Entropy Accumulation in Device-independent Protocols
QIP17 Seattle | January 19, 2017
Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick
Entropy Accumulation in Device-independent Protocols QIP17 Seattle - - PowerPoint PPT Presentation
Entropy Accumulation in Device-independent Protocols QIP17 Seattle | January 19, 2017 arXiv: 1607.01796 & 1607.01797 Rotem Arnon-Friedman , Frdric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick Outline 1. Introduction to
Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick
Input Output Input Output Alice: Bob: Win:
0.76 0.78 0.8 0.82 0.84 0.2 0.4 0.6 0.8 1
How random is from Eve’s point of view
Simple! ✔
Optimal rates! ✔
0.76 0.78 0.8 0.82 0.84 0.2 0.4 0.6 0.8 1
Simple! ✔ Tight! ✔
0.76 0.78 0.8 0.82 0.84 0.2 0.4 0.6 0.8 1
without changing the state
condition:
How much can we extract from after we use ? Too optimistic Too pessimistic
How much can we extract from after we use ?
the min-tradeoff function is the “quantum version”
Too optimistic Too pessimistic
DI Entropy Accumulation Protocol Arguments: G – two-player non-local game X, Y – possible inputs for Alice Bob D – untrusted device of two components that can play G repeatedly n ∈ N+ – number of rounds ωexp – expected winning prob. for an honest (noisy) implementation δest ∈ (0, 1) – width of the statistical confidence interval
1: For every round i ∈ [n] do Steps 2-4: 2:
Alice and Bob choose inputs Xi ∈ X and Yi ∈ Y respectively.
3:
They use D with Xi, Yi and record the outputs Ai and Bi respectively.
4:
They set Ci = w (Ai, Bi, Xi, Yi).
5: Alice and Bob abort if P
j Cj < (ωexp − δest) · n .
1 ω H ωt 1 ω H fmin
0.76 0.77 0.78 0.79 0.8 0.81 0.82 0.83 0.84 0.85 0.2 0.4 0.6 0.8 1 ω IID asymptotic rate n = 108 n = 107 n = 106 n = 105
Bob, between the rounds of the game (can create “entanglement on the fly”)
87% 53% 22%
106 107 108 109 1010 1011 1015 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 number of rounds n key rate r Q = 0.5% Q = 2.5% Q = 5%
1 3 5 7.1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 quantum bit error rate Q(%) key rate r n = 1015 n = 1010 n = 108 n = 107
Simple! ✔ Tight! ✔
scenario
1. Apply the EAT and our framework to other protocols and scenarios
2. DIQKD:
rate with the current protocol 3. Is there a general technique to bound the conditional von-Neumann entropy given the Bell violation?
Rotem Arnon-Friedman, Frédéric Dupuis, Omar Fawzi, Renato Renner, & Thomas Vidick
Annual ACM Symposium on Theory of Computing, pages 417–426. ACM, 2014.
+
13] M. Müller-Lennert, F. Dupuis, O. Szehr, S. Fehr, and M. Tomamichel. On quantum Rényi entropies: A new generalization and some properties. J. Math. Phys., 54(12):122203, 2013.
pages 503–509. IEEE, 1998.
+
09] S. Pironio, A. Acín, N. Brunner, N. Gisin, S. Massar, and V. Scarani. Device-independent quantum key distribution secure against collective attacks. New Journal of Physics, 11(4):045021, 2009.
relative entropy. Comm. Math. Phys., 331(2):593–622, 2014.
Key icon created by Lisa Crymova from the noun project Thought Bubble icon created by Jason Santos from the noun project