-
Worst-case Quantum Hypothesis Testing with Separable Measurements
Authors:
Le Phuc Thinh,
Michele Dall'Arno,
Valerio Scarani
Abstract:
For any pair of quantum states (the hypotheses), the task of binary quantum hypotheses testing is to derive the tradeoff relation between the probability $p_{01}$ of rejecting the null hypothesis and $p_{10}$ of accepting the alternative hypothesis. The case when both hypotheses are explicitly given was solved in the pioneering work by Helstrom. Here, instead, for any given null hypothesis as a pu…
▽ More
For any pair of quantum states (the hypotheses), the task of binary quantum hypotheses testing is to derive the tradeoff relation between the probability $p_{01}$ of rejecting the null hypothesis and $p_{10}$ of accepting the alternative hypothesis. The case when both hypotheses are explicitly given was solved in the pioneering work by Helstrom. Here, instead, for any given null hypothesis as a pure state, we consider the worst-case alternative hypothesis that maximizes $p_{10}$ under a constraint on the distinguishability of such hypotheses. Additionally, we restrict the optimization to separable measurements, in order to describe tests that are performed locally. The case $p_{01}=0$ has been recently studied under the name of "quantum state verification". We show that the problem can be cast as a semi-definite program (SDP). Then we study in detail the two-qubit case. A comprehensive study in parameter space is done by solving the SDP numerically. We also obtain analytical solutions in the case of commuting hypotheses, and in the case where the two hypotheses can be orthogonal (in the latter case, we prove that the restriction to separable measurements generically prevents perfect distinguishability). In regards to quantum state verification, our work shows the existence of more efficient strategies for noisy measurement scenarios.
△ Less
Submitted 8 September, 2020; v1 submitted 24 October, 2019;
originally announced October 2019.
-
Certification of a functionality in a quantum network stage
Authors:
Victoria Lipinska,
Le Phuc Thinh,
Jeremy Ribeiro,
Stephanie Wehner
Abstract:
We consider testing the ability of quantum network nodes to execute multi-round quantum protocols. Specifically, we examine protocols in which the nodes are capable of performing quantum gates, storing qubits and exchanging said qubits over the network a certain number of times. We propose a simple ping-pong test, which provides a certificate for the capability of the nodes to run certain multi-ro…
▽ More
We consider testing the ability of quantum network nodes to execute multi-round quantum protocols. Specifically, we examine protocols in which the nodes are capable of performing quantum gates, storing qubits and exchanging said qubits over the network a certain number of times. We propose a simple ping-pong test, which provides a certificate for the capability of the nodes to run certain multi-round protocols. We first show that in the noise-free regime the only way the nodes can pass the test is if they do indeed possess the desired capabilities. We then proceed to consider the case where operations are noisy, and provide an initial analysis showing how our test can be used to estimate parameters that allow us to draw conclusions about the actual performance of such protocols on the tested nodes. Finally, we investigate the tightness of this analysis using example cases in a numerical simulation.
△ Less
Submitted 28 April, 2020; v1 submitted 22 October, 2019;
originally announced October 2019.
-
Computing quantum Bell inequalities
Authors:
Le Phuc Thinh
Abstract:
Understanding the limits of quantum theory in terms of uncertainty and correlation has always been a topic of foundational interest. Surprisingly this pursuit can also bear interesting applications such as device-independent quantum cryptography and tomography or self-testing. Building upon a series of recent works on the geometry of quantum correlations, we are interested in the problem of comput…
▽ More
Understanding the limits of quantum theory in terms of uncertainty and correlation has always been a topic of foundational interest. Surprisingly this pursuit can also bear interesting applications such as device-independent quantum cryptography and tomography or self-testing. Building upon a series of recent works on the geometry of quantum correlations, we are interested in the problem of computing quantum Bell inequalities or the boundary between quantum and post-quantum world. Better knowledge of this boundary will lead to more efficient device-independent quantum processing protocols. We show that computing quantum Bell inequalities is an instance of a quantifier elimination problem, and apply these techniques to the bipartite scenario in which each party can have three measurement settings. Due to heavy computational complexity, we are able to obtain the characterization of certain "linear" relaxation of the quantum set for this scenario. The resulting quantum Bell inequalities are shown to be equivalent to the Tsirelson-Landau-Masanes arcsin inequality, which is the only type of quantum Bell inequality found since 1987.
△ Less
Submitted 12 September, 2019;
originally announced September 2019.
-
Structure of the set of quantum correlators via semidefinite programming
Authors:
Le Phuc Thinh,
Antonios Varvitsiotis,
Yu Cai
Abstract:
Quantum information leverages properties of quantum behaviors in order to perform useful tasks such as secure communication and randomness certification. Nevertheless, not much is known about the intricate geometric features of the set quantum behaviors. In this paper we study the structure of the set of quantum correlators using semidefinite programming. Our main results are (i) a generalization…
▽ More
Quantum information leverages properties of quantum behaviors in order to perform useful tasks such as secure communication and randomness certification. Nevertheless, not much is known about the intricate geometric features of the set quantum behaviors. In this paper we study the structure of the set of quantum correlators using semidefinite programming. Our main results are (i) a generalization of the analytic description by Tsirelson-Landau-Masanes, (ii) necessary and sufficient conditions for extremality and exposedness, and (iii) an operational interpretation of extremality in the case of two dichotomic measurements, in terms of self-testing. We illustrate the usefulness of our theoretical findings with many examples and extensive computational work.
△ Less
Submitted 28 September, 2018;
originally announced September 2018.
-
Practical and reliable error bars for quantum process tomography
Authors:
Le Phuc Thinh,
Philippe Faist,
Jonas Helsen,
David Elkouss,
Stephanie Wehner
Abstract:
Current techniques in quantum process tomography typically return a single point estimate of an unknown process based on a finite albeit large amount of measurement data. Due to statistical fluctuations, however, other processes close to the point estimate can also produce the observed data with near certainty. Unless appropriate error bars can be constructed, the point estimate does not carry any…
▽ More
Current techniques in quantum process tomography typically return a single point estimate of an unknown process based on a finite albeit large amount of measurement data. Due to statistical fluctuations, however, other processes close to the point estimate can also produce the observed data with near certainty. Unless appropriate error bars can be constructed, the point estimate does not carry any sound operational interpretation. Here, we provide a solution to this problem by constructing a confidence region estimator for quantum processes. Our method enables reliable estimation of essentially any figure-of-merit for quantum processes on few qubits, including the diamond distance to a specific noise model, the entanglement fidelity, and the worst-case entanglement fidelity, by identifying error regions which contain the true state with high probability. We also provide a software package---QPtomographer---implementing our estimator for the diamond norm and the worst-case entanglement fidelity. We illustrate its usage and performance with several simulated examples. Our tools can be used to reliably certify the performance of e.g. error correction codes, implementations of unitary gates or more generally any noise process affecting a quantum system.
△ Less
Submitted 1 August, 2018;
originally announced August 2018.
-
Randomness extraction from Bell violation with continuous parametric down conversion
Authors:
Lijiong Shen,
Jianwei Lee,
Le Phuc Thinh,
Jean-Daniel Bancal,
Alessandro Cerè,
Antia Lamas-Linares,
Adriana Lita,
Thomas Gerrits,
Sae Woo Nam,
Valerio Scarani,
Christian Kurtsiefer
Abstract:
We present a violation of the CHSH inequality without the fair sampling assumption with a continuously pumped photon pair source combined with two high efficiency superconducting detectors. Due to the continuous nature of the source, the choice of the duration of each measurement round effectively controls the average number of photon pairs participating in the Bell test. We observe a maximum viol…
▽ More
We present a violation of the CHSH inequality without the fair sampling assumption with a continuously pumped photon pair source combined with two high efficiency superconducting detectors. Due to the continuous nature of the source, the choice of the duration of each measurement round effectively controls the average number of photon pairs participating in the Bell test. We observe a maximum violation of S= 2.01602(32) with average number of pairs per round of ~0.32, compatible with our system overall detection efficiencies. Systems that violate a Bell inequality are guaranteed to generate private randomness, with the randomness extraction rate depending on the observed violation and on the repetition rate of the Bell test. For our realization, the optimal rate of randomness generation is a compromise between the observed violation and the duration of each measurement round, with the latter realistically limited by the detection time jitter. Using an extractor composably secure against quantum adversary with quantum side information, we calculate an asymptotic rate of ~1300 random bits/s. With an experimental run of 43 minutes, we generated 617,920 random bits, corresponding to ~240 random bits/s.
△ Less
Submitted 8 May, 2018;
originally announced May 2018.
-
Optimizing practical entanglement distillation
Authors:
Filip Rozpędek,
Thomas Schiet,
Le Phuc Thinh,
David Elkouss,
Andrew C. Doherty,
Stephanie Wehner
Abstract:
The goal of entanglement distillation is to turn a large number of weakly entangled states into a smaller number of highly entangled ones. Practical entanglement distillation schemes offer a tradeoff between the fidelity to the target state, and the probability of successful distillation. Exploiting such tradeoffs is of interest in the design of quantum repeater protocols. Here, we present a numbe…
▽ More
The goal of entanglement distillation is to turn a large number of weakly entangled states into a smaller number of highly entangled ones. Practical entanglement distillation schemes offer a tradeoff between the fidelity to the target state, and the probability of successful distillation. Exploiting such tradeoffs is of interest in the design of quantum repeater protocols. Here, we present a number of methods to assess and optimize entanglement distillation schemes. We start by giving a numerical method to compute upper bounds on the maximum achievable fidelity for a desired probability of success. We show that this method performs well for many known examples by comparing it to well-known distillation protocols. This allows us to show optimality for many well-known distillation protocols for specific states of interest. As an example, we analytically prove optimality of the distillation protocol utilized within the Extreme Photon Loss (EPL) entanglement generation scheme, even in the asymptotic limit. We proceed to present a numerical method that can improve an existing distillation scheme for a given input state, and we present an example for which this method finds an optimal distillation protocol. An implementation of our numerical methods is available as a Julia package.
△ Less
Submitted 19 July, 2018; v1 submitted 27 March, 2018;
originally announced March 2018.
-
Device-independence for two-party cryptography and position verification
Authors:
Jeremy Ribeiro,
Le Phuc Thinh,
Jedrzej Kaniewski,
Jonas Helsen,
Stephanie Wehner
Abstract:
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. U…
▽ More
Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we give device-independent security proofs of two-party cryptography and Position Verification for memoryless devices under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation and we show that security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.
△ Less
Submitted 28 June, 2016;
originally announced June 2016.
-
Certified Randomness from a Two-Level System in a Relativistic Quantum Field
Authors:
Le Phuc Thinh,
Jean-Daniel Bancal,
Eduardo Martin-Martinez
Abstract:
Randomness is an indispensable resource in modern science and information technology. Fortunately, an experimentally simple procedure exists to generate randomness with well-characterized devices: measuring a quantum system in a basis complementary to its preparation. Towards realizing this goal one may consider using atoms or superconducting qubits, promising candidates for quantum information pr…
▽ More
Randomness is an indispensable resource in modern science and information technology. Fortunately, an experimentally simple procedure exists to generate randomness with well-characterized devices: measuring a quantum system in a basis complementary to its preparation. Towards realizing this goal one may consider using atoms or superconducting qubits, promising candidates for quantum information processing. However, their unavoidable interaction with the electromagnetic field affects their dynamics. At large time scales, this can result in decoherence. Smaller time scales in principle avoid this problem, but may not be well analysed under the usual rotating wave and single-mode approximation (RWA and SMA) which break the relativistic nature of quantum field theory. Here, we use a fully relativistic analysis to quantify the information that an adversary with access to the field could get on the result of an atomic measurement. Surprisingly, we find that the adversary's guessing probability is not minimized for atoms initially prepared in the ground state (an intuition derived from the RWA and SMA model).
△ Less
Submitted 22 January, 2016;
originally announced January 2016.
-
Randomness in post-selected events
Authors:
Le Phuc Thinh,
Gonzalo de la Torre,
Jean-Daniel Bancal,
Stefano Pironio,
Valerio Scarani
Abstract:
Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little randomness. This raises the question as to whether randomness can be extracted only from the smaller post-selected subset corresponding to proper detection…
▽ More
Bell inequality violations can be used to certify private randomness for use in cryptographic applications. In photonic Bell experiments, a large amount of the data that is generated comes from no-detection events and presumably contains little randomness. This raises the question as to whether randomness can be extracted only from the smaller post-selected subset corresponding to proper detection events, instead of from the entire set of data. This could in principle be feasible without opening an analogue of the detection loophole as long as the min-entropy of the post-selected data is evaluated by taking all the information into account, including no-detection events. The possibility of extracting randomness from a short string has a practical advantage, because it reduces the computational time of the extraction.
Here, we investigate the above idea in a simple scenario, where the devices and the adversary behave according to i.i.d. strategies. We show that indeed almost all the randomness is present in the pair of outcomes for which at least one detection happened. We further show that in some cases applying a pre-processing on the data can capture features that an analysis based on global frequencies only misses, thus resulting in the certification of more randomness. We then briefly consider non-i.i.d strategies and provide an explicit example of such a strategy that is more powerful than any i.i.d. one even in the asymptotic limit of infinitely many measurement rounds, something that was not reported before in the context of Bell inequalities.
△ Less
Submitted 8 March, 2016; v1 submitted 12 June, 2015;
originally announced June 2015.
-
Quantum randomness extraction for various levels of characterization of the devices
Authors:
Yun Zhi Law,
Le Phuc Thinh,
Jean-Daniel Bancal,
Valerio Scarani
Abstract:
The amount of intrinsic randomness that can be extracted from measurement on quantum systems depends on several factors: notably, the power given to the adversary and the level of characterization of the devices of the authorized partners. After presenting a systematic introduction to these notions, in this paper we work in the class of least adversarial power, which is relevant for assessing setu…
▽ More
The amount of intrinsic randomness that can be extracted from measurement on quantum systems depends on several factors: notably, the power given to the adversary and the level of characterization of the devices of the authorized partners. After presenting a systematic introduction to these notions, in this paper we work in the class of least adversarial power, which is relevant for assessing setups operated by trusted experimentalists, and compare three levels of characterization of the devices. Many recent studies have focused on the so-called "device-independent" level, in which a lower bound on the amount of intrinsic randomness can be certified without any characterization. The other extreme is the case when all the devices are fully characterized: this "tomographic" level has been known for a long time. We present for this case a systematic and efficient approach to quantifying the amount of intrinsic randomness, and show that setups involving ancillas (POVMs, pointer measurements) may not be interesting here, insofar as one may extract randomness from the ancilla rather than from the system under study. Finally, we study how much randomness can be obtained in presence of an intermediate level of characterization related to the task of "steering", in which Bob's device is fully characterized while Alice's is a black box. We obtain our results here by adapting the NPA hierarchy of semidefinite programs to the steering scenario.
△ Less
Submitted 15 October, 2014; v1 submitted 17 January, 2014;
originally announced January 2014.
-
Bell tests with min-entropy sources
Authors:
Le Phuc Thinh,
Lana Sheridan,
Valerio Scarani
Abstract:
Device independent protocols rely on the violation of Bell inequalities to certify properties of the resources available. The violation of the inequalities are meaningless without a few well-known assumptions. One of these is measurement independence, the property that the source of the states measured in an inequality is uncorrelated from the measurements selected. Since this assumption cannot be…
▽ More
Device independent protocols rely on the violation of Bell inequalities to certify properties of the resources available. The violation of the inequalities are meaningless without a few well-known assumptions. One of these is measurement independence, the property that the source of the states measured in an inequality is uncorrelated from the measurements selected. Since this assumption cannot be confirmed, we consider the consequences of relaxing it and find that the definition chosen is critically important to the observed behavior. Considering a definition that is a bound on the min-entropy of the measurement settings, we find lower bounds on the min-entropy of the seed used to choose the inputs required to deduce any quantum or non-local behavior from a Bell inequality violation. These bounds are significantly more restrictive than the ones obtained by endowing the seed with the further structure of a Santha-Vazirani source. We also outline a procedure for finding tight bounds and study the set of probabilities that can result from relaxing measurement dependence.
△ Less
Submitted 26 June, 2013; v1 submitted 12 April, 2013;
originally announced April 2013.
-
Security of distributed-phase-reference quantum key distribution
Authors:
Tobias Moroder,
Marcos Curty,
Charles Ci Wen Lim,
Le Phuc Thinh,
Hugo Zbinden,
Nicolas Gisin
Abstract:
Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. Since many years, a full security proof of these schemes in a realistic setting has been elusive. For the first time, we solve this long standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result we pro…
▽ More
Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. Since many years, a full security proof of these schemes in a realistic setting has been elusive. For the first time, we solve this long standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.
△ Less
Submitted 23 July, 2012;
originally announced July 2012.
-
Tomographic Quantum Cryptography Protocols are Reference Frame Independent
Authors:
Le Phuc Thinh,
Lana Sheridan,
Valerio Scarani
Abstract:
We consider the class of reference frame independent protocols in d dimensions for quantum key distribution, in which Alice and Bob have one natural basis that is aligned and the rest of their frames are unaligned. We relate existing approaches to tomographically complete protocols. We comment on two different approaches to finite key bounds in this setting, one direct and one using the entropic u…
▽ More
We consider the class of reference frame independent protocols in d dimensions for quantum key distribution, in which Alice and Bob have one natural basis that is aligned and the rest of their frames are unaligned. We relate existing approaches to tomographically complete protocols. We comment on two different approaches to finite key bounds in this setting, one direct and one using the entropic uncertainty relation and suggest that the existing finite key bounds can still be improved.
△ Less
Submitted 26 June, 2012; v1 submitted 12 September, 2011;
originally announced September 2011.