From Low-Distortion Norm Embeddings to Explicit Uncertainty Relations and Efficient Information Locking
-
Published:2013-11
Issue:6
Volume:60
Page:1-61
-
ISSN:0004-5411
-
Container-title:Journal of the ACM
-
language:en
-
Short-container-title:J. ACM
Author:
Fawzi Omar1,
Hayden Patrick1,
Sen Pranab2
Affiliation:
1. McGill University
2. Tata Institute of Fundamental Research
Abstract
The existence of quantum uncertainty relations is the essential reason that some classically unrealizable cryptographic primitives become realizable when quantum communication is allowed. One operational manifestation of these uncertainty relations is a purely quantum effect referred to as
information locking
[DiVincenzo et al. 2004]. A locking scheme can be viewed as a cryptographic protocol in which a uniformly random
n
-bit message is encoded in a quantum system using a classical key of size much smaller than
n
. Without the key, no measurement of this quantum state can extract more than a negligible amount of information about the message, in which case the message is said to be “locked”. Furthermore, knowing the key, it is possible to recover, that is “unlock”, the message.
In this article, we make the following contributions by exploiting a connection between uncertainty relations and low-distortion embeddings of Euclidean spaces into slightly larger spaces endowed with the ℓ
1
norm. We introduce the notion of a
metric uncertainty relation
and connect it to low-distortion embeddings of ℓ
2
into ℓ
1
. A metric uncertainty relation also implies an entropic uncertainty relation. We prove that random bases satisfy uncertainty relations with a stronger definition and better parameters than previously known. Our proof is also considerably simpler than earlier proofs. We then apply this result to show the existence of locking schemes with key size independent of the message length. Moreover, we give
efficient
constructions of bases satisfying metric uncertainty relations. The bases defining these metric uncertainty relations are computable by quantum circuits of almost linear size. This leads to the first explicit construction of a strong information locking scheme. These constructions are obtained by adapting an explicit norm embedding due to Indyk [2007] and an extractor construction of Guruswami et al. [2009]. We apply our metric uncertainty relations to exhibit communication protocols that perform equality testing of
n
-qubit states. We prove that this task can be performed by a single message protocol using
O
(log
2
n
) qubits and
n
bits of communication, where the computation of the sender is efficient.
Funder
Perimeter Institute
Canadian Institute for Advanced Research
Fonds Québécois de la Recherche sur la Nature et les Technologies
QuantumWorks
Natural Sciences and Engineering Research Council of Canada
Office of Naval Research
Mitacs
Canada Research Chairs
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Hardware and Architecture,Information Systems,Control and Systems Engineering,Software
Reference85 articles.
1. Identification via channels
2. Ambainis A. 2010. Limits on entropic uncertainty relations. Quant. Inf. Comput. 10 9 & 10 848--858. Ambainis A. 2010. Limits on entropic uncertainty relations. Quant. Inf. Comput. 10 9 & 10 848--858.
3. Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption
4. Nonadditivity of Rényi entropy and Dvoretzky’s theorem
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献