The Operational Meaning of Min- and Max-Entropy

Slides:



Advertisements
Similar presentations
Tony Short University of Cambridge (with Sabri Al-Safi – PRA 84, (2011))
Advertisements

I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Entropy in the Quantum World Panagiotis Aleiferis EECS 598, Fall 2001.
Michael A. Nielsen University of Queensland Quantum entropy Goals: 1.To define entropy, both classical and quantum. 2.To explain data compression, and.
Serge Fehr & Christian Schaffner CWI Amsterdam, The Netherlands 1 Randomness Extraction via ± -Biased Masking in the Presence of a Quantum Attacker TCC.
Quantum information as high-dimensional geometry Patrick Hayden McGill University Perspectives in High Dimensions, Cleveland, August 2010.
Of 13 October 6-7, 2010Emerging Frontiers of Information: Kickoff 1 Madhu Sudan Microsoft Research + MIT TexPoint fonts used in EMF. TexPoint fonts used.
Short course on quantum computing Andris Ambainis University of Latvia.
Chain Rules for Entropy
1 of 9 ON ALMOST LYAPUNOV FUNCTIONS Daniel Liberzon University of Illinois, Urbana-Champaign, U.S.A. TexPoint fonts used in EMF. Read the TexPoint manual.
Stronger Subadditivity Fernando G.S.L. Brandão University College London -> Microsoft Research Coogee 2015 based on arXiv: with Aram Harrow Jonathan.
Chapter 6 Information Theory
Strong Implementation of Social Choice Functions in Dominant Strategies Clemens ThielenSven O. Krumke 3rd International Workshop on Computational Social.
Revision of Chapter III For an information source {p i, i=1,2,…,N} its entropy is defined by Shannon’s first theorem: For an instantaneous coding, we have.
A Family of Quantum Protocols Igor Devetak, IBM Aram Harrow, MIT Andreas Winter, Bristol quant-ph/ IEEE Symposium on Information Theory June 28,
Toyohiro Tsurumaru (Mitsubishi Electric Corporation) Masahito Hayashi (Graduate School of Information Sciences, Tohoku University / CQT National University.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
Coherent Classical Communication Aram Harrow (MIT) quant-ph/
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Quantum Shannon Theory Patrick Hayden (McGill) 17 July 2005, Q-Logic Meets Q-Info.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
Basic Concepts in Information Theory
Entropy localization and distribution in the Hawking radiation Horacio Casini CONICET-Intituto Balseiro – Centro Atómico Bariloche.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 16 (2011)
ENTROPIC CHARACTERISTICS OF QUANTUM CHANNELS AND THE ADDITIVITY PROBLEM A. S. Holevo Steklov Mathematical Institute, Moscow.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Entropy-based Bounds on Dimension Reduction in L 1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A AAAA A Oded Regev.
Channel Capacity
Experimental generation and characterisation of private states Paweł Horodecki Wydział Fizyki Technicznej i Matematyki Stosowanej, Politechnika Gdańska.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Communication Complexity Rahul Jain Centre for Quantum Technologies and Department of Computer Science National University of Singapore. TexPoint fonts.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Universal Guessing with Applications to Cipher Systems A Report on Progress DRDO-IISc PME Rajesh Sundaresan ECE Department 14 March 2008 TexPoint fonts.
The Operational Meaning of Min- and Max-Entropy Christian Schaffner – CWI Amsterdam, NL joint work with Robert König – Caltech Renato Renner – ETH Zürich,
Counterexamples to the maximal p -norm multiplicativity conjecture Patrick Hayden (McGill University) || | | N(½)N(½) p C&QIC, Santa Fe 2008.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A Image:
1 New Coins from old: Computing with unknown bias Elchanan Mossel, U.C. Berkeley
Introduction to Digital and Analog Communication Systems
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Entanglement sampling and applications Omar Fawzi (ETH Zürich) Joint work with Frédéric Dupuis (Aarhus University) and Stephanie Wehner (CQT, Singapore)
Quantum Information Theory Patrick Hayden (McGill) 4 August 2005, Canadian Quantum Information Summer School.
The Square Variation of Rearranged Fourier Series Allison Lewko Mark Lewko Columbia University Institute for Advanced Study TexPoint fonts used in EMF.
Quantum correlations with no causal order OgnyanOreshkov, Fabio Costa, ČaslavBrukner Bhubaneswar arXiv: December2011 Conference on Quantum.
Quantum correlations with no causal order OgnyanOreshkov, Fabio Costa, ČaslavBrukner Bhubaneswar arXiv: December2011 Conference on Quantum.
The Classically Enhanced Father Protocol
Detecting Incapacity Graeme Smith IBM Research Joint Work with John Smolin QECC 2011 December 6, 2011 TexPoint fonts used in EMF. Read the TexPoint manual.
Optimal Trading of Classical Communication, Quantum Communication, and Entanglement Mark M. Wilde arXiv: ERATO-SORST Min-Hsiu Hsieh 4 th Workshop.
A generalization of quantum Stein’s Lemma Fernando G.S.L. Brandão and Martin B. Plenio Tohoku University, 13/09/2008.
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
Cryptography In the Bounded Quantum-Storage Model
Entanglement in Quantum Gravity and Space-Time Topology
B OUNDS ON E NTANGLEMENT D ISTILLATION & S ECRET K EY A GREEMENT C APACITIES FOR Q UANTUM B ROADCAST C HANNELS Kaushik P. Seshadreesan Joint work with.
Fidelities of Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Qubits, von Neumann Measurement, Quantum.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
Exponential Decay of Correlations Implies Area Law: Single-Shot Techniques Fernando G.S.L. Brandão ETH Zürich Based on joint work with Michał Horodecki.
Information Theory of High-throughput Shotgun Sequencing David Tse Dept. of EECS U.C. Berkeley Tel Aviv University June 4, 2012 Research supported by NSF.
The Concavity of the Auxiliary Function for Classical-Quantum Channels Speaker: Hao-Chung Cheng Co-work: Min-Hsiu Hsieh Date: 01/09/
Fernando G.S.L. Brandão and Martin B. Plenio
Dimension reduction for finite trees in L1
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
Information-Theoretical Analysis of the Topological Entanglement Entropy and Multipartite correlations Kohtaro Kato (The University of Tokyo) based on.
Generalized Entropies
Information Theory Michael J. Watts
General Strong Polarization
Quantum Information Theory Introduction
General Strong Polarization
Presentation transcript:

The Operational Meaning of Min- and Max-Entropy http://arxiv.org/abs/0807.1338 Christian Schaffner – CWI Amsterdam, NL joint work with Robert König – Caltech, USA Renato Renner – ETH Zürich, Switzerland TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAAAAAAAAA

Agenda von Neumann Entropy Min- and Max-Entropies Operational Meaning Conclusion

Notation quantum setting: finite-dimensional Hilbert spaces classical-quantum setting: classical setting:

    von Neumann Entropy simple definition “handy” calculus operational: useful in many asymptotic iid settings: data compression rate channel capacities randomness extraction rate secret-key rate …. one-shot setting?   

Conditional Min- and Max-Entropy [Renner 05] conditional von Neumann entropy: conditional min-entropy: conditional max-entropy: Goal of this talk: Understanding these quantities! operator inequality: for pure for pure

Warm-Up Calculations for a product state classically: for product state: measure for the rank of ½A

Smooth Min-/Max-Entropies “smooth” variants can be defined handy calculus (as for von Neumann entropy) operational interpretation in many one-shot scenarios: Data Compression Privacy Amplification (with applications in cryptography) Decoupling State Merging …

Agenda von Neumann Entropy Min- and Max-Entropies Operational Meaning Conclusion

Conditional Min- and Max-Entropy [Renner 05] conditional van Neumann entropy: conditional min-entropy: conditional max-entropy: Goal of this talk: Understanding these quantities! for pure for pure

The Operational Meaning of Min-Entropy for classical states: guessing probability for cq-states: guessing probability for a POVM {Mx}

The Operational Meaning of Min-Entropy for cq-states: guessing probability for qq-states: achievable quantum correlation F( , )2

Proof: Operational Interpr of Min-Entropy for qq-states: achievable quantum correlation F( , , )2 Proof uses: duality of semi-definite programming Choi-Jamiolkowski isomorphism

The Operational Meaning of Max-Entropy for for cq-states: security of a key F( , )2

The Operational Meaning of Max-Entropy for for cq-states: security of a key for qq-states: decoupling accuracy F( , )2

Proof: Operational Interpr of Max-Entropy for F( , )2 follows using monotonicity of fidelity unitary relation of purifications

Implications of our Results connections between operational quantities, e.g. randomness extraction additivity of min-/max-entropies: · follows from definition

Implications of our Results subadditivity of min-entropy: implies subadditivity of von Neumann entropy concrete applications in the noisy-quantum-storage model

Summary

Summary

    von Neumann Entropy simple definition “handy” calculus operational: useful in many asymptotic iid settings one-shot setting?    data compression: randomness extraction: Shannon entropy: …

Information Theory quantify the acquisition, transmission, storage of data often analyzed in the asymptotic setting common measure: Shannon / van Neumann entropy Example: data compression minimal encoding length: [Shannon]: for iid

von Neumann Entropy simple definition: for state “handy” calculus: chain rule: strong subadditivity: …

Operational Interpretation of van Neumann Entropy data compression of a source: randomness-extraction rate of a cq-state: secret-key rate of a cqq-state: …

Single-Shot Data Compression minimal encoding length: [Shannon]: for iid * [Renner,Wolf 04]:

Proof: using Duality of SDPs primal semi-definite program (SDP) for cq-states: guessing probability

Proof II: Choi-Jamiolkowski isomorphism bijective bijective quantum operations

Proof III: Putting It Together CPTP maps bijective

Warm-Up Calculations for a pure state fine, but are these quantities useful ???

Open questions operational meaning of smooth-min entropy calculus for fidelity-based smooth min-entropy

Example: Channel Capacity maximum number of transmittable bits: [Shannon] (noisy-channel coding):

Single-Shot Channel Capacity maximum number of transmittable bits: [Shannon] (noisy-channel coding): [Renner,Wolf,Wullschleger 06]: with

Classical Min-Entropy without Conditioning … …  suggests “smoothing”:

Smooth Min- and Max-Entropy [Renner 05] where ±( , ) is the trace distance or (squared) fidelity for a purification

Smooth-Min-Entropy Calculus von Neumann entropy as special case: strong subadditivity: additivity: chain rules: 

Privacy Amplification maximum number of extractable bits such that [Renner, König 07] with

completely mixed state on A’ Decoupling maximum size of A’ such that completely mixed state on A’ [Renner, Winter, Berta 07] with

State Merging minimal number of ebits required to transmit ½A to B with LOCC LOCC maximal number of ebits generated by transmitting ½A to B with LOCC with [Renner, Winter, Berta 07] [Horodecki, Oppenheim, Winter 05]