Entropy in Quantum Information Theory -- Communication and Cryptography

10/24/2018
by   Christian Majenz, et al.
0

In this Thesis, several results in quantum information theory are collected, most of which use entropy as the main mathematical tool. *While a direct generalization of the Shannon entropy to density matrices, the von Neumann entropy behaves differently. A long-standing open question is, whether there are quantum analogues of unconstrained non-Shannon type inequalities. Here, a new constrained non-von-Neumann type inequality is proven, a step towards a conjectured unconstrained inequality by Linden and Winter. *IID quantum state merging can be optimally achieved using the decoupling technique. The one-shot results by Berta et al. and Anshu at al., however, had to bring in additional mathematical machinery. We introduce a natural generalized decoupling paradigm, catalytic decoupling, that can reproduce the aforementioned results when used analogously to the application of standard decoupling in the asymptotic case. *Port based teleportation, a variant of standard quantum teleportation protocol, cannot be implemented perfectly. We prove several lower bounds on the necessary number of output ports N to achieve port based teleportation for given error and input dimension, showing that N diverges uniformly in the dimension of the teleported quantum system, for vanishing error. As a byproduct, a new lower bound for the size of the program register for an approximate universal programmable quantum processor is derived. *In the last part, we give a new definition for information-theoretic quantum non-malleability, strengthening the previous definition by Ambainis et al. We show that quantum non-malleability implies secrecy, analogous to quantum authentication. Furthermore, non-malleable encryption schemes can be used as a primitive to build authenticating encryption schemes. We also show that the strong notion of authentication recently proposed by Garg et al. can be fulfilled using 2-designs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/01/2018

The conditional Entropy Power Inequality for quantum additive noise channels

We prove the quantum conditional Entropy Power Inequality for quantum ad...
research
01/11/2018

Generalized Quantum Shannon Impossibility for Quantum Encryption

The famous Shannon impossibility result says that any encryption scheme ...
research
01/22/2019

How to Use Undiscovered Information Inequalities: Direct Applications of the Copy Lemma

We discuss linear programming techniques that help to deduce corollaries...
research
03/01/2020

Make Quantum Indistinguishability Great Again

In this work we study the (superposition-based, or QS2) quantum security...
research
10/12/2022

From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments

Recently, Aaronson et al. (arXiv:2009.07450) showed that detecting inter...
research
02/18/2020

The Mathematical Structure of Integrated Information Theory

Integrated Information Theory is one of the leading models of consciousn...
research
11/15/2019

Weak approximate unitary designs and applications to quantum encryption

Unitary t-designs are the bread and butter of quantum information theory...

Please sign up or login with your details

Forgot password? Click here to reset