Abstract
We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.
Highlights
Entanglement is a key resource in quantum information processing
Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting
We summarize the main findings of our paper as follows: recurrence-type entanglement distillation protocols prepended by a symmetrization and a system discarding step enable confidentiality, provided that the noise transcripts do not leak to the adversary for all noise levels α for which distillation would be possible in the i.i.d. case
Summary
Original content from this Abstract work may be used under We present a security proof for establishing private entanglement by means of recurrence-type the terms of the Creative Commons Attribution 3.0 entanglement distillation protocols over noisy quantum channels. Local devices are imperfect, and show that a confidential quantum channel can be. Any further distribution of this work must maintain established, and used to e.g. perform distributed quantum computation in a secure manner. While attribution to the author(s) and the title of our results are not fully device independent (which we argue to be unachievable in settings with the work, journal citation quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in and DOI. We provide entanglement distillation protocols for non-i.i.d. input states
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.