The Operational Meaning of Min- and Max-Entropy Christian Schaffner – CWI Amsterdam, NL joint work with Robert König – Caltech Renato Renner – ETH Zürich,

Slides:



Advertisements
Similar presentations
Efficient classification for metric data Lee-Ad GottliebWeizmann Institute Aryeh KontorovichBen Gurion U. Robert KrauthgamerWeizmann Institute TexPoint.
Advertisements

Tony Short University of Cambridge (with Sabri Al-Safi – PRA 84, (2011))
C&O 355 Mathematical Programming Fall 2010 Lecture 9
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Causal Secrecy: An Informed Eavesdropper.
Paul Cuff THE SOURCE CODING SIDE OF SECRECY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Entropy in the Quantum World Panagiotis Aleiferis EECS 598, Fall 2001.
Michael A. Nielsen University of Queensland Quantum entropy Goals: 1.To define entropy, both classical and quantum. 2.To explain data compression, and.
Serge Fehr & Christian Schaffner CWI Amsterdam, The Netherlands 1 Randomness Extraction via ± -Biased Masking in the Presence of a Quantum Attacker TCC.
Quantum information as high-dimensional geometry Patrick Hayden McGill University Perspectives in High Dimensions, Cleveland, August 2010.
Short course on quantum computing Andris Ambainis University of Latvia.
Chain Rules for Entropy
On the monotonicity of the expected volume of a random simplex Luis Rademacher Computer Science and Engineering The Ohio State University TexPoint fonts.
Stronger Subadditivity Fernando G.S.L. Brandão University College London -> Microsoft Research Coogee 2015 based on arXiv: with Aram Harrow Jonathan.
Chapter 6 Information Theory
Revision of Chapter III For an information source {p i, i=1,2,…,N} its entropy is defined by Shannon’s first theorem: For an instantaneous coding, we have.
A Family of Quantum Protocols Igor Devetak, IBM Aram Harrow, MIT Andreas Winter, Bristol quant-ph/ IEEE Symposium on Information Theory June 28,
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Small Subgraphs in Random Graphs and the Power of Multiple Choices The Online Case Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas.
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
Information Theory and Security
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Quantum Shannon Theory Patrick Hayden (McGill) 17 July 2005, Q-Logic Meets Q-Info.
PAUL CUFF ELECTRICAL ENGINEERING PRINCETON UNIVERSITY Secure Communication for Distributed Systems.
Basic Concepts in Information Theory
1 Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Richard Cleve QNC 3129 Lecture 18 (2014)
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 16 (2011)
ENTROPIC CHARACTERISTICS OF QUANTUM CHANNELS AND THE ADDITIVITY PROBLEM A. S. Holevo Steklov Mathematical Institute, Moscow.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
The Operational Meaning of Min- and Max-Entropy
Entropy-based Bounds on Dimension Reduction in L 1 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A AAAA A Oded Regev.
Channel Capacity
Experimental generation and characterisation of private states Paweł Horodecki Wydział Fizyki Technicznej i Matematyki Stosowanej, Politechnika Gdańska.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark ECRYPT Autumn School, Bertinoro Wednesday, October.
Cryptography In the Bounded Quantum-Storage Model Christian Schaffner, BRICS University of Århus, Denmark 9 th workshop on QIP 2006, Paris Tuesday, January.
Universal Guessing with Applications to Cipher Systems A Report on Progress DRDO-IISc PME Rajesh Sundaresan ECE Department 14 March 2008 TexPoint fonts.
Counterexamples to the maximal p -norm multiplicativity conjecture Patrick Hayden (McGill University) || | | N(½)N(½) p C&QIC, Santa Fe 2008.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A Image:
1 New Coins from old: Computing with unknown bias Elchanan Mossel, U.C. Berkeley
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Entanglement sampling and applications Omar Fawzi (ETH Zürich) Joint work with Frédéric Dupuis (Aarhus University) and Stephanie Wehner (CQT, Singapore)
Coding Theory Efficient and Reliable Transfer of Information
Quantum Information Theory Patrick Hayden (McGill) 4 August 2005, Canadian Quantum Information Summer School.
The Square Variation of Rearranged Fourier Series Allison Lewko Mark Lewko Columbia University Institute for Advanced Study TexPoint fonts used in EMF.
Quantum correlations with no causal order OgnyanOreshkov, Fabio Costa, ČaslavBrukner Bhubaneswar arXiv: December2011 Conference on Quantum.
Quantum correlations with no causal order OgnyanOreshkov, Fabio Costa, ČaslavBrukner Bhubaneswar arXiv: December2011 Conference on Quantum.
Detecting Incapacity Graeme Smith IBM Research Joint Work with John Smolin QECC 2011 December 6, 2011 TexPoint fonts used in EMF. Read the TexPoint manual.
Optimal Trading of Classical Communication, Quantum Communication, and Entanglement Mark M. Wilde arXiv: ERATO-SORST Min-Hsiu Hsieh 4 th Workshop.
A generalization of quantum Stein’s Lemma Fernando G.S.L. Brandão and Martin B. Plenio Tohoku University, 13/09/2008.
C&O 355 Lecture 7 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A.
CPSC 536N Sparse Approximations Winter 2013 Lecture 1 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAAAAAAAA.
Cryptography In the Bounded Quantum-Storage Model
Multipartite Entanglement and its Role in Quantum Algorithms Special Seminar: Ph.D. Lecture by Yishai Shimoni.
1 Leonid Reyzin Boston University Adam Smith Weizmann  IPAM  Penn State Robust Fuzzy Extractors & Authenticated Key Agreement from Close Secrets Yevgeniy.
B OUNDS ON E NTANGLEMENT D ISTILLATION & S ECRET K EY A GREEMENT C APACITIES FOR Q UANTUM B ROADCAST C HANNELS Kaushik P. Seshadreesan Joint work with.
Fidelities of Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Qubits, von Neumann Measurement, Quantum.
Avoiding small subgraphs in the Achlioptas process Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas TexPoint fonts used in EMF.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
Exponential Decay of Correlations Implies Area Law: Single-Shot Techniques Fernando G.S.L. Brandão ETH Zürich Based on joint work with Michał Horodecki.
The Concavity of the Auxiliary Function for Classical-Quantum Channels Speaker: Hao-Chung Cheng Co-work: Min-Hsiu Hsieh Date: 01/09/
Fernando G.S.L. Brandão and Martin B. Plenio
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
Information-Theoretical Analysis of the Topological Entanglement Entropy and Multipartite correlations Kohtaro Kato (The University of Tokyo) based on.
Generalized Entropies
Information Theory Michael J. Watts
General Strong Polarization
Quantum Information Theory Introduction
General Strong Polarization
TexPoint fonts used in EMF.
Presentation transcript:

The Operational Meaning of Min- and Max-Entropy Christian Schaffner – CWI Amsterdam, NL joint work with Robert König – Caltech Renato Renner – ETH Zürich, Switzerland TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A AAA A A A A A A AA A A A A A

2 /34 Agenda Shannon / von Neumann Entropy Min- and Max-Entropies Operational Meaning Conclusion

3 /34 Information Theory quantify the acquisition, transmission, storage of data often used: Shannon entropy Example: data compression minimal encoding length: [Shannon]: for iid

4 /34 quantum setting: finite-dimensional Hilbert spaces classical-quantum setting: classical setting: Notation

5 /34 Operational Interpretation of Shannon Entropy data compression of a source: transmission rate of a channel: secret-key rate of a correlation: …

6 /34 Operational Interpr of van Neumann Entropy data compression of a source: randomness-extraction rate of a cq-state: secret-key rate of a cqq-state: …

7 /34 van Neumann Entropy simple definition: for state “handy” calculus: chain rule: strong subadditivity: …

8 /34 van Neumann Entropy data compression: randomness extraction: Shannon entropy: … simple definition “handy” calculus operational: many iid settings one-shot setting? 

9 /34 Conditional Min- and Max-Entropy conditional van Neumann entropy: conditional min-entropy: conditional max-entropy: for pure [Renner 05] for pure Goal of this talk: Understanding these quantities!

10 /34 for product state: measure for the rank of ½ A Warm-Up Calculations for a product state classically:

11 /34 Warm-Up Calculations for a pure state

12 /34 Classical Min-Entropy without Conditioning suggests “smoothing”: … … 

13 /34 Smooth Min- and Max-Entropy where ± (, ) is the trace distance or (squared) fidelity for a purification [Renner 05]

14 /34 Smooth-Min-Entropy Calculus von Neumann entropy as special case: strong subadditivity: additivity: chain rules: 

15 /34 Single-Shot Data Compression [Renner,Wolf 04] with i.e. up to additive constant of order minimal encoding length: [Shannon]: for iid *

16 /34 Privacy Amplification [Renner, König 07] with maximum number of extractable bits such that

17 /34 Decoupling [Renner, Winter, Berta 07] with maximum size of A’ such that completely mixed state on A’

18 /34 State Merging with [Renner, Winter, Berta 07] minimal number of ebits required to transmit ½ A to B with LOCC LOCC maximal number of ebits generated by transmitting ½ A to B with LOCC [Horodecki, Oppenheim, Winter 05]

19 /34 Agenda von Neumann Entropy Min- and Max-Entropies Operational Meaning Conclusion

20 /34 Conditional Min- and Max-Entropy conditional van Neumann entropy: conditional min-entropy: conditional max-entropy: for pure [Renner 05] for pure Goal of this talk: Understanding these quantities!

21 /34 Warm-Up: Classical Case for classical states: corresponds to average probability of guessing X given Y notion used by [Dodis, Smith]

22 /34 The Operational Meaning of Min-Entropy for classical states: guessing probability for cq-states: guessing probability for a POVM {M x }

23 /34 The Operational Meaning of Min-Entropy for cq-states: guessing probability for qq-states: achievable singlet fraction F(, ) 2

24 /34 F(, ) 2 The Operational Meaning of Max-Entropy for cq-states: security of a key for

25 /34 F(, ) 2 The Operational Meaning of Max-Entropy for cq-states: security of a key for qq-states: decoupling accuracy for

26 /34 Proof: using Duality of SDPs for cq-states: guessing probability primal semi-definite program (SDP)

27 /34 Proof II: Choi-Jamiolkowski isomorphism bijective quantum operations

28 /34 Proof III: Putting It Together CPTP maps bijective

29 /34 Proof: Operational Interpr of Max-Entropy for follows using monotonicity of fidelity unitary relation of purifications

30 /34 connections between operational quantities, e.g. randomness extraction additivity of min-/max-entropies: · follows from definition Implications of our Results

31 /34 subadditivity of min-entropy: Implications of our Results implies subadditivity of von Neumann entropy

32 /34 van Neumann entropy: easy definition calculus shortcomings in single-shot setting replaced by min- and max-entropies scenarios for smooth versions operational interpretation of non-smooth versions Conclusions 

33 /34 Summary

34 /34 Summary

35 /34 operational meaning of smooth-min entropy calculus for fidelity-based smooth min-entropy Open questions

36 /34 Example: Channel Capacity maximum number of transmittable bits: [Shannon] (noisy-channel coding):

37 /34 Single-Shot Channel Capacity [Renner,Wolf,Wullschleger 06]: with maximum number of transmittable bits: [Shannon] (noisy-channel coding):