Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen 6.845 12/12/12 God does not play dice. --Albert Einstein Einstein, stop telling.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

The Data Stream Space Complexity of Cascaded Norms T.S. Jayram David Woodruff IBM Almaden.
Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Optimal Bounds for Johnson- Lindenstrauss Transforms and Streaming Problems with Sub- Constant Error T.S. Jayram David Woodruff IBM Almaden.
Xiaoming Sun Tsinghua University David Woodruff MIT
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
Of 12 12/04/2013CSOI: Communication as Coordination1 Communication as Coordination Madhu Sudan Microsoft, Cambridge, USA -
How to get more mileage from randomness extractors Ronen Shaltiel University of Haifa.
Deterministic extractors for bit- fixing sources by obtaining an independent seed Ariel Gabizon Ran Raz Ronen Shaltiel Seedless.
The Round Complexity of Two-Party Random Selection Saurabh Sanghvi and Salil Vadhan Harvard University.
Tony Short University of Cambridge (with Sabri Al-Safi – PRA 84, (2011))
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Robust Randomness Expansion Upper and Lower Bounds Matthew Coudron, Thomas Vidick, Henry Yuen arXiv:
P LAYING ( QUANTUM ) GAMES WITH OPERATOR SPACES David Pérez-García Universidad Complutense de Madrid Bilbao 8-Oct-2011.
The Unique Games Conjecture with Entangled Provers is False Julia Kempe Tel Aviv University Oded Regev Tel Aviv University Ben Toner CWI, Amsterdam.
Eran Omri, Bar-Ilan University Joint work with Amos Beimel and Ilan Orlov, BGU Ilan Orlov…!??!!
Low Randomness Rumor Spreading via Hashing He Sun Max Planck Institute for Informatics Joint work with George Giakkoupis, Thomas Sauerwald and Philipp.
Short course on quantum computing Andris Ambainis University of Latvia.
Outline 1.Introduction 2.The Framework of Untrusted-Device Extraction. 3.Our results 4.Proof Techniques: Miller-Shi 5.Proof Techniques: Chung-Shi-Wu 6.Further.
Quantum Computing MAS 725 Hartmut Klauck NTU
High-entropy random selection protocols Michal Koucký (Institute of Mathematics, Prague) Harry Buhrman, Matthias Christandl, Zvi Lotker, Boaz Patt-Shamir,
On the tightness of Buhrman- Cleve-Wigderson simulation Shengyu Zhang The Chinese University of Hong Kong On the relation between decision tree complexity.
Parallel Mixing Philippe Golle, PARC Ari Juels, RSA Labs.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.
Oded Regev (Tel Aviv University) Ben Toner (CWI, Amsterdam) Simulating Quantum Correlations with Finite Communication.
Finite probability space set  (sample space) function P:  R + (probability distribution)  P(x) = 1 x 
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Quantum information and the monogamy of entanglement Aram Harrow (MIT) Brown SUMS March 9, 2013.
Is Communication Complexity Physical? Samuel Marcovitch Benni Reznik Tel-Aviv University arxiv
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
Tight Bounds for Graph Problems in Insertion Streams Xiaoming Sun and David P. Woodruff Chinese Academy of Sciences and IBM Research-Almaden.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)
Physical Randomness Extractor Xiaodi Wu (MIT) device ……. Ext(x,s i ) Ext(x,0) Decouple ……. Z1Z1 ZiZi Z i+1 Eve Decouple ……. x uniform-to-all uniform-to-device.
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Quantum signal processing Aram Harrow UW Computer Science & Engineering
Christian Schaffner, PhD student NF-årsfest 2005 A A R H U S U N I V E R S I T E T DAIMI – Department of Computer Science BRICS – Basic Research in Computer.
Worst case analysis of non-local games
Jennifer Campbell November 30,  Problem Statement and Motivation  Analysis of previous work  Simple - competitive strategy  Near optimal deterministic.
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Our project main purpose is to develop a tool for a combinatorial game researcher. Given a version of combinatorial puzzle game and few more parameters,
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
The question Can we generate provable random numbers? …. ?
What are the minimal assumptions needed for infinite randomness expansion? Henry Yuen (MIT) Stellenbosch, South Africa 27 October 2015.
Feb 18 th, 2014 IQI Seminar, Caltech Kai-Min Chung IIS, Sinica,Taiwan Yaoyun Shi University of Michigan Xiaodi Wu MIT/UC Berkeley device ……. Ext(x,s i.
Communication Complexity Guy Feigenblat Based on lecture by Dr. Ely Porat Some slides where adapted from various sources Complexity course Computer science.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
Quantum Cryptography Antonio Acín
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Can small quantum systems learn? NATHAN WIEBE & CHRISTOPHER GRANADE, DEC
Lesson 7 Controllability & Observability Linear system 1. Analysis.
II. Linear Block Codes. © Tallal Elshabrawy 2 Digital Communication Systems Source of Information User of Information Source Encoder Channel Encoder Modulator.
Secret keys and random numbers from quantum non locality Serge Massar.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
Random Access Codes and a Hypercontractive Inequality for
Information Complexity Lower Bounds
New Characterizations in Turnstile Streams with Applications
Modern symmetric-key Encryption
Information primitives and laws of nature Mai 2008 Alain Tapp
CS 154, Lecture 6: Communication Complexity
Quantum Information Theory Introduction
Quantum Supremacy and its Applications (!)
Pseudorandom Numbers Network Security.
Presentation transcript:

Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling God what to do. --Niels Bohr

The Motivating Question Is it possible to test randomness?

The Motivating Question Is it possible to test randomness? …..

The Motivating Question Is it possible to test randomness? …..

Non-local games offers a way… x ϵ {0,1}y ϵ {0,1} a ϵ {0,1}b ϵ {0,1} CHSH game: a+b = x Λ y Classical win probability: 75%Quantum win probability: ~85%

Non-locality offers a way… x ϵ {0,1}y ϵ {0,1} a ϵ {0,1}b ϵ {0,1} CHSH game: a+b = x Λ y Classical win probability: 75%Quantum win probability: ~85% Key insight: if the devices win the CHSH game with > 75% success probability, then their outputs must be randomized!

Non-locality offers a way… [Colbeck ‘10][PAM+ ‘10][VV ’11] devised protocols that not only certify randomness, but also expand it! short random seed Referee tests outputs, and if test passes, outputs are random! … …. long pseudorandom input sequence Referee feeds devices inputs and collects outputs in a streaming fashion.

Exponential certifiable randomness Vazirani-Vidick Protocol achieves exponential certifiable randomness expansion! n-bit seed Referee tests that the devices win the CHSH game ~85% of time per block … …. 2 O(n) rounds Bell block: inputs are randomized If the outputs pass the test, then they’re certified to have 2 O(n) bits of entropy! Regular block: inputs are deterministic

And the obvious question is... Can we do better? Doubly exponential? …infinite expansion?

Our results Upper bounds – Nonadaptive protocols performing “AND” tests, with perfect games: doubly exponential upper bound. – Nonadaptive ( no signalling ) protocols performing CHSH tests: exponential upper bound Shows VV-like protocols and analysis are essentially optimal! Lower bounds – A simplified VV protocol that achieves better randomness rate.

Definitions Non-Adaptive “AND” Test Perfect Games CHSH Tests Test … …

Doubly Exponential Bound Must exhibit a “cheating strategy” for Alice and Bob Assume an “AND” test with perfect games Outputs must be low entropy Idea: Replay previous outputs when inputs repeat. But, how can we be sure when inputs repeat

Doubly Exponential Bound Idea: Alice and Bob both compute input matrix M Where rows of M repeat, inputs must repeat Replay outputs on repeated rows (0, 1) (1, 1) (1, 0) (0, 1) (1, 0) (0, 0) (0, 1) (1, 1) (0, 0) (1, 0) (0, 1) (0, 0) (1, 1) (1, 0) (0, 1) (1, 0) (0, 0) (1, 1) (1, 0) (0, 0) (0, 1) (1, 0) (1, 1) (0, 0) (0, 1) (1, 1) (0, 0) (1, 0) (1, 1) M

Doubly Exponential Bound (0, 1) (1, 1) (1, 0) (0, 1) (1, 0) (0, 0) (0, 1) (1, 1) (0, 0) (1, 0) (0, 1) (0, 0) (1, 1) (1, 0) (0, 1) (1, 0) (0, 0) (1, 1) (1, 0) (0, 0) (0, 1) (1, 0) (1, 1) (0, 0) (0, 1) (1, 1) (0, 0) (1, 0) (1, 1) n+1

Exponential Bound Consider CHSH tests Many existing protocols use these Goal: exhibit a “cheating strategy” for Alice and Bob Require that they only play an exponential number of games honestly Test

Exponential Bound Idea: Imagine rows as vectors The dimension of the vector space is only exponential (not doubly) How can we use this? Only play honestly on rows of M that are linearly independent of previous rows (0, 1) (1, 1) (1, 0) (0, 1) (1, 0) (0, 0) (0, 1) (1, 1) (0, 0) (1, 0) (0, 1) (0, 0) (1, 1) (1, 0) (0, 1) (1, 0) (0, 0) (1, 1) (1, 0) (0, 0) (0, 1) (1, 0) (1, 1) (0, 0) (0, 1) (1, 1) (0, 0) (1, 0) (1, 1) M

Exponential Bound

Test

Exponential Bound

Open Problems Adaptive protocols More General Tests Other Games Test