and Bob implement an LOCC measurement.
15
Detecting entanglement
16
Randomization proof ideas
17
Large deviation estimate
18
Discretization
Find an e-net M For all pure states f, there
exists a state f in M such that
Cd
19
Combine (Not as bad at it looks)
20
Quantum data hiding
GOAL Charlie hides a bit from Alice and Bob,
secure against LOCC
RESULT There exist bipartite n-qubit states
hiding a bit with security 2-(n-1).
DLT, 2001
21
Hiding qubits
GOAL Charlie hides qubits from Alice and Bob,
secure against LOCC
dV H T, 2002
22
Strategy
23
Strategy
24
Security
Hinges on showing
(Rank one projectors)
25
Decodability
26
Data hiding summary
27
Conclusion
  • Encryption of quantum states using 1 bit of
    shared key per encrypted qubit
  • Remote state preparation using 1 bit of
    communication and 1 ebit per qubit sent
  • Physical operation that destroys classical
    correlations but not quantum
  • Data hiding of 1 qubit in 2 physical qubits

28
The End
29
Overview
  • Act I
  • LOCC data hiding for quantum states
  • (quant-ph/0207147)
  • Act II
  • From RSP to PQC to data hiding

30
A few years ago in a lab moderately far away...
31
Nonlocality without entanglement
BDFMRSSW, 1999
32
Hiding a qubit First attempt
TASK Hide an arbitrary quantum state
33
Hiding a qubit First attempt
TASK Hide an arbitrary quantum state
PROBLEM Data hiding with pure states is
impossible! (So much for
superpositions.)
WSHV,2000
34
2nd simplest idea
THE PLAN Use classical hidden bits as key to
randomize a qubit
PROPERTIES 1) can be recovered using quantum
communication 2) Naïve attacks fail
(AB1 to find key then rotate B2)
PROBLEM Alice and Bob can attack AB1B2
35
Actually, not a problem
Any method to learn about by LOCC will
provide a method to defeat the original cbit
hiding scheme. Will argue the contrapositive As
sume there is an LOCC operation L (with output
on Bobs system alone) and two input states to
the hiding map E such that
36
Minor algebra
37
Defeating the cbit hiding
Conclusion from previous slide there is a k such
that L0?Lk
38
Imperfect hiding
Wish to limit distinguishability through LOCC
For all input states and attacks.
If the original 2n bit hiding scheme has security
?, then ? lt2n1 ?.
Not so bad security of classical hiding schemes
appears to improve exponentially with number of
qubits used.
39
Multipartite cbit hiding
A
E
B
D
C
? With LOCC alone the five parties cannot learn i
All monotonic access structures are possible
Eggeling, Werner 2002
40
Multipartite qubit hiding
A
E
B
D
C
? With LOCC alone the five parties cannot learn
? Authorized sets can recover the secret using
quantum communication
41
Multipartite qubit hiding
A
E
B
D
C
? With LOCC alone the five parties cannot learn
? Authorized sets can recover the secret using
quantum communication
42
Quantum secret sharing
A
e.g. ((2,3)) threshold scheme
E
B
D
C
Secure against quantum communication in
unauthorized sets but secret can be recovered by
quantum communication in authorized sets.
?All monotonic threshold schemes not violating
no-cloning CGL,1999
?All monotonic schemes not violating no-cloning
G,2000
43
Hiding distributed quantum data
A
Logical Pauli operators
Multipartite cbit hiding states
E
B
D
C
Resulting state provides strengthening of quantum
secret sharing ? Secure against classical
communication between all parties ? Secure
against quantum communication in unauthorized
sets ? Secret can be recovered only by quantum
communication in authorized sets.
?All monotonic schemes not violating no-cloning
44
Act II
Fig. 1 Glimpse of a master magicians workshop
45
On the meaning of
For any probability density P(?) on states in Cd
and ?gt0 there exists a choice of unitaries Us,
s1,,S such that
and
Compare to the perfect private quantum channel
To achieve ?0 requires log M 2 log d.
46
Another version
There exists a choice of unitaries Ups,
p1,,P, s1,,S such that for all states ? in
Cd
and
Can randomize every n-qubit state using 1
secret random bit and 1 public random bit per
qubit.
47
Consequences
  • Universal remote state preparation with only 1
    ebit 1 cbit per qubit
  • (No shared random bits necessary)
  • Weakly randomized maximally entangled states
    indistinguishable from maximally mixed states
    using LOCC
  • (Not just 1-way LOCC as sketched earlier)

48
Application to data hiding
R
Consider ensemble of randomized states with V
chosen using Haar measure
Rank bound on entropy
So we can do coding to get about n hidden bits
using nxn bipartite states!
49
Glyph collection
50
Competing visions
  • Faction 1
  • Destroying classical correlations requires only 1
    rbit per qubit
  • Destroying quantum correlations requires 2 rbits
    per qubit
  • Faction 2
  • Randomizing an arbitrary pure quantum state
    requires 1 public rbit and 1 secret rbit per qubit

51
Summary
  • Described a method for hiding qubits given one
    for hiding bits (construction and proof not
    restricted to data hiding)
  • Outlined a connection between LOCC data hiding,
    private quantum channels and remote state
    preparation

52
Building the POVM
Alice wishes to send f. By the definition of
e-randomization
53
From RSP to randomization
Circuit for teleportation
n qubits
i 2n bits
Before receiving i, Bob knows nothing
(Private quantum channel, Quantum one-time
pad, etc.)
Write a Comment
User Comments (0)
About PowerShow.com