Do you want to publish a course? Click here

Information complementarity in multipartite quantum states and security in cryptography

255   0   0.0 ( 0 )
 Added by Anindita Bera
 Publication date 2015
  fields Physics
and research's language is English




Ask ChatGPT about the research

We derive complementarity relations for arbitrary quantum states of multiparty systems, of arbitrary number of parties and dimensions, between the purity of a part of the system and several correlation quantities, including entanglement and other quantum correlations as well as classical and total correlations, of that part with the remainder of the system. We subsequently use such a complementarity relation, between purity and quantum mutual information in the tripartite scenario, to provide a bound on the secret key rate for individual attacks on a quantum key distribution protocol.



rate research

Read More

We demonstrate that the concept of information offers a more complete description of complementarity than the traditional approach based on observables. We present the first experimental test of information complementarity for two-qubit pure states, achieving close agreement with theory; We also explore the distribution of information in a comprehensive range of mixed states. Our results highlight the strange and subtle properties of even the simplest quantum systems: for example, entanglement can be increased by reducing correlations between two subsystems.
82 - Christian Majenz 2018
In this Thesis, several results in quantum information theory are collected, most of which use entropy as the main mathematical tool. *While a direct generalization of the Shannon entropy to density matrices, the von Neumann entropy behaves differently. A long-standing open question is, whether there are quantum analogues of unconstrained non-Shannon type inequalities. Here, a new constrained non-von-Neumann type inequality is proven, a step towards a conjectured unconstrained inequality by Linden and Winter. *IID quantum state merging can be optimally achieved using the decoupling technique. The one-shot results by Berta et al. and Anshu at al., however, had to bring in additional mathematical machinery. We introduce a natural generalized decoupling paradigm, catalytic decoupling, that can reproduce the aforementioned results when used analogously to the application of standard decoupling in the asymptotic case. *Port based teleportation, a variant of standard quantum teleportation protocol, cannot be implemented perfectly. We prove several lower bounds on the necessary number of output ports N to achieve port based teleportation for given error and input dimension, showing that N diverges uniformly in the dimension of the teleported quantum system, for vanishing error. As a byproduct, a new lower bound for the size of the program register for an approximate universal programmable quantum processor is derived. *In the last part, we give a new definition for information-theoretic quantum non-malleability, strengthening the previous definition by Ambainis et al. We show that quantum non-malleability implies secrecy, analogous to quantum authentication. Furthermore, non-malleable encryption schemes can be used as a primitive to build authenticating encryption schemes. We also show that the strong notion of authentication recently proposed by Garg et al. can be fulfilled using 2-designs.
A practical quantum key distribution (QKD) protocol necessarily runs in finite time and, hence, only a finite amount of communication is exchanged. This is in contrast to most of the standard results on the security of QKD, which only hold in the limit where the number of transmitted signals approaches infinity. Here, we analyze the security of QKD under the realistic assumption that the amount of communication is finite. At the level of the general formalism, we present new results that help simplifying the actual implementation of QKD protocols: in particular, we show that symmetrization steps, which are required by certain security proofs (e.g., proofs based on de Finettis representation theorem), can be omitted in practical implementations. Also, we demonstrate how two-way reconciliation protocols can be taken into account in the security analysis. At the level of numerical estimates, we present the bounds with finite resources for ``device-independent security against collective attacks.
In this thesis we study the finite-size analysis of two continuous-variables quantum key distribution schemes. The first one is the one-way protocol using Gaussian modulation of thermal states and the other is the measurement-device-independent protocol. To do so, we adopt an efficient channel parameter estimation method based on the assumption of the Gaussian variables and the central limit theorem introduced by Ruppert et al. [Phys. Rev. A 90, 062310 (2014)]. Furthermore, we present a composable security analysis of the measurement device independent protocol for coherent attacks with a channel parameter estimation that is not based on the central limit theorem. We also investigated, in the asymptotic regime, an asymmetric situation for the authenticated parties against the eavesdropper caused by fast-fading channels. Here we assume that the eavesdropper has the full control of the communication channel and can instantaneously change its transmissivity in every use of it. We assumed the simple model of a uniform fading and addressed the cases of one-way protocols, continuous-measurement device-independent protocol in symmetric configuration and its star network extension for three users. Finally, we extended the asymptotic study of the one-way protocols using an arbitrary number of phase-encoded coherent states assuming a thermal loss channel without using a Gaussian approximation.
145 - Xiaoqian Zhang 2017
In this paper, we mainly study the local distinguishable multipartite quantum states by local operations and classical communication (LOCC) in $m_1otimes m_2otimesldotsotimes m_n$ , where the quantum system $m_1$ belongs to Alice, $m_2$ belongs to Bob, ldots and $m_n$ belongs to Susan. We first present the pure tripartite distinguishable orthogonal quantum states by LOCC in $m_1otimes m_2otimes m_3$. With the conclusion in $m_1otimes m_2otimes m_3$, we prove distinguishability or indistinguishability of some quantum states. At last, we give the $n$-party distinguishable quantum states in $m_1otimes m_2otimescdotsotimes m_n$. Our study further reveals quantum nonlocality in multipartite high-dimensional.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا