Robust device independent randomness amplification with few devices F.G.S.L Brandao 1, R. Ramanathan 2 A. Grudka 3, K. 4, M. 5,P. 6 Horodeccy 1 Department.

Slides:



Advertisements
Similar presentations
Dov Gordon & Jonathan Katz University of Maryland.
Advertisements

Optimal Algorithms for k-Search with Application in Option Pricing Julian Lorenz, Konstantinos Panagiotou, Angelika Steger Institute of Theoretical.
Quantum Software Copy-Protection Scott Aaronson (MIT) |
QMA/qpoly PSPACE/poly: De-Merlinizing Quantum Protocols Scott Aaronson University of Waterloo.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Why Simple Hash Functions Work : Exploiting the Entropy in a Data Stream Michael Mitzenmacher Salil Vadhan And improvements with Kai-Min Chung.
Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université.
Short seed extractors against quantum storage Amnon Ta-Shma Tel-Aviv University 1.
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Tony Short University of Cambridge (with Sabri Al-Safi – PRA 84, (2011))
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Order Statistics Sorted
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Why Simple Hash Functions Work : Exploiting the Entropy in a Data Stream Michael Mitzenmacher Salil Vadhan.
Theory of Computing Lecture 3 MAS 714 Hartmut Klauck.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling.
Entropy Rates of a Stochastic Process
Oblivious Transfer based on the McEliece Assumptions
Why Simple Hash Functions Work : Exploiting the Entropy in a Data Stream Michael Mitzenmacher Salil Vadhan.
Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Estimation 8.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Definition and Properties of the Cost Function
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography (III)
Section 8.1 Estimating  When  is Known In this section, we develop techniques for estimating the population mean μ using sample data. We assume that.
Trust-Aware Optimal Crowdsourcing With Budget Constraint Xiangyang Liu 1, He He 2, and John S. Baras 1 1 Institute for Systems Research and Department.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology The Weak Law and the Strong.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
Physical Randomness Extractor Xiaodi Wu (MIT) device ……. Ext(x,s i ) Ext(x,0) Decouple ……. Z1Z1 ZiZi Z i+1 Eve Decouple ……. x uniform-to-all uniform-to-device.
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
1 ECE-517 Reinforcement Learning in Artificial Intelligence Lecture 7: Finite Horizon MDPs, Dynamic Programming Dr. Itamar Arel College of Engineering.
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore.
The Classically Enhanced Father Protocol
A generalization of quantum Stein’s Lemma Fernando G.S.L. Brandão and Martin B. Plenio Tohoku University, 13/09/2008.
The question Can we generate provable random numbers? …. ?
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
What are the minimal assumptions needed for infinite randomness expansion? Henry Yuen (MIT) Stellenbosch, South Africa 27 October 2015.
Quantum Cryptography Antonio Acín
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Secret keys and random numbers from quantum non locality Serge Massar.
Fernando G.S.L. Brandão and Martin B. Plenio
Probabilistic Algorithms
M. Stobińska1, F. Töppel2, P. Sekatski3,
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
Efficient Device-Independent Quantum Key Distribution
with Weak Measurements
Modern symmetric-key Encryption
Certified Randomness from Quantum Supremacy Inimitability
Non-Malleable Extractors New tools and improved constructions
Fiat-Shamir for Highly Sound Protocols is Instantiable
Information Theoretical Analysis of Digital Watermarking
Presentation transcript:

Robust device independent randomness amplification with few devices F.G.S.L Brandao 1, R. Ramanathan 2 A. Grudka 3, K. 4, M. 5,P. 6 Horodeccy 1 Department of Computer Science, University College London 2 National Quantum Information Centre in Gdańsku, Sopot 3 Department of Physics, Adam Mickiewicz University, Poznań 4 Institute of Informatics, University of Gdańsk, Gdańsk 5 Institute of Theoretical Physics and Astrophysic, University of Gdańsk, Gdańsk 6 Department of Physics and Applied Math, Technical University of Gdańsk, Gdańsk QIP 2014 Barcelona arXiv:

Motivation Does anyone know the result of throwing a coin ? can one decorrelate randomness from the third person: eavesdropper ? or ? Example: make your choice of product to buy independent of your knowledge about commercials

Danger: Eve can sell device with imprinted bits in advance We do not trust that devices are bulit due to specifiation We only relay on statistics of inputs and outputs of the device Security proof uses only these statistics Device independence

Fact: classics =>no go [M. Santha, U.V. Vazirani 1984] Classical processing of SV source does not lead to randomness amplfication Definition: e – any variable that could have influenced the variable X i A sequence X 1 …. X n satisfies condition of Santha-Vazirani if for any i there is: Weaker source of randomness: From 2 independent min-entropy sources => fully random bit [Chor and Goldreich 88, Rao] From 3 independent min-entropy sources => fully random bit Non explicit extractor Explicit extractor Fact:

Quantum mechanics allows for randomness amplification [R. Colbeck & R. Renner, Nature Physics 2012] Some measurements on maximally enatangled states are random Idea: results of these measurements violate certain Bell inequality Result : For N-th chained Bell inequality [Gallego et al. arXiv: ] Use of 5-partite Mermin inequality There exists hash function which outputs perfect bit For any Drawbacks: - hash function is not explicit - asymptotically many non-signaling devices - tolerance of noise not included [A.Grudka et al. arXiv: ] optimal [R. Ramanathan et al. arXiv: ]

The results 2) Protocol (II) of randomness amplification with: -2 devices -explicit hash function -tolerance of noise 1) Protocol (I) of randomness amplification with: - single device, but non-explicit function - tolerance of noise Main tool: SV-version of deFinetti theorem Main tool: proper use of implicit assumptions Starting from any epsilon-Santha-Vazirani source: obtain bits of randomness secure with respect to non-signaling Eve

Quality of randomness: Eve AliceBob ε in source SV A device ε out Task: P(XZ|U,W) The scheme of randomness amplifier SV source Extractor Device: small

The protocol I The protocol : 1) Use Device 1 n times taking as inputs bits from SV source 2) Check the level of Bell violation after n runs 4) Upon good level of Bell violation in 2), apply Extractor to device and SV source Single Device

Assumptions (I) Assumption1: (fixed device) the device does not depend on SV source Cf. [Colbeck and Renner 2012] [Gallego et al. 2012] Assumption 1: (Markovity) : given output of Eve, the device and SV source are product: Note: these assumptions are independent

Assumptions (II) Assumption2: (conditional non-signaling) Conditionally on these results… …these blocks do not signal Note: it is reasonable, as quantum devices satisfies it

Idea of the proof for protocol I By assumption I:SV source serves itself as source independent of the output of the devices Note: we do not impose independence of the sources, as that would be trivial SV source u Devices: P(x|u) x y P(x|y,u) = P(x|u) Reason for independence: u decorrelates two sources Two independent sources => non-explicit extractor yields secure bit time Note: we have to verify if device violates Bell inequality. If it does not, there is no way to check if the device is not deterministic function to which a SV no-go applies.

The protocol : 1) Use Device 1 n times taking as inputs bits from SV source forming the block 1 2) Out of n x N 2 uses of Device 2 choose the block 2 of n uses, by means of SV source 3) Check the level of Bell violation in both blocks 4) Upon good level of Bell violation in 3), apply Extractor to these two blocks and SV source Block 1 Block 2 Device 1 Preliminary assumptions: Devices: -Do not signal between each other -Are forward signaling (past can influence the future) Security claim: protocol I, upon acceptance provides secure bit up to error that vanises with uses of devices with high probability Protocol II Device 2

Idea of the proof for protocol II By assumption II + new type of deFinetti theorem: The two blocks of uses of devices (#1 and #2) are product with each other SV source Block 1 Block 2 3 independent sources: good for 3-extractor Secure bits (SECRECY AGAINST NO-SIGNALING ADVERSARY ) [Chore,Goldreich 88] time 2) By assumption I:SV source serves itself as source independent of the output of the devices 1)

Ingredients of the proof (i) a Bell inequality LHV Q NS x P* {P(x|u)} A1A1 A2A2 A4A4 A3A3 Entangled 4-qubit in state |, u=0 - measure z, u=1 - measure x u 1, x 2 u 2,x 2 u 3,x 3 u 4,x 4 u 1 u 2 u 3 u 4 x 1 x 2 x 3 x 4 Violated up to NS value B. P=0 Proof: by Linear Programming (analytical solution) [Hanggi Renner EUROCRYPT 2010] Interpretation: output of a box is partially random, even when noise is allowed

Ingredients of the proof (ii) Azuma-Hoeffding inequality for estimation Adaptation of [Pironio et al. 2010,2013 Fahr et al., Pironio Massar, 2013] – for randomness expansion Azuma-Hoeffding inequality enables estimation With high probability: There are at least g x n of good boxes (with Bell value at most δ) with g > 0 …. Hence for any u,x: Linear in n

Ingredients of the proof (iii) de Finetti theorem [Brandao Harrow STOC13] + SV correction

Block 1 Block 2 Average over the choice of from SV source, and output, Outputs are close to product Uses prior to Block 2 Device 1 Device 2 Ingredients of the proof (iii) de Finetti theorem Recall: number of Block 2 is chosen according to bits from SV source

Technical part of de Finetti bound

Putting the pieces together: The protocol : 1) Use device #1, N times 2) Out of NxK uses of device #2 choose a block of N uses, by means of SV source 3) Check the level of Bell violation in both the blocks 4) Upon good level of Bell violation in 3), apply Extractor to these two blocks By Azuma-Hoeffding: enough good boxes for linear Hmin By DeFinetti Block 1 and Block 2 are almost product We choose a Bell inequality, which is algebraically violated on quantum state By assumptions, and the above, there are 3 Hmin sources close to product: The rest of SV source and two blocks => Extractors work!

Conclusions and Open problems Can we obtain a protocol with non-zero rate of amplified randomness and explicit extractor ? Can one achieve randomness amplification for any epsilon, from bipartite devices ? (in preparation) Tolerance of noise – is there a protocol which is more robust against noise ? Could we start not from SV-source, but from the one ? Full randomness amplification w.r.t. to non-signaling adversary using small number of devices ( 1 or 2) is possible. Noise tolarance dependence show. Drawback 1 of our protocol: to make deFinetti work we need to make t large: Large number of uses … Drawback 2: for single device nonzero rate but no explicit extractor, for two devices explicit extractor but zero rate due to error Finally : proof applies for 2 devices and 3 devices respectively if we dont use the SV apart from setting the inputs.

Thank you for your attention !