additivity in classical quantum wiretap channels
play

Additivity in classical-quantum wiretap channels ISIT 2020 - PowerPoint PPT Presentation

Additivity in classical-quantum wiretap channels ISIT 2020 *University of Sydney Arkin Tikku*, Mario Berta , Joseph M. Renes Imperial College London ETH Zrich Motivation Classical Shannon Theory Basic settings fully


  1. Additivity in classical-quantum wiretap channels ISIT 2020 *University of Sydney Arkin Tikku*, Mario Berta † , Joseph M. Renes ‡ † Imperial College London ‡ ETH Zürich

  2. Motivation Classical Shannon Theory Basic settings fully understood (point-to-point information theory). Quantum Shannon Theory Only partially resolved. 1 − → Explore the boundaries between classical and quantum !

  3. Background

  4. Classical noisy channel coding M • tractable optimization problem (Blahut-Arimoto etc.) • single-letter expression Y X n n Classical channel capacity 2 y 1 M y n x 1 x n N ˆ E D N transmission rate R:= log( | M | ) log( | M | ) p ( y | x ) C := sup sup = max p X ( x ) I ( X : Y ) E D

  5. Sending classical information over quantum channels b 1 by using entangled inputs to the channel! BUT [ Hastings ’08] showed that for random quantum channels: x Holevo information (Achievable rate) M 3 b n a n M a 1 N B | A E A n | M D ˆ ˆ M | B n N B | A ∑ ( N B | A ) p X ( x ) | x ⟩ ⟨ x | X ⊗ N B | A ( ρ x χ := max A } I ( X : B ) ω with ω XB = A ) { p X ( x ) ,ρ x χ ( N ⊗ M ) > χ ( N ) + χ ( M )

  6. Non-additivity of the Holevo information Non-additive Holevo information: • intractable optimization problem • multi-letter expression (regularized Holevo info) n 1 1 4 Classical capacity of a quantum channel (HSW theorem) χ ( N ⊗ M ) > χ ( N ) + χ ( M ) − → coding rate can be greater than Holevo info ! n χ ( N ⊗ n ( ) C N B | A = lim B | A ) = lim max An } I ( X : B n ) ω ≥ χ ( N ) n →∞ n →∞ { p X ,ρ x

  7. Additivity for entanglement-breaking channels Additivity of Holevo info for entanglement-breaking channels If Important sub-class: Classical-quantum/quantum-classical channels (informal) A classical-quantum channel/quantum-classical is a channel for which the inputs/outputs are restricted to be diagonal in some 5 ( 1 A ′ ⊗ N B | A ) ( | φ ⟩ ⟨ φ | A ′ A ) is separable, then χ ( N B 1 | A 1 ⊗ N B 2 | A 2 ) = χ ( N B 1 | A 1 ) + χ ( N B 2 | A 2 ) pre-fixed orthonormal basis {| x ⟩} x ∈ X .

  8. Our setup

  9. The classical wiretap model Private information of a classical wiretap channel 1 ( Sender ) X 6 Setup: Z ( Eavesdropper ) Y ( Legitimate receiver ) W YZ | X P 1 ( W YZ | X ) := max p UX ( u , x ) I ( U : Y ) − I ( U : Z ) ≥ max p X ( x ) I ( X : Y ) − I ( X : Z ) =: P 0 ( W YZ | X ) with p UX ( u , x ) = p X | U ( x | u ) p U ( u ) . Private capacity of a classical wiretap channel [Csiszar & Koerner ′ 78 ] n P 1 ( W ⊗ n P ( W YZ | X ) = lim YZ | X ) = P 1 ( W YZ | X ) n →∞

  10. The quantum wiretap model ( Q. sender ) A 1 Devetak’05] Private capacity of a quantum wiretap channel [Cai et al.’04, 7 Private information of a quantum wiretap channel Setup: C ( Q. eavesdropper ) B ( Q. legitimate receiver ) W BC | A P 1 ( W BC | A ) := max A } I ( V : B ) ω − I ( V : C ) ω { p V ,ρ v with ω VBC := ∑ v p V ( v ) | v ⟩ ⟨ v | V ⊗ W BC | A ( ρ v A ) . n P 1 ( W ⊗ n P ( W BC | A ) = lim BC | A ) ≥ P 1 ( W BC | A ) n →∞

  11. Hybrid setting ? Our question: What happens to the private info when two of the parties are restricted to be classical ? Our results (informal): 1. Quantum sender: Additive ! 2. Quantum receiver: Non-additive ! 3. Quantum eavesdropper: Non-additive ! How did we show it ? 8 Becomes additive (like for Holeveo info χ ) or stays non-additive ?

  12. Quantum sender Theorem I: Additivity for quantum sender • Proof of direction 2) based on classical proof of additivity • no conditioning on input (quantum) systems • prove cardinality bound of auxiliary random variable 9 Let W 1 := W Y 1 Z 1 | A 1 and W 2 := W Y 2 Z 2 | A 2 . Then: P 1 ( W 1 ⊗ W 2 ) = P 1 ( W 1 ) + P 1 ( W 2 ) Proof strategy : We need to prove two directions: 1. P 1 ( W 1 ) + P 1 ( W 2 ) ≤ P 1 ( W 1 ⊗ W 2 ) (Trivial) 2. P 1 ( W 1 ) + P 1 ( W 2 ) ≥ P 1 ( W 1 ⊗ W 2 ) • use Csiszar sum identity [Csiszar & Koerner ′ 78 ]

  13. Quantum Receiver Theorem II: Non-additivity for quantum receiver COPY B Z X BPC( r ) BEC 10 P 1 Let W BZ | X [ r ] := BPC ( r ) / BEC (( 1 − r ) 2 ) . Then, for some r ∈ [ 0 , 1 ] : ( W BZ | X [ r ] ⊗ W BZ | X [ r ] ) ( W BZ | X [ r ] ) ( W BZ | X [ r ] ) > P 1 + P 1 where BPC ( r ) : | 0 ⟩ ⟨ 0 | → | ψ ⟩ ⟨ ψ | and | 1 ⟩ ⟨ 1 | → | φ ⟩ ⟨ φ | with r := |⟨ φ | ψ ⟩| ( ( 1 − 2 r ) 2 )

  14. 11 0.54 0.542 0.544 0.546 0 2 1 2 2 Block-coding scheme with parity pre-processing: channel parameter r achievable rate P ( W ) > 0 : Quantum Receiver BPC ( r ) / BEC (( 1 − r ) 2 ) · 10 − 3 n = 1 n = 2 1 . 5 0 . 5 → | 00 ⟩ ⟨ 00 | X 2 + | 11 ⟩ ⟨ 11 | X 2 → | 01 ⟩ ⟨ 01 | X 2 + | 10 ⟩ ⟨ 10 | X 2 | 0 ⟩ ⟨ 0 | X − and | 1 ⟩ ⟨ 1 | X − .

  15. Proof Strategy A parameter regime 1. Construct an explicit coding scheme with positive rate: gives a 12 regime of the channel. positive lower bound on private capacity P ( W [ r ]) 2. Rigorously show that P 1 ( W [ r ]) = 0 for a given parameter Step 2) leverages ideas from classical information theory: [Ulukus & Ozel ’11] Let f W ( ρ A ) = I ( X : B ) ω − I ( X : C ) ω , then P 1 ( W ) = max f W ( E V [ ρ v A ]) − E V [ f W ( ρ v A )] p V ,ρ v with ρ A = ∑ x p X ( x ) | x ⟩ ⟨ x | A and ω XBC = ∑ x p X ( x ) | x ⟩ ⟨ x | X ⊗ W BC | A ( | x ⟩ ⟨ x | A ) • P 1 ( W [ r ]) = 0 for convex f W [ r ] ( ρ X ) via Jensen’s inequality • show that second derivative of f W [ r ] ( ρ X ) is positive in desired

  16. Quantum Eavesdropper Theorem III: Non-additivity for quantum eavesdropper COPY Y C X BSC( p ) 13 P 1 Let W YC | X [ p ] := BSC ( p ) / BPC ( 1 − 2 p ) . Then, for some r ∈ [ 0 , 1 ] : ( ) ( ) ( ) W YC | X [ p ] ⊗ W YC | X [ p ] > P 1 W YC | X [ p ] + P 1 W YC | X [ p ] where BPC ( p ) : | 0 ⟩ ⟨ 0 | → | ψ ⟩ ⟨ ψ | and | 1 ⟩ ⟨ 1 | → | φ ⟩ ⟨ φ | with r := |⟨ φ | ψ ⟩| BPC(1 − 2 p )

  17. 0.124 0.1245 0 1 channel parameter p achievable rate Block-coding scheme: repetition code + noisy-preprocessing via a bit-flip channel. We also analytically show equivalence of achievable (positive) wiretap coding rate to BB84 key rate in [Smith et al.’06 ]). 14 P ( W ) > 0 : Quantum Eavesdropper BSC ( p ) / BPC ( 1 − 2 p ) · 10 − 4 n = 1 n = 3 0 . 5

  18. Conclusion • Explicit example channels are provided rather than randomized construction • Entanglement is neither necessary nor suffjcient in the wiretap setting for non-additivity of private info to occur • Direct corollary: hybrid setting with two quantum parties is always non-additive • How large can such additivity violations become for the private info ? 15

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend