-
Quadratic unconstrained binary optimization and constraint programming approaches for lattice-based cyclic peptide docking
Authors:
J. Kyle Brubaker,
Kyle E. C. Booth,
Akihiko Arakawa,
Fabian Furrer,
Jayeeta Ghosh,
Tsutomu Sato,
Helmut G. Katzgraber
Abstract:
The peptide-protein docking problem is an important problem in structural biology that facilitates rational and efficient drug design. In this work, we explore modeling and solving this problem with the quantum-amenable quadratic unconstrained binary optimization (QUBO) formalism. Our work extends recent efforts by incorporating the objectives and constraints associated with peptide cyclization an…
▽ More
The peptide-protein docking problem is an important problem in structural biology that facilitates rational and efficient drug design. In this work, we explore modeling and solving this problem with the quantum-amenable quadratic unconstrained binary optimization (QUBO) formalism. Our work extends recent efforts by incorporating the objectives and constraints associated with peptide cyclization and peptide-protein docking in the two-particle model on a tetrahedral lattice. We propose a ``resource efficient'' QUBO encoding for this problem, and baseline its performance with a novel constraint programming (CP) approach. We implement an end-to-end framework that enables the evaluation of our methods on instances from the Protein Data Bank (PDB). Our results show that the QUBO approach, using a classical simulated annealing solver, is able to find feasible conformations for problems with up to 6 peptide residues and 34 target protein residues, but has trouble scaling beyond this problem size. In contrast, the CP approach can solve problems with up to 13 peptide residues and 34 target protein residues. We conclude that while QUBO can be used to successfully tackle this problem, its scaling limitations and the strong performance of the CP method suggest that it may not be the best choice.
△ Less
Submitted 13 December, 2024;
originally announced December 2024.
-
Continuous-Variable Protocol for Oblivious Transfer in the Noisy-Storage Model
Authors:
Fabian Furrer,
Tobias Gehring,
Christian Schaffner,
Christoph Pacher,
Roman Schnabel,
Stephanie Wehner
Abstract:
Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here the first quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the…
▽ More
Cryptographic protocols are the backbone of our information society. This includes two-party protocols which offer protection against distrustful players. Such protocols can be built from a basic primitive called oblivious transfer. We present and experimentally demonstrate here the first quantum protocol for oblivious transfer for optical continuous-variable systems, and prove its security in the noisy-storage model. This model allows to establish security by sending more quantum signals than an attacker can reliably store during the protocol. The security proof is based on new uncertainty relations which we derive for continuous-variable systems, that differ from the ones used in quantum key distribution. We experimentally demonstrate the proposed oblivious transfer protocol for various channel losses by using entangled two-mode squeezed states measured with balanced homodyne detection. Our work enables the implementation of arbitrary two-party quantum cryptographic protocols with continuous-variable communication systems.
△ Less
Submitted 31 July, 2017;
originally announced August 2017.
-
Repeaters for Continuous Variable Quantum Communication
Authors:
Fabian Furrer,
William J. Munro
Abstract:
Optical telecommunication is at the heart of today's internet and is currently enabled by the transmission of intense optical signals between remote locations. As we look to the future of telecommunication, quantum mechanics promise new ways to be able to transmit and process that information. Demonstrations of quantum key distribution and quantum teleportation using multi-photon states have been…
▽ More
Optical telecommunication is at the heart of today's internet and is currently enabled by the transmission of intense optical signals between remote locations. As we look to the future of telecommunication, quantum mechanics promise new ways to be able to transmit and process that information. Demonstrations of quantum key distribution and quantum teleportation using multi-photon states have been performed, but only over ranges limited to one hundred kilometers. To go beyond this, we need repeaters that are compatible with these quantum multi-photon continuous variables pulses. Here we present a design for a continuous variable quantum repeaters that can distribute entangled and pure two-mode squeezed states over arbitrarily long distances with a success probability that scales only polynomially with distance. The proposed quantum repeater is composed from several basic known building blocks such as non-Gaussian operations for entanglement distillation and an iterative Gaussification protocol (for retaining the Gaussian character of the final state), but complemented with a heralded non-Gaussian entanglement swapping protocol, which allows us to avoid extensive iterations of quantum Gaussification. We characterize the performance of this scheme in terms of key rates for quantum key distribution and show a secure key can be generated over thousands of kilometers.
△ Less
Submitted 8 November, 2016;
originally announced November 2016.
-
Finite-key analysis for time-energy high-dimensional quantum key distribution
Authors:
Murphy Yuezhen Niu,
Feihu Xu,
Fabian Furrer,
Jeffrey H. Shapiro
Abstract:
Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature of time-energy entangled biphotons and the loss tolerance of single-photon detection to achieve long-distance key distribution with high photon information efficiency. To date, the general-attack security of HD-QKD has only been proven in the asymptotic regime, while HD-QKD's finite-key security ha…
▽ More
Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature of time-energy entangled biphotons and the loss tolerance of single-photon detection to achieve long-distance key distribution with high photon information efficiency. To date, the general-attack security of HD-QKD has only been proven in the asymptotic regime, while HD-QKD's finite-key security has only been established for a limited set of attacks. Here we fill this gap by providing a rigorous HD-QKD security proof for general attacks in the finite-key regime. Our proof relies on a novel entropic uncertainty relation that we derive for time and conjugate-time measurements using dispersive optics, and our analysis includes an efficient decoy-state protocol in its parameter estimation. We present numerically-evaluated secret-key rates illustrating the feasibility of secure and composable HD-QKD over metropolitan-area distances when the system is subjected to the most powerful eavesdropping attack.
△ Less
Submitted 21 October, 2016; v1 submitted 27 June, 2016;
originally announced June 2016.
-
Information Reconciliation for Continuous-Variable Quantum Key Distribution using Non-Binary Low-Density Parity-Check Codes
Authors:
Christoph Pacher,
Jesus Martinez-Mateo,
Jörg Duhme,
Tobias Gehring,
Fabian Furrer
Abstract:
An information reconciliation method for continuous-variable quantum key distribution with Gaussian modulation that is based on non-binary low-density parity-check (LDPC) codes is presented. Sets of regular and irregular LDPC codes with different code rates over the Galois fields $GF(8)$, $GF(16)$, $GF(32)$, and $GF(64)$ have been constructed. We have performed simulations to analyze the efficienc…
▽ More
An information reconciliation method for continuous-variable quantum key distribution with Gaussian modulation that is based on non-binary low-density parity-check (LDPC) codes is presented. Sets of regular and irregular LDPC codes with different code rates over the Galois fields $GF(8)$, $GF(16)$, $GF(32)$, and $GF(64)$ have been constructed. We have performed simulations to analyze the efficiency and the frame error rate using the sum-product algorithm. The proposed method achieves an efficiency between $0.94$ and $0.98$ if the signal-to-noise ratio is between $4$ dB and $24$ dB.
△ Less
Submitted 29 February, 2016;
originally announced February 2016.
-
Continuous-Variable Protocols in the Noisy-Storage Model
Authors:
Fabian Furrer,
Christian Schaffner,
Stephanie Wehner
Abstract:
We present the first protocol for oblivious transfer that can be implemented with an optical continuous-variable system, and prove its security in the noisy-storage model. This model allows security to be achieved by sending more quantum signals than an attacker can reliably store at one specific point during the protocol. Concretely, we determine how many signals need to be sent in order to achie…
▽ More
We present the first protocol for oblivious transfer that can be implemented with an optical continuous-variable system, and prove its security in the noisy-storage model. This model allows security to be achieved by sending more quantum signals than an attacker can reliably store at one specific point during the protocol. Concretely, we determine how many signals need to be sent in order to achieve security by establishing a trade-off between quantum uncertainty generated in the protocol and the classical capacity of the memory channel. As our main technical tool, we study and derive new uncertainty relations for continuous-variable systems. Finally, we provide explicit security parameters for realistic memory models.
△ Less
Submitted 30 September, 2015;
originally announced September 2015.
-
Optimality of entropic uncertainty relations
Authors:
Kais Abdelkhalek,
René Schwonnek,
Hans Maassen,
Fabian Furrer,
Jörg Duhme,
Philippe Raynal,
Berthold-Georg Englert,
Reinhard F. Werner
Abstract:
The entropic uncertainty relation proven by Maassen and Uffink for arbitrary pairs of two observables is known to be non-optimal. Here, we call an uncertainty relation optimal, if the lower bound can be attained for any value of either of the corresponding uncertainties. In this work we establish optimal uncertainty relations by characterising the optimal lower bound in scenarios similar to the Ma…
▽ More
The entropic uncertainty relation proven by Maassen and Uffink for arbitrary pairs of two observables is known to be non-optimal. Here, we call an uncertainty relation optimal, if the lower bound can be attained for any value of either of the corresponding uncertainties. In this work we establish optimal uncertainty relations by characterising the optimal lower bound in scenarios similar to the Maassen-Uffink type. We disprove a conjecture by Englert et al. and generalise various previous results. However, we are still far from a complete understanding and, based on numerical investigation and analytical results in small dimension, we present a number of conjectures.
△ Less
Submitted 1 September, 2015;
originally announced September 2015.
-
Information-theoretical analysis of topological entanglement entropy and multipartite correlations
Authors:
Kohtaro Kato,
Fabian Furrer,
Mio murao
Abstract:
A special feature of the ground state in a topologically ordered phase is the existence of large scale correlations depending only on the topology of the regions. These correlations can be detected by the topological entanglement entropy or by a measure called irreducible correlation. We show that these two measures coincide for states obeying an area law and having zero-correlation length. Moreov…
▽ More
A special feature of the ground state in a topologically ordered phase is the existence of large scale correlations depending only on the topology of the regions. These correlations can be detected by the topological entanglement entropy or by a measure called irreducible correlation. We show that these two measures coincide for states obeying an area law and having zero-correlation length. Moreover, we provide an operational meaning for these measures by proving its equivalence to the optimal rate of a particular class of secret sharing protocols. This establishes an information-theoretical approach to multipartite correlations in topologically ordered systems.
△ Less
Submitted 8 January, 2016; v1 submitted 7 May, 2015;
originally announced May 2015.
-
Implementation of Continuous-Variable Quantum Key Distribution with Composable and One-Sided-Device-Independent Security Against Coherent Attacks
Authors:
Tobias Gehring,
Vitus Händchen,
Jörg Duhme,
Fabian Furrer,
Torsten Franz,
Christoph Pacher,
Reinhard F. Werner,
Roman Schnabel
Abstract:
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite…
▽ More
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side-channels. Here, we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memory-free attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a crucial step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
△ Less
Submitted 11 November, 2024; v1 submitted 24 June, 2014;
originally announced June 2014.
-
Reverse Reconciliation Continuous Variable Quantum Key Distribution Based on the Uncertainty Principle
Authors:
Fabian Furrer
Abstract:
A big challenge in continuous variable quantum key distribution is to prove security against arbitrary coherent attacks including realistic assumptions such as finite-size effects. Recently, such a proof has been presented in [Phys. Rev. Lett. 109, 100502 (2012)] for a two-mode squeezed state protocol based on a novel uncertainty relation with quantum memories. But the transmission distances were…
▽ More
A big challenge in continuous variable quantum key distribution is to prove security against arbitrary coherent attacks including realistic assumptions such as finite-size effects. Recently, such a proof has been presented in [Phys. Rev. Lett. 109, 100502 (2012)] for a two-mode squeezed state protocol based on a novel uncertainty relation with quantum memories. But the transmission distances were fairly limited due to a direct reconciliation protocol. We prove here security against coherent attacks of a reverse reconciliation protocol under similar assumptions but allowing distances of over 16 km for experimentally feasible parameters. We further clarify the limitations when using the uncertainty relation with quantum memories in security proofs of continuous variable quantum key distribution.
△ Less
Submitted 17 November, 2014; v1 submitted 23 May, 2014;
originally announced May 2014.
-
State-Dependent Approach to Entropic Measurement-Disturbance Relations
Authors:
Patrick J. Coles,
Fabian Furrer
Abstract:
Heisenberg's intuition was that there should be a tradeoff between measuring a particle's position with greater precision and disturbing its momentum. Recent formulations of this idea have focused on the question of how well two complementary observables can be jointly measured. Here, we provide an alternative approach based on how enhancing the predictability of one observable necessarily disturb…
▽ More
Heisenberg's intuition was that there should be a tradeoff between measuring a particle's position with greater precision and disturbing its momentum. Recent formulations of this idea have focused on the question of how well two complementary observables can be jointly measured. Here, we provide an alternative approach based on how enhancing the predictability of one observable necessarily disturbs a complementary one. Our measurement-disturbance relation refers to a clear operational scenario and is expressed by entropic quantities with clear statistical meaning. We show that our relation is perfectly tight for all measurement strengths in an existing experimental setup involving qubit measurements.
△ Less
Submitted 21 November, 2014; v1 submitted 29 November, 2013;
originally announced November 2013.
-
Information-theoretical formulation of anyonic entanglement
Authors:
Kohtaro Kato,
Fabian Furrer,
Mio Murao
Abstract:
Anyonic systems are modeled by topologically protected Hilbert spaces which obey complex superselection rules restricting possible operations. These Hilbert spaces cannot be decomposed into tensor products of spatially localized subsystems, whereas the tensor product structure is a foundation of the standard entanglement theory. We formulate bipartite entanglement theory for pure anyonic states an…
▽ More
Anyonic systems are modeled by topologically protected Hilbert spaces which obey complex superselection rules restricting possible operations. These Hilbert spaces cannot be decomposed into tensor products of spatially localized subsystems, whereas the tensor product structure is a foundation of the standard entanglement theory. We formulate bipartite entanglement theory for pure anyonic states and analyze its properties as a non-local resource for quantum information processing. We introduce a new entanglement measure, asymptotic entanglement entropy (AEE), and show that it characterizes distillable entanglement and entanglement cost similarly to entanglement entropy in conventional systems. AEE depends not only on the Schmidt coefficients but also on the quantum dimensions of the anyons shared by the local subsystems. Moreover, it turns out that AEE coincides with the entanglement gain by anyonic excitations in certain topologically ordered phases.
△ Less
Submitted 18 December, 2014; v1 submitted 15 October, 2013;
originally announced October 2013.
-
Position-Momentum Uncertainty Relations in the Presence of Quantum Memory
Authors:
Fabian Furrer,
Mario Berta,
Marco Tomamichel,
Volkher B. Scholz,
Matthias Christandl
Abstract:
A prominent formulation of the uncertainty principle identifies the fundamental quantum feature that no particle may be prepared with certain outcomes for both position and momentum measurements. Often the statistical uncertainties are thereby measured in terms of entropies providing a clear operational interpretation in information theory and cryptography. Recently, entropic uncertainty relations…
▽ More
A prominent formulation of the uncertainty principle identifies the fundamental quantum feature that no particle may be prepared with certain outcomes for both position and momentum measurements. Often the statistical uncertainties are thereby measured in terms of entropies providing a clear operational interpretation in information theory and cryptography. Recently, entropic uncertainty relations have been used to show that the uncertainty can be reduced in the presence of entanglement and to prove security of quantum cryptographic tasks. However, much of this recent progress has been focused on observables with only a finite number of outcomes not including Heisenberg's original setting of position and momentum observables. Here we show entropic uncertainty relations for general observables with discrete but infinite or continuous spectrum that take into account the power of an entangled observer. As an illustration, we evaluate the uncertainty relations for position and momentum measurements, which is operationally significant in that it implies security of a quantum key distribution scheme based on homodyne detection of squeezed Gaussian states.
△ Less
Submitted 5 January, 2015; v1 submitted 21 August, 2013;
originally announced August 2013.
-
Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks
Authors:
Fabian Furrer,
Torsten Franz,
Mario Berta,
Anthony Leverrier,
Volkher B. Scholz,
Marco Tomamichel,
Reinhard F. Werner
Abstract:
We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under g…
▽ More
We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.
△ Less
Submitted 20 January, 2014; v1 submitted 9 December, 2011;
originally announced December 2011.
-
Gaussian Entanglement for Quantum Key Distribution from a Single-Mode Squeezing Source
Authors:
Tobias Eberle,
Vitus Händchen,
Jörg Duhme,
Torsten Franz,
Fabian Furrer,
Roman Schnabel,
Reinhard F. Werner
Abstract:
We report the suitability of an Einstein-Podolsky-Rosen (EPR) entanglement source for gaussian continuous-variable quantum key distribution at 1550 nm. Our source is based on a single continuous-wave squeezed vacuum mode combined with a vacuum mode at a balanced beam splitter. Extending a recent security proof, we characterize the source by quantifying the extractable length of a composable secure…
▽ More
We report the suitability of an Einstein-Podolsky-Rosen (EPR) entanglement source for gaussian continuous-variable quantum key distribution at 1550 nm. Our source is based on a single continuous-wave squeezed vacuum mode combined with a vacuum mode at a balanced beam splitter. Extending a recent security proof, we characterize the source by quantifying the extractable length of a composable secure key from a finite number of samples under the assumption of collective attacks. We show that distances in the order of 10 km are achievable with this source for a reasonable sample size despite the fact that the entanglement was generated including a vacuum mode. Our security analysis applies to all states having an asymmetry in the field quadrature variances, including those generated by superposition of two squeezed modes with different squeezing strengths.
△ Less
Submitted 1 May, 2013; v1 submitted 18 October, 2011;
originally announced October 2011.
-
The Smooth Entropy Formalism for von Neumann Algebras
Authors:
Mario Berta,
Fabian Furrer,
Volkher B. Scholz
Abstract:
We discuss information-theoretic concepts on infinite-dimensional quantum systems. In particular, we lift the smooth entropy formalism as introduced by Renner and collaborators for finite-dimensional systems to von Neumann algebras. For the smooth conditional min- and max-entropy we recover similar characterizing properties and information-theoretic operational interpretations as in the finite-dim…
▽ More
We discuss information-theoretic concepts on infinite-dimensional quantum systems. In particular, we lift the smooth entropy formalism as introduced by Renner and collaborators for finite-dimensional systems to von Neumann algebras. For the smooth conditional min- and max-entropy we recover similar characterizing properties and information-theoretic operational interpretations as in the finite-dimensional case. We generalize the entropic uncertainty relation with quantum side information of Tomamichel and Renner and discuss applications to quantum cryptography. In particular, we prove the possibility to perform privacy amplification and classical data compression with quantum side information modeled by a von Neumann algebra.
△ Less
Submitted 1 December, 2015; v1 submitted 27 July, 2011;
originally announced July 2011.
-
Extremal Quantum Correlations and Cryptographic Security
Authors:
T. Franz,
F. Furrer,
R. F. Werner
Abstract:
We investigate a fundamental property of device independent security in quantum cryptography by characterizing probability distributions which are necessarily independent of the measurement results of any eavesdropper. We show that probability distributions that are secure in this sense are exactly the extremal quantum probability distributions. This allows us to give a characterization of securit…
▽ More
We investigate a fundamental property of device independent security in quantum cryptography by characterizing probability distributions which are necessarily independent of the measurement results of any eavesdropper. We show that probability distributions that are secure in this sense are exactly the extremal quantum probability distributions. This allows us to give a characterization of security in algebraic terms. We apply the method to common examples for two-party as well as multi-party setups and present a scheme for verifying security of probability distributions with two parties, two measurement settings, and two outcomes.
△ Less
Submitted 1 June, 2011; v1 submitted 6 October, 2010;
originally announced October 2010.
-
Min- and Max-Entropy in Infinite Dimensions
Authors:
Fabian Furrer,
Johan Aberg,
Renato Renner
Abstract:
We consider an extension of the conditional min- and max-entropies to infinite-dimensional separable Hilbert spaces. We show that these satisfy characterizing properties known from the finite-dimensional case, and retain information-theoretic operational interpretations, e.g., the min-entropy as maximum achievable quantum correlation, and the max-entropy as decoupling accuracy. We furthermore gene…
▽ More
We consider an extension of the conditional min- and max-entropies to infinite-dimensional separable Hilbert spaces. We show that these satisfy characterizing properties known from the finite-dimensional case, and retain information-theoretic operational interpretations, e.g., the min-entropy as maximum achievable quantum correlation, and the max-entropy as decoupling accuracy. We furthermore generalize the smoothed versions of these entropies and prove an infinite-dimensional quantum asymptotic equipartition property. To facilitate these generalizations we show that the min- and max-entropy can be expressed in terms of convergent sequences of finite-dimensional min- and max-entropies, which provides a convenient technique to extend proofs from the finite to the infinite-dimensional setting.
△ Less
Submitted 17 September, 2011; v1 submitted 8 April, 2010;
originally announced April 2010.