Quantum-proof randomness extractors via operator space theory - - PowerPoint PPT Presentation

quantum proof randomness extractors via operator space
SMART_READER_LITE
LIVE PREVIEW

Quantum-proof randomness extractors via operator space theory - - PowerPoint PPT Presentation

Quantum-proof randomness extractors via operator space theory Mario Berta, Omar Fawzi, Volkher B. Scholz based on arXiv:1409.3563 Introduction to (Classical) Randomness Extractors Goal: transform only partly random classical


slide-1
SLIDE 1

Quantum-proof 
 randomness extractors 
 via operator space theory

Mario Berta, Omar Fawzi, Volkher B. Scholz based on arXiv:1409.3563

slide-2
SLIDE 2

Introduction

  • Goal: transform only partly random classical distribution P over

an alphabet N into (almost perfectly) uniformly random distribution over a shorter alphabet M

to (Classical) Randomness Extractors

N

Ext

M

  • Only Conditions on the input source: contains some randomness,

as measured by the min-entropy Hmin(N)P = -log maxx∈N P(x)

slide-3
SLIDE 3

Introduction

to (Classical) Randomness Extractors

  • Cannot be achieved in a deterministic way, if we require it to work

for all sources satisfying a lower bound on their min-entropy

  • Can be achieved if the use of a catalyst is allowed: additional

uniformly random source over an alphabet D (called the seed)

N

Ext

M

slide-4
SLIDE 4

Introduction

to (Classical) Randomness Extractors

Definition: A (k,𝜁) Extractor is a deterministic mapping Ext: D x N -> M such that for all probability distributions P on N such that Hmin(N)P ≥ k we have that (UD,Ext(P ,UD)) is 𝜁-close in variational distance to (UD,UM).

P(Ext(s, P) = y) = X

x∈N

P(x) δExt(s,x)=y

where we defined the output distribution by

C(Ext, k) = max

P :Hmin(N)P ≥k

1 D X

s∈D

kExt(s, P) UMk1  ε

slide-5
SLIDE 5

Introduction

Let { fs | fs : N -> M } be set of two-universal hash functions, 
 then Ext(s,x) = fs(x) is a (k,𝜁) extractor for |M| = 𝜁 2k

to (Classical) Randomness Extractors

Example (left-over hash lemma):

slide-6
SLIDE 6

Introduction

to (Classical) Randomness Extractors

  • Extractors are used in many constructions in theoretical CS, but

as the example suggest, they are useful in cryptography, too.

  • They map partially secure sources initially correlated to a classical 


adversary Adv to an almost uniform and secure distributions

N Adv

Ext

M Adv

Let { fs | fs : N -> M } be set of two-universal hash functions, 
 then Ext(s,x) = fs(x) is a (k,𝜁) extractor for |M| = 𝜁 2k Example (left-over hash lemma):

slide-7
SLIDE 7

Introduction

to (Classical) Randomness Extractors

  • Extractors are used in many constructions in theoretical CS, but

as the example suggest, they are useful in cryptography, too.

  • They map partially secure sources initially correlated to a classical 


adversary Adv to an almost uniform and secure distributions

N Q

Ext

M Q

Let { fs | fs : N -> M } be set of two-universal hash functions, 
 then Ext(s,x) = fs(x) is a (k,𝜁) extractor for |M| = 𝜁 2k Example (left-over hash lemma):

slide-8
SLIDE 8

Introduction

to Quantum-proof Randomness Extractors

Input condition for classical-quantum-states:

  • measures the knowledge of an adversary having access to a

quantum system Q correlated with the source on N

  • conditional min-entropy via maximisation over all guessing strategies

ρNQ = X

x∈N

|xihx| ⌦ ρQ

x

Hmin(N|Q)ρ = − log Pguess(N|Q) Pguess(N|Q) = max (X

x∈N

Tr[ρQ

x Ex] | Ex ≥ 0,

X

x

Ex = 1 I )

slide-9
SLIDE 9

Introduction

to Quantum-proof Randomness Extractors

Definition: A (k,𝜁) quantum-proof Extractor is a deterministic mapping 
 Ext: D x N -> M such that for all cq-states 𝝇NQ with conditional min- entropy lower bounded by k, the output state is almost perfectly secure. Q(Ext, k) = max

Hmin(N|Q)ρ≥k

1 D X

s∈D

kExts ⌦ idQ(ρNQ) UM ⌦ ρQk1  ε Exts ⌦ idQ(ρNQ) = X

x∈N,y∈M

δExt(s,x)=y |yihy| ⌦ ρQ

x

slide-10
SLIDE 10

Introduction

to Quantum-proof Randomness Extractors

  • Central question: what happens if the adversary is quantum?

Does the Extractor still work?

  • Motivation: quantum cryptography, examination of the power of

quantum memory

C(Ext,k) Q(Ext,k) ?

classical adversary quantum adversary

slide-11
SLIDE 11

Introduction

to Quantum-proof Randomness Extractors

What did we know so far:

  • One-bit output size: always stable [Koenig and Terhal]
  • Quantum-proof constructions: a handful of constructions

are known to be quantum-proof [Renner and collaborators]: two-universal hashing, Trevisan’s construction

  • Not generic: there exists a construction which is known to

be unstable [Gavinsky et al.], but it has rather bad parameters

slide-12
SLIDE 12

Results

  • We developed a mathematical framework to study this question,

based on operator space theory

  • Using the framework, we can find SDP’s SDP(Ext,k) such that
  • These SDP relaxations characterise many known examples of

quantum-proof extractors, and give new bounds

  • verview

C(Ext,k) ≤ Q(Ext,k) ≤ SDP(Ext,k)

slide-13
SLIDE 13

Results

  • We show that small output Extractors and high input entropy

Extractors are quantum-proof:

  • verview

SDP(Ext,k+log(2/𝜁)) ≤ O(√|M|𝜁)) SDP(Ext,k+1) ≤ O(2-k|N|𝜁)

  • for every deterministic mapping F: D x N -> M, there exists a

two-partite game G(F) such that its classical value ω(G) characterises the Condenser property while the quantum value ωq(G) characterises whether the Condenser is quantum-proof
 (Condenser=generalisation of an Extractor, increases the min- entropy rate)

slide-14
SLIDE 14

Results

  • verview
  • for every deterministic mapping F: D x N -> M, there exists a

two-partite game G(F) such that its classical value ω(G) characterises the Condenser property while the quantum value ωq(G) characterises whether the Condenser is quantum-proof

C(F) Q(F)

slide-15
SLIDE 15

Results

  • verview
  • for every deterministic mapping Ext: D x N -> M, there exists a

two-partite game G(Ext,k) such that its classical value ω(G) characterises the Extractor property while the quantum value ωq(G) characterises whether the Extractor is quantum-proof

ω(G) ωq(G)

slide-16
SLIDE 16

Mathematical Framework

  • The property of being a quantum-proof Extractor can be

formulated in terms of a completely bounded norm (norms between operator spaces)

  • Classical Extractor property is expressed as norm of a linear

mapping between normed linear spaces

  • These normed spaces can be ‘quantized’, giving rise to 

  • perator spaces

Overview

slide-17
SLIDE 17

Mathematical Framework

  • Consider the norm kxk∩ = max{kxk1, 2kkxk∞}
  • P distribution with min-entropy lower bounded by k: kPk∩  1
  • Extractor: characterised by the linear mapping

and the fact

∆[Ext] : RN → RDM ∆[Ext](ex) = 1 D X

s∈D,y∈M

✓ δExt(s,x)=y − 1 M ◆ es ⊗ ey k∆[Ext]k∩→1 = max{k∆[Ext](z)k1 : kzk∩  1}  ε Linear normed spaces

C(Ext,k) =

slide-18
SLIDE 18

Mathematical Framework

  • Linear normed space E together with a sequence of norms on

satisfying some consistency conditions

classical quantum

  • A mapping L : E -> F between two operator spaces E, F is

completely bounded (cb) with norm c if

kLkcb = sup

q∈N

  • kL ⌦ idMqkE⊗Mq→F ⊗Mq

 c E ⊗ Mq , q ∈ N Operator spaces

slide-19
SLIDE 19

Mathematical Framework

  • An Extractor is quantum-proof if the associated mapping is

completely bounded

  • Carrying out the construction for the 1-norm on the classical part

leads to an operator space whose dual space characterises the conditional min-entropy, and the cap norm in addition corresponds to the normalisation constraint

quantum-proof Extractors k∆[Ext]kcb, ∩→1  ε Q(Ext,k) =

slide-20
SLIDE 20

Mathematical Framework

  • An Extractor is quantum-proof if the associated mapping is

completely bounded

quantum-proof Extractors k∆[Ext]kcb, ∩→1  ε Q(Ext,k) = C(Ext,k) Q(Ext,k)

slide-21
SLIDE 21

Mathematical Framework

  • An Extractor is quantum-proof if the associated mapping is

completely bounded

quantum-proof Extractors k∆[Ext]kcb, ∩→1  ε Q(Ext,k) = k∆[Ext]kcb, ∩→1 k∆[Ext]k∩→1

slide-22
SLIDE 22

Mathematical Framework

quantum-proof Extractors k∆[Ext]kcb, ∩→1  ε Q(Ext,k) =

  • Relaxing this completely bounded norm gives rise to a

hierarchy of SDP relaxations, and the first level characterises most known quantum-proof constructions

≤ SDP(Ext,k) k∆[Ext]kcb, ∩→1

slide-23
SLIDE 23

Outlook & Open questions

  • Higher levels of SDP hierarchies have to be examined; interesting

candidate example: random functions

  • Through the connection to two-partite games, can any tools from

there applied to Extractors?

  • We described a useful framework to study quantum-proof

Randomness Extractors based on operator space theory

  • Are our upper bounds on the gap between classical and quantum-

proof Extractors tight?

slide-24
SLIDE 24

Thank you for your attention

Any questions?