Diagrammatic security proof for 8-state encoding

by   Boris Skoric, et al.

Dirac notation is the most common way to describe quantum states and operations on states. It is very convenient and allows for quick visual distinction between vectors, scalars and operators. For quantum processes that involve interactions of multiple systems an even better visualisation has been proposed by Coecke and Kissinger, in the form of a diagrammatic formalism [CK2017]. Their notation expresses formulas in the form of diagrams, somewhat similar to Feynman diagrams, and is more general than the circuit notation for quantum computing. This document consists of two parts. (1) We give a brief summary of the diagrammatic notation of quantum processes, tailored to readers who already know quantum physics and are not interested in general process theory. For this audience our summary is less daunting than the encyclopaedic book by Coecke and Kissinger [CK2017], and on the other hand more accessible than the ultra-compact introduction of [KTW2017]. We deviate a somewhat from [CK2017,KTW2017] in that we do not assume basis states to equal their own complex conjugate; this means that we do not use symmetric notation for basis states, and it leads us to explicitly show arrows on wires where they are usually omitted. (2) We extend the work of Kissinger, Tull and Westerbaan [KTW2017] which gives a diagrammatic security proof for BB84 and 6-state Quantum Key Distribution. Their proof is based on a sequence of diagrammatic manipulations that works when the bases used in the protocol are mutually unbiased. We extend this result to 8-state encoding, which has been proposed as a tool in quantum key recycling protocols [SdV2017,LS2018], and which does not have mutually unbiased bases.



There are no comments yet.


page 1

page 2

page 3

page 4


Quantum Multiple-Valued Decision Diagrams in Graphical Calculi

Graphical calculi such as the ZH-calculus are powerful tools in the stud...

𝒫𝒯-Symmetric Unambiguous Distinguishing of Three Quantum States

Beyond the two-state case, the optimal state distinguishing is solved on...

Quantum Adiabatic Theorem Revisited

In 2004 Ambainis and Regev formulated a certain form of quantum adiabati...

Construction of mutually unbiased maximally entangled bases in C^2^s⊗C^2^s by using Galois rings

Mutually unbiased bases plays a central role in quantum mechanics and qu...

Deterministic Preparation of Dicke States

The Dicke state |D_k^n〉 is an equal-weight superposition of all n-qubit ...

Mutually Unbiased Measurements, Hadamard Matrices, and Superdense Coding

Mutually unbiased bases (MUBs) are highly symmetric bases on complex Hil...

Experimental demonstrations of unconditional security in a purely classical regime

So far, unconditional security in key distribution processes has been co...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.