Short course on quantum computing - PowerPoint PPT Presentation

1 / 52
About This Presentation
Title:

Short course on quantum computing

Description:

Classical coin flipping. If hard functions are available, ... Coin flipping with penalty for cheating. Party caught cheating loses k coins instead of 1. ... – PowerPoint PPT presentation

Number of Views:23
Avg rating:3.0/5.0
Slides: 53
Provided by: SWHISKome2
Category:

less

Transcript and Presenter's Notes

Title: Short course on quantum computing


1
Short course on quantum computing
  • Andris Ambainis
  • University of Latvia

2
Lecture 3
  • Recent results in quantum cryptography

3
Quantum cryptography
  • Unconditional secure key distribution.
  • Unconditional security for other tasks?

4
Setting
  • QKD two honest parties, connected by insecure
    channel. Protection from eavesdropping.
  • Two (or more) parties, some of them might be
    dishonest. Honest parties need to be protected
    from dishonest ones.

5
Bit commitment
  • Alice has a bit a. She wants to commit it to Bob
    so that
  • Bob does not learn a,
  • Alice cannot change it.

6
Coin flipping
  • Alice and Bob want to flip a coin so that neither
    of them controls the outcome.
  • If both honest, 0 (1) with probability 1/2.
  • If one honest, 0 (1) with probability at most
    1/2?.

7
Oblivious transfer
  • Alice has two bits x0, x1. Bob wants to learn xb
    so that
  • Alice does not learn b.
  • Alice is guaranteed that Bob gets only one bit.

8
Secret sharing
  • Secret m.
  • Distribute it among n parties so that any k
    parties have no information about m.

9
Multiparty computation
  • Alice has x, Bob has y. They want to compute f(x,
    y) so that
  • Alice learns nothing about y except f(x, y).
  • Bob learns nothing about x except f(x, y).
  • Generalizes to more than two parties.

10
Coin flipping
  • Alice and Bob want to flip a coin so that neither
    of them controls the outcome.
  • If both honest, 0 (1) with probability 1/2.
  • If one honest, 0 (1) with probability at most
    1/2?.

11
Classical coin flipping
  • If hard functions are available,
  • Information-theoretically (unlimited
    computational power), one party can always force
    one outcome with probability 1.

12
Quantum coin flipping
  • Protocol with ?1/4 A, 2000.
  • Lower bound of 1/2 ? ? 1/?2 Kitaev, 2001.
  • Better protocols with weaker definition A, RS,
    2002.

13
Classical coin flipping
a?0, 1
b?0, 1
Commit (a)
b
Reveal (a)
Result (ab) mod 2.
14
Why is this secure?
  • Bob is honest, Alice cheating.
  • Alices bit a does not depend on b because Alice
    has to commit a before seeing b.
  • Bob picks 0/1 with probability ½.
  • The result is a or (a1) mod 2 with probability ½.

15
Quantum coin flipping
a, x?0, 1
b?0, 1
b
a,x
Result (ab) mod 2.
16
General quantum states
  • k-dimensional quantum system.
  • Basis 1gt, 2gt, , kgt.
  • General state
  • ?11gt?22gt?kkgt,
  • ?12 ?k21
  • 2k dimensional system can be constructed as a
    tensor product of k quantum bits.

17
Measurements
  • Measuring
  • ?11gt?22gt?kkgt
  • in the basis 1gt, 2gt, , kgt gives igt with
    probability ?i2.
  • Any orthogonal basis can be used.

18
Quantum coin flipping
a, x?0, 1
b?0, 1
b
a,x
Result (ab) mod 2.
19
States
20
Security result
  • Theorem. Alice (Bob) cannot achieve 0 (1) with
    probability more than 3/4.

21
Cheating Bob
  • Bob could measure the state in basis 0gt, 1gt,
    2gt.
  • If a0, he gets 0gt or 1gt with probabilities
    1/2.
  • If a1, 0gt or 2gt with probabilities 1/2.
  • Learns a with probability 1/2, no information
    otherwise.

22
Mixed states
  • If a0, Alice sends 0gt?1gt with probabilities
    1/2.
  • If a1, Alice sends 0gt?2gt with probabilities
    1/2.
  • How well can Bob distinguish these two?

23
Mixed states
  • Probabilistic combinations of quantum states.
  • (0gt with probability 1/2 and 1gt with
    probability 1/2) not the same as 0gt1gt.

1gt
0gt 1gt
0gt -1gt
0gt
24
Equivalent mixed states
  • Let ?0 be 0gt or 1gt with probabilities 1/2.
  • Let ?1 be 0gt?1gt with probabilities 1/2.
  • Any measurement on ?0 produces the same
    probability distribution as on ?1.

25
Bra-ket notation
26
Bra-ket notation
Inner product
27
Density matrix
  • Consider the mixed state that is ?igt with
    probabilities pi.
  • The density matrix is

28
Density matrix
  • Let

29
Cheating Bob
  • Alice sends ?0, ?1.

How well can Bob distinguish these two?
30
Cheating Bob
  • Theorem The best probability with which Bob can
    guess i, given ?i, is
  • For matrices in our protocol, ?0-?1t1,
    probability 3/4.

31
Cheating Alice.
  • Fidelity of two density matrices.
  • Bounds how one state can be transformed into
    another.
  • Probability that Alice can convince Bob that a0
    is F(?, ?0).
  • Probability that Alice can convince Bob that a1
    is F(?, ?1).

32
Quantum coin flipping
a, x?0, 1
b?0, 1
b
a,x
Result (ab) mod 2.
33
Better bit commitment
  • Quantum bit commitment gt Quantum coin flipping.
  • Better commitment?
  • Bob cant guess a at all, but Alice cant change
    it?

34
Impossibility theorem
  • Theorem Mayers, 1996. Perfect quantum bit
    commitment is impossible.
  • If Bobs state contains no information about
    Alices bit, Alice can change commitment
    perfectly.
  • Note there was a provably secure protocol
    before Mayers proof.

35
Delayed measurements
  • Any measurement can be delayed till end of
    protocol.
  • Any classical random variable can be replaced by
    a quantum state.
  • E.g. 0/1 random bit can be replaced by

36
State after commitment
  • By delayed measurement, pure state ?gt.
  • Let ?0gt be the state if Alice commits 0, ?1gt be
    the state if Alice commits 1.
  • How well Bob can distinguish ?0gt and ?1gt?

37
Tracing out
  • Imagine that Alice measures her part. Then, Bob
    is left with mixed state.

1gt
0gt
38
Distinguishability
  • If Bob cannot access Alices part, distinguishing
    ?0gt and ?1gt is equivalent to distinguishing ?0
    and ?1.
  • Bob can guess commitment with probability
  • Perfectly secure if ?0-?1 t0, i.e. ?0?1.

39
Transformability
  • Theorem. If ?0?1, then there is a unitary U on
    Alices part such that U?0gt ?1gt.
  • Perfectly hiding commitments are completely
    non-binding.
  • Almost perfecly hiding commitments?

40
Fidelity
  • F(?0, ?1)max lt?0 ? 1gt2, over all ? 0gt, ?
    1gt that give ?0, ?1 if Alices part is traced
    out.
  • Any test that accepts ? 0gt with certainty,
    accepts ? 1gt with probability at least lt?0
    ? 1gt2.

41
Fidelity
  • Theorem. For any ?0gt, ?1gt Alice can transform
    ?0gt into a state that is accepted as ?1gt with
    probability F(?0, ?1).
  • Theorem Ullman, 1972

42
Trace distance vs. fidelity
  • Theorem Fuchs, van de Graaf, 1997
  • Tradeoff between Alices and Bobs cheating
    probabilities.

43
Summary on bit commitment
  • In any protocol, either Alice or Bob is capable
    of cheating with a constant success probability.
  • Protocols in which both parties cant cheat
    perfectly, exist.

44
Coin flipping
  • Trace distance vs. fidelity gives some lower
    bounds for coin flipping.
  • Based on one-round commitment A,RS, 2001 3/4.
  • Based on multi-round commitment 9/16
    Nayak,Shor,2002.
  • Not based on commitment?

45
Different protocol Salvail, 2000
  • Alice generate two copies of
  • sends second qubits to Bob.
  • Bob randomly chooses one and verifies it.
  • Alice and Bob measure the other pair.

46
Security
  • Theorem Salvail, 2000 No party can achieve 0
    (1) with probability more than 3/4.

47
Lower bound Kitaev, 2002
  • Theorem. In any protocol, one party can force 0
    (1) with probability at least 1/??.
  • Proof. Write a semidefinite program for max
    probability achieved by Alice/ Bob.
  • Look at the dual program.
  • Combine the dual programs.

48
Weak CF
  • Assume that Alice can achieve 0 with probability
    1 and Bob can achieve 1 with probability 1.
  • Would the protocol be useful?

Yes, if Alice wants 1 and Bob wants 0. Still
allowed by Kitaevs theorem.
49
Weak CF
  • Only interested in probability of Alice achieving
    1 and Bob achieving 0.
  • Kitaevs lower bound allows 1/2?.
  • Theorem A, Rudolph-Spekkens, 2002 There is a
    protocol with probability 1/?2.

50
Protocol
Alice prepares
Bob maps
12gt
Alice wins, Bob verifies
Bob wins, Alice verifies
51
CF summary
Strong
Weak
3/4
1/?2
Protocol
1/?2
gt0
Lower bound
52
CF open problems
  • Better protocols/lower bounds.
  • Coin flipping with penalty for cheating. Party
    caught cheating loses k coins instead of 1.
  • Best result achievable by cheater?
  • The tradeoff between successful cheating vs.
    being caught.

53
Open problems
  • Other cryptographic primitives.
  • Quantum zero knowledge?
  • Multiparty computation.
  • Composing the primitives.
Write a Comment
User Comments (0)
About PowerShow.com