Distillation of secret-key from a class of compound memoryless quantum sources (Q2820903)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Distillation of secret-key from a class of compound memoryless quantum sources |
scientific article; zbMATH DE number 6626333
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Distillation of secret-key from a class of compound memoryless quantum sources |
scientific article; zbMATH DE number 6626333 |
Statements
Distillation of secret-key from a class of compound memoryless quantum sources (English)
0 references
12 September 2016
0 references
quantum cryptography
0 references
secret-key distillation
0 references
compound memoryless quantum-quantum source
0 references
density matrices
0 references
0.92578167
0 references
0.89664745
0 references
0.89042795
0 references
0.8823103
0 references
0.8811766
0 references
0.86343277
0 references
0.8619997
0 references
0.85943455
0 references
0.8584887
0 references
The paper addresses the issue of obtaining secret-key distillations in a secure manner using a classical-quantum-quantum (cqq) memoryless source. Three entities are considered: the sender, the legal receiver and the eavesdropper, in a scenario proposed in [\textit{R. Ahlswede} and \textit{I. Csiszàr}, IEEE Trans. Inf. Theory 39, No. 4, 1121--1132 (1993; Zbl 0802.94013)] for classical information-theoretic approach, and rebuilt in a similar way for quantum systems in [\textit{I. Devetak} and \textit{A. Winter}, Proc. R. Soc. Lond., Ser. A, Math. Phys. Eng. Sci. 461, No. 2053, 207--235 (2005; Zbl 1145.81325)]. Except for the initial input in this three-party system, all communications use quantum media. In general the class of density matrices that characterizes cqq in this paper passes a special regularity property verification. Additionally, two cases are considered and compared: (1) when the legitimate parts have an incomplete knowledge about the generating density matrix, and therefore they must develop the same protocols for obtaining the secret-key (the intruder has not this restriction), and (2) when the sender has the whole information about the marginal distribution of his systems deriving from the source statistics (variant denoted SMI -- Sender Marginal Information). The main results of the paper are Theorem 8 and 9, which can be summarized as follows: For a regular set \(\mathcal I\) of cqq density matrices on a three-party Hilbert space \({\mathcal H}_{ABE}\) NEWLINE\[NEWLINEK_{\rightarrow}({\mathcal I})=K_{\rightarrow,SMI}=\lim_{k\to\infty}\frac{1}{k}K_{\rightarrow}^{(1)}\left({\mathcal I}^{\otimes k}\right)NEWLINE\]NEWLINE where \(K_{\rightarrow}({\mathcal I})\; \left( K_{\rightarrow,SMI}({\mathcal I})\right)\) is the forward secret-key capacity of \(\mathcal I\) without (respectively with) SMI defined by \(\sup\{R\geq 0\;|\; R\) is an achievable secret-key distillation rate for \(\mathcal I\) without (with) SMI\(\}\), and \(K_{\rightarrow}^{(1)}\left({\mathcal I}^{\otimes k}\right)\) is a value based on the Markov transition matrices of the system.NEWLINENEWLINETherefore, under a special assumption of regularity, the secret-key distillation capacities are equals -- and asymptotically optimal -- whether the two parties have relatively complete knowledge of their marginal state deriving from the source statistics.NEWLINENEWLINEThe proofs of these theorems are very laborious and cover half of this very long paper (two sections and three annexes).NEWLINENEWLINEThe other two important sections (6 and 7) complete this result, by showing that for irregular sources the capacities are generally not equal (a suitable example with \(K_{\rightarrow}({\mathcal I})<K_{\rightarrow,SMI}({\mathcal I})\) is developed in the proof of Theorem 21 from section 6), and that \(K_{\rightarrow}({\mathcal I})\) remains asymptotically optimal even for a weakly regular set of cqq density matrices, based on the set-valued maps (Theorem 29 from section 7).NEWLINENEWLINEThe study of this paper (in fact a real chapter book) is continued in [\textit{N. Tavangaran}, \textit{H. Boche} and \textit{R. F. Schaefer}, ``Secret-key generation using compound sources and one-way public communication'', Preprint, \url{arXiv:1601.07513}] where Theorems 8 and 9 are completed under other weaker hypothesis.
0 references