LN_Week9
LN_Week9
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International Licence.
Contents
H θn |xn i to Bob.
2. If y = 0, then Bob measures all of the qubits in the standard basis. If y = 1, he measures
in the Hadamard basis. He records the resulting outcome string x̃ = x̃1 , . . . , x̃n .
3. Both parties wait time ∆t. (Storage assumption is applied!)
4. Alice sends to Bob the string θ1 , . . . , θn . Bob computes the set of indicdes I = { j | θ j = y}
where the measured in the same basis than Alice.
5. Alice chooses two random extractor functions as specified by random seeds r0 and r1 . She
computes k0 = Ext(x+ , r0 ) and k1 = Ext(x× , r1 ). Where x+ is the substring of x where
Alice encoded in the standard basis, and x× is the substring where she used the Hadamard
basis. She sends r0 and r1 to Bob.
6. Alice sends to Bob m0 = s0 ⊕ k0 and m1 = s1 ⊕ k1 , where ⊕ denotes the bit wise xor.
7. Bob computes k = Ext(xI , ry ) and sy = ky ⊕ ry .
Why does this protocol work? Let us first check that the protocol is correct, that is, Bob actually
obtains sy ! Note that if there is no noise, then whenever θ j = y, we have x j = x̃ j . That is, whenever
Alice had encoded in the basis in which Bob measures, then Bob learns the corresponding element
of Alice’s bit string. This means that if Alice’s now applies an extractor to hash down the elements
of the strings corresponding to the standard and Hadamard basis respectively, then Bob knows
one of them. Since Alice also sends him r0 and r1 , he hence learns ky , which acts like a key that
encrypts sy using one-time pad encryption, allowing him to recover sy . Similar to the case of QKD,
when a small amount of errors occur on the channel, information reconciliation can be performed
in order to ensure that Bob is able to correct for the errors in x̃.
where we have written X+ X× for the string X to remind ourselves that we are ultimately interested
in the two portions corresponding to the two different bases. To make his guess, Bob can use the
9.3 Security from quantum uncertainty 5
classical information K, the quantum register Q, as well as the basis information Θ that Alice sends
to him after the waiting time.
In QKD, we saw that is it often much easier to show security against an adversary who is purely
classical, so let us try and get rid of Q. As we have done so before in previous weeks, we can apply
the chain rule for the min-entropy. Recall that the chain rule says
Hence, we could worry about a Bob who has only Θ and K. How could we possibly analyze this?
Again, let us think back to the tricks learned in QKD! By the guessing game, we could again
think of Bob preparing qubits and send them to Alice. Alice chooses one of two random basis,
after which she announces the basis choice to Bob. That is, we can use precisely the same guessing
game that we had used in QKD to analzye the case of an eavesdropper Eve who has only classical
information K! This gives the familiar
1 1
Hmin (X+ X× |Θ, K) = n − log + √ ≈ 0.22n . (9.4)
2 2 2
Of course, what we really want is to make a statement about the different parts X+ and X× . That is,
we want that there exists a c̄ ∈ {+, ×} such that Bob’s entropy about Xc̄ is high. Fortunately, there
is a beautiful lemma known as the min-entropy splitting lemma proven by Wullschleger which says
that there exists some register C̄ such that
This means that whenever q . 0.11n we can have security for some ` > 0! Or, reading it the
other way around, assuming a maximum q for the adversary tells us that we need to send at least
n ≈ 1/0.11q qubits in order to achieve security. By much more sophisticated analysis, it is now
possible to show that security can be achieved as long as q ≤ n − O(log2 n) which is essentially
optimal. We thus see that security is possible by sending just a few more qubits than Bob can store.
Acknowledgments
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0
International Licence. The lecture notes are written by Nelly Ng and Stephanie Wehner. We
thank David Elkouss, Kenneth Goodenough, Jonas Helsen, Jérémy Ribeiro, and Jalex Stark for
proofreading.
Bibliography
[Bao+12] Xiao-Hui Bao et al. “Efficient and long-lived quantum memory with cold atoms inside
a ring cavity”. In: Nature Physics 8.7 (2012), pages 517–521 (cited on page 3).
[Ber+13] Mario Berta et al. “Entanglement cost of quantum channels”. In: IEEE Transactions on
Information Theory 59.10 (2013), pages 6779–6795 (cited on page 3).
[Cha+05] T Chaneliere et al. “Storage and retrieval of single photons transmitted between remote
quantum memories”. In: Nature 438.7069 (2005), pages 833–836 (cited on page 3).
[Rei+10] KF Reim et al. “Towards high-speed optical quantum memories”. In: Nature Photonics
4.4 (2010), pages 218–221 (cited on page 3).