what does random mean
play

What does random mean? Random - Something or a group of things - PowerPoint PPT Presentation

What does random mean? Random - Something or a group of things that follow no criteria or pattern. A word often misused by morons who dont know very many other words. -- supaDISC What does random mean? Please


  1. What does “random” mean? Random - “Something or a group of things that follow no criteria or pattern. A word often misused by morons who don’t know very many other words.” -- supaDISC

  2. What does “random” mean? “Please people, use it when something really is random. See example below. ” -- Madi (from www.urbandictionary.com) Sorry your hamster British rail should died, Bob. watch out for flying man-eating deckchairs!

  3. Why it matters Security of protocols like RSA fails if keys are not random enough. [ Lenstra+ 12, Heninger+ 12] P,Q P,Q (primes)

  4. Why it matters Info security professionals rely on tests like these. “[We assume] that the developer understands the behavior of the entropy source and has made a good- faith effort to produce a consistent source of entropy.” Can we do better than this?

  5. Bell inequalities certify quantumness Suppose Alice plays the CHSH game N times and calculates the avg. Input The CHSH Game score. O 1 Å O 2 = 1 Score if Score if Inputs O 1  O 2 = 0 O 1  O 2 = 1 0 1 00 +1 -1 0 0 0 1 01 +1 -1 10 +1 -1 11 -1 +1 1 0 1 0 0 1 … …

  6. Bell inequalities certify quantumness Suppose Alice plays the CHSH game N times and calculates the avg. score. 0 1 0 0 N=5 0 1 0.72 1 0 0.5 1 0 0 1 … …

  7. Bell inequalities certify quantumness Suppose Alice plays the CHSH game N times and calculates the avg. score. 0 1 0 0 N=500 0 1 0.72 1 0 0.5 1 0 0 1 … …

  8. Bell inequalities certify quantumness Suppose Alice plays the CHSH game N times and calculates the avg. score. 0 1 0 0 N=100000 0 1 0.72 1 0 0.5 1 0 0 1 … …

  9. Bell inequalities certify quantumness Suppose Alice plays the CHSH game N times and calculates the avg. score. If it’s > 0.501, she assumes outputs were partially random, and applies a randomness extractor . [Colbeck 2006] 0 1 0 0 N=100000 0 1 0.72 1 0 0.5 1 0 0 1 … …

  10. Bell inequalities certify quantumness Does this work? Yes – from the perspective of any classical adversary. [Pironio+ 10, Pironio+ 13, Fehr+ 13, Coudron+ 13]. 0 1 0 0 N=100000 0 1 0.72 1 0 0.5 1 0 0 1 … …

  11. Quantum adversaries are stronger What about an entangled adversary? Problem: Quantum information can be locked – accessible only to entangled adversaries. [E.g., DiVincenzo+ 04] 0 1 0 0 0 1 1 0 1 0 0 1 … …

  12. Quantum adversaries are stronger If we can require perfect performance, [Vazirani-Vidick 12] proves entangled security. QIP 2014: We proved entangled security allowing error 0.028 . 0 1 0 0 Quantum security 0 1 1 0 1 0 0 1 … … Classical security

  13. Quantum adversaries are stronger If we can require perfect performance, [Vazirani-Vidick 12] proves entangled security. QIP 2014: We proved entangled security allowing error 0.028 . Our new results: 0 1 0 0 Quantum security The two thresholds 0 1 are in fact the same. Any Bell inequality can be used. 1 0 1 0 0 1 … … Classical security

  14. Randomness from Trusted Measurements Randomness Expansion At each iteration, the device locates a 0 [Several authors]: Security proof against an unentangled adversary. 0 qubit. If input = 0, it measures along 1 0 {|+>, |->}; if input = 1, along {|0>, |1>}. 0 Small resources, high rate 0 0 0 Not fully secure 1 0 0 + + 11011 - 1010010001011101010001011101101010001111111010100010 …. 0 1

  15. Randomness from Trusted Measurements Randomness Expansion Idea: We want the device to prepare an 0 [Several authors]: Security proof against an unentangled adversary. 0 approximate |0> state and measure 1 0 along {|+>, |->}. 0 Small resources, high rate 0 0 0 Protocol adapted from CVY13, VV12. Not fully secure 1 1. Give the device N biased (1 – d, d ) 0 0 coin flips. 2. If output “1” has occurred more than (1-C) d N times, abort. + 3. Apply randomness extractor. + 11011 - 1010010001011101010001011101101010001111111010100010 …. 0 Is this secure? +

  16. Randomness from Trusted Measurements Randomness Expansion Initial adversary state: 0 [Several authors]: Security proof against an unentangled adversary. r 0 1 0 0 Small resources, high rate After 1 iteration: 0 0 ( 1 – d) r +  ( 1 – d) r -  d r 0  d r 1 0 State = r Not fully secure 1 0 0 After N iterations: ( 1 – d) N r ++..+  ( 1 – d) N r ++..-  ...  d N r 11..1 + At the end we exclude “abort” states. + 11011 - Is the result random? 1010010001011101010001011101101010001111111010100010 …. 0 +

  17. A New Uncertainty Principle for Tr[X c ] Randomness Expansion Theorem: 0 [Several authors]: Security proof against an unentangled adversary. 0 Let 1 0 0 Small resources, high rate 0 0 0 State = r Not fully secure 1 0 0 0 Then (X,Y) must fit in this region: (1,1) (0,1) + + 11011 (1,1- e ) (0,1- e ) - 1010010001011101010001011101101010001111111010100010 …. 0 +

  18. A New Uncertainty Principle for Tr[X c ] Randomness Expansion By an inductive argument, the protocol is 0 [Several authors]: Security proof against an unentangled adversary. secure provided the abort threshold (C) is > 0.5. 0 1 0 0 Small resources, high rate 0 0 0 State = r Not fully secure 1 0 0 + + 11011 - 1010010001011101010001011101101010001111111010100010 …. 0 Classical threshold = quantum threshold! +

  19. Randomness Expansion Randomness from Noncommuting Measurements Change the device to a general non- 0 [Several authors]: Security proof against an unentangled adversary. 0 commuting device. 1 A device whose 0 0 measurements {A 0 , Small resources, high rate 0 By similar proof, the protocol is secure 0 A 1 } and {B 0 , B 1 } 0 provided C > T. Not fully secure 1 always satisfy 0 0 Classical threshold = quantum threshold again! + + 11011 - 1010010001011101010001011101101010001111111010100010 …. 0 +

  20. Randomness Expansion Randomness from Untrusted Devices Insight (generalizing 0 0 our previous work): Random input Nonlocal games simulate noncommuting - OR - CHSH measurements. Output Output

  21. Randomness Expansion Randomness from Untrusted Devices Protocol from CVY13, VV12. 0 0 [Several authors]: Security proof against an unentangled adversary. 0 0 1. Run the device N times. During 1 1 0 0 “game rounds,” play a nonlocal 0 0 Small resources, high rate 0 game. Otherwise, just input (0,0). 0 Game rounds 0 0 2. If the average score during game 0 0 occur with Not fully secure 1 0 probability e. rounds was < C, abort. 0 0 0 0 3. Apply randomness extractor. By simulation, classical threshold = 1 0 quantum threshold. 1 1 11011 0 1 1 1 1010010001011101010001011101101010001111111010100010 ….

  22. Randomness Expansion Randomness from Kochen-Specker Inequalities Horodecki+ 10, Abbott+ 12, Deng+ 13, Um+ 13 A B In a contextuality game , the device makes [Several authors]: Security proof against an unentangled adversary. A B C simultaneous measurements assumed to D A B be consistent and commuting. A B Small resources, high rate A B A A B C A B Not fully secure E A A E B A B D Klyachko+ 08 B 1 0 1 1 11011 0 1 Classical threshold = quantum threshold. 1 1 1010010001011101010001011101101010001111111010100010 ….

  23. Randomness Expansion Randomness from Kochen-Specker Inequalities Horodecki+ 10, Abbott+ 12, Deng+ 13, Um+ 13 MISSION ACCOMPLISHED A B In a contextuality game , the device makes [Several authors]: Security proof against an unentangled adversary. A B C simultaneous measurements assumed to D Any Bell inequality (or K-S inequality) can be used to A B be consistent and commuting. A B Small resources, high rate A B produce true random numbers. A A B C A B Not fully secure E A A E B A B D Klyachko+ 08 B 1 0 1 1 11011 0 1 Classical threshold = quantum threshold. 1 1 1010010001011101010001011101101010001111111010100010 ….

  24. Open Problems What are the best resource tradeoffs? Entanglement . Quality of seed. 011110000010000100000111111111110111100000 01111000010100001110100000000001111101000… # of devices. Expansion rate. Exponential, unbounded …

  25. Open Problems What is the best 0.03 QIP 2015 rate curve for 0 CHSH? 0.72 0.5 Important for 1.0 QKD. QIP 2014 0

  26. The Schatten norm Our uncertainty principle relies on the uniform convexity of the (1+ e )-Schatten norm [Ball+ 94]. U r U * r 11011 r +  r - 1010010001011101010001011101101010001111111010100010 …. What else can we learn from the geometry of this norm?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend