Title: Randomizing Quantum States
1Randomizing Quantum States
- Charles Bennett
- Patrick Hayden
- Debbie Leung
- Peter Shor
- Andreas Winter
- RSP quant-ph/0307100 RAND quant-ph/0307104
2One-time pad
Message
Shared key
3Private quantum channels
4Relax security criterion
A CPTP map is e-randomizing if for all
states ,
5Approximate PQC
Can encrypt a quantum state using 1 secret random
bit per encrypted qubit asymptotically.
6Remote state preparationNon-oblivious
teleportation
A circuit that needs no introduction
7Remote state preparationNon-oblivious
teleportation
Allow Alice to perform an arbitrary f-dependent
measurement
8From randomization to RSP
Circuit for teleportation
l qubits
k 2l bits
Before receiving k Bob knows nothing
(Private quantum channel!)
9From randomization to RSP
Circuit for remote state preparation
l qubits
k lo(l) bits
Before receiving k, Bob knows nothing
(Approximate private quantum channel!)
10Knowledge is power
All you need in this life is ignorance and
confidence, and then success is sure. -Mark
Twain
Oblivious Alice (Teleportation) 1 ebit 2
cbits per 1 qubit sent
There is no knowledge that is not power. -Ralph
Waldo Emerson
Non-Oblivious Alice (RSP) 1 ebit 1 cbit per 1
qubit sent
Knowledge is power, if you know it about the
right person. -Ethel Watts Mumford
11Randomization and nonlocality
Does an e-randomizing R destroy all correlations
with the environment?
True for separable ? (easy). Not true for
entangled inputs!
12Rank argument
Recall e-randomizing map
Act on half of a maximally entangled state
has rank no more than nd log d
13Characterizing leftover correlations
What does randomization map do to entangled
inputs?
R
?Charlie prepares maximally entangled state k
then randomizes it.
14Characterizing leftover correlations
What does randomization map do to entangled
inputs?
R
X
Y
?Charlie prepares maximally entangled state k
then randomizes it.
?Alice and Bob implement an LOCC measurement.
15Detecting entanglement
16Randomization proof ideas
17Large deviation estimate
18Discretization
Find an e-net M For all pure states f, there
exists a state f in M such that
Cd
19Combine (Not as bad at it looks)
20Quantum data hiding
GOAL Charlie hides a bit from Alice and Bob,
secure against LOCC
RESULT There exist bipartite n-qubit states
hiding a bit with security 2-(n-1).
DLT, 2001
21Hiding qubits
GOAL Charlie hides qubits from Alice and Bob,
secure against LOCC
dV H T, 2002
22Strategy
23Strategy
24Security
Hinges on showing
(Rank one projectors)
25Decodability
26Data hiding summary
27Conclusion
- Encryption of quantum states using 1 bit of
shared key per encrypted qubit - Remote state preparation using 1 bit of
communication and 1 ebit per qubit sent - Physical operation that destroys classical
correlations but not quantum - Data hiding of 1 qubit in 2 physical qubits
28The End
29Overview
- Act I
- LOCC data hiding for quantum states
- (quant-ph/0207147)
- Act II
- From RSP to PQC to data hiding
30A few years ago in a lab moderately far away...
31Nonlocality without entanglement
BDFMRSSW, 1999
32Hiding a qubit First attempt
TASK Hide an arbitrary quantum state
33Hiding a qubit First attempt
TASK Hide an arbitrary quantum state
PROBLEM Data hiding with pure states is
impossible! (So much for
superpositions.)
WSHV,2000
342nd simplest idea
THE PLAN Use classical hidden bits as key to
randomize a qubit
PROPERTIES 1) can be recovered using quantum
communication 2) Naïve attacks fail
(AB1 to find key then rotate B2)
PROBLEM Alice and Bob can attack AB1B2
35Actually, not a problem
Any method to learn about by LOCC will
provide a method to defeat the original cbit
hiding scheme. Will argue the contrapositive As
sume there is an LOCC operation L (with output
on Bobs system alone) and two input states to
the hiding map E such that
36Minor algebra
37Defeating the cbit hiding
Conclusion from previous slide there is a k such
that L0?Lk
38Imperfect hiding
Wish to limit distinguishability through LOCC
For all input states and attacks.
If the original 2n bit hiding scheme has security
?, then ? lt2n1 ?.
Not so bad security of classical hiding schemes
appears to improve exponentially with number of
qubits used.
39Multipartite cbit hiding
A
E
B
D
C
? With LOCC alone the five parties cannot learn i
All monotonic access structures are possible
Eggeling, Werner 2002
40Multipartite qubit hiding
A
E
B
D
C
? With LOCC alone the five parties cannot learn
? Authorized sets can recover the secret using
quantum communication
41Multipartite qubit hiding
A
E
B
D
C
? With LOCC alone the five parties cannot learn
? Authorized sets can recover the secret using
quantum communication
42Quantum secret sharing
A
e.g. ((2,3)) threshold scheme
E
B
D
C
Secure against quantum communication in
unauthorized sets but secret can be recovered by
quantum communication in authorized sets.
?All monotonic threshold schemes not violating
no-cloning CGL,1999
?All monotonic schemes not violating no-cloning
G,2000
43Hiding distributed quantum data
A
Logical Pauli operators
Multipartite cbit hiding states
E
B
D
C
Resulting state provides strengthening of quantum
secret sharing ? Secure against classical
communication between all parties ? Secure
against quantum communication in unauthorized
sets ? Secret can be recovered only by quantum
communication in authorized sets.
?All monotonic schemes not violating no-cloning
44Act II
Fig. 1 Glimpse of a master magicians workshop
45On the meaning of
For any probability density P(?) on states in Cd
and ?gt0 there exists a choice of unitaries Us,
s1,,S such that
and
Compare to the perfect private quantum channel
To achieve ?0 requires log M 2 log d.
46Another version
There exists a choice of unitaries Ups,
p1,,P, s1,,S such that for all states ? in
Cd
and
Can randomize every n-qubit state using 1
secret random bit and 1 public random bit per
qubit.
47Consequences
- Universal remote state preparation with only 1
ebit 1 cbit per qubit - (No shared random bits necessary)
- Weakly randomized maximally entangled states
indistinguishable from maximally mixed states
using LOCC - (Not just 1-way LOCC as sketched earlier)
48Application to data hiding
R
Consider ensemble of randomized states with V
chosen using Haar measure
Rank bound on entropy
So we can do coding to get about n hidden bits
using nxn bipartite states!
49Glyph collection
50Competing visions
- Faction 1
- Destroying classical correlations requires only 1
rbit per qubit - Destroying quantum correlations requires 2 rbits
per qubit
- Faction 2
- Randomizing an arbitrary pure quantum state
requires 1 public rbit and 1 secret rbit per qubit
51Summary
- Described a method for hiding qubits given one
for hiding bits (construction and proof not
restricted to data hiding) - Outlined a connection between LOCC data hiding,
private quantum channels and remote state
preparation
52Building the POVM
Alice wishes to send f. By the definition of
e-randomization
53From RSP to randomization
Circuit for teleportation
n qubits
i 2n bits
Before receiving i, Bob knows nothing
(Private quantum channel, Quantum one-time
pad, etc.)