Weak String Erasure: Difference between revisions
Line 30: | Line 30: | ||
** <math>A_\mathcal{I}</math> denotes the sub-string of <math>A_1^n</math> whose bit are in <math>\mathcal{I}</math>. | ** <math>A_\mathcal{I}</math> denotes the sub-string of <math>A_1^n</math> whose bit are in <math>\mathcal{I}</math>. | ||
* Let us define the following function. | * Let us define the following function. | ||
<math>\gamma(x):= x \text{ if } x>1/2 </math></br> | <math>\gamma(x):= x, \text{ if } x>1/2 </math></br> | ||
<math>\quad\quad :=g^{-1}(x), \text{ if } x\leq 1/2</math>,</br> | |||
We will use the shorthand <math>A_1^n</math> to denote the string <math>A_1,\ldots,A_n</math>. We denote <math>[n]</math> for the set <math>\{1,\ldots,n\}</math>. <math>H</math> is the Hadamard gate, and by convention <math>H^0=\ | where <math>g(x):= h(x)+x-1</math>, and <math>h(x):=-x\log(x)-(1-x)\log(1-x</math>.</br> | ||
We will use the shorthand <math>A_1^n</math> to denote the string <math>A_1,\ldots,A_n</math>. We denote <math>[n]</math> for the set <math>\{1,\ldots,n\}</math>. <math>H</math> is the Hadamard gate, and by convention <math>H^0=\mathcal{I}</math> and <math>H^1=H</math>. | |||
==Hardware Requirements== | ==Hardware Requirements== |
Revision as of 13:41, 18 April 2019
Weak String Erasure (WSE) is a two-party functionality, say between Alice and Bob, that allows Alice to send a random bit string to Bob, in such a way that Alice is guarantied that a fraction (ideally half) of the bits are lost during the transmission. However, Alice should not know which bits Bob has received, and which bits have been lost.
Tags: Quantum Functionality, Specific Task, Probabilistic Cloning
Two Party Protocols, weak string erasure,Building Blocks, Bounded Storage Model (4)
Assumptions
- We assume that the adversary has access to a quantum memory that is bounded in size, say the memory is of at most qubits. See Bounded/Noisy Storage Model in (4)/(3)
- The transmission of qubit is noiseless/lossless.
- The preparation devices (for quantum state) are assumed to be fully characterized and trusted. We assume the same for the measurement devices.
Outline
Alice and Bob first agree on a duration <maths>Delta t</math> that should correspond to an estimation of the time needed to make any known quantum memory decoheres. The protocol can be decomposed into three parts.
- Distribution This step involves preparation, exchange and measurement of quantum states. Alice chooses a random basis among the X or Z bases. She then chooses at random one of the two states of this basis, prepares this state and sends it over to Bob. Upon receiving the state from Alice, Bob will choose a random basis among the X or Z bases, and measure the incoming qubit in this basis. They both record the basis they have used, Bob also records his measurement outcome, and Alice record which state she has sent. Both parties repeat this procedure n times.
- Waiting time Both parties will wait for time <maths>Delta t</math>. This is to force a malicious party to store part his quantum state in his memory. Of course he will be limited by the size of his quantum memory.
- Classical post-processing Alice will send to Bob, the bases she has used to prepare her states. Bob will erase all the measurement outcomes of the rounds where he measured in a different basis than Alice has prepared the state.
The losses in the transmission happen in the distribution step when Bob measure the incoming qubit in different basis as the one Alice has chosen for the preparation.
Notations Used
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle n} the total number of rounds.
- denotes the string Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle A_1,\ldots,A_n} .
- denotes the Hadamard gate. and Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle H^1=H}
- is the random string Alice sends to Bob by the WSE protocol.
- encodes Alice's choice of basis in round Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle i} .
- is Bob's outcomes measurement.
- encodes Bob's choice of basis in round Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle i} .
- denotes dishonest Bob quantum memory, that can store a state of dimension at most $d$.
- is a duration during which both parties will wait.
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \epsilon>0} is a security parameter.
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \mathcal{I}} denotes the set of rounds where Alice and Bob have chosen the same basis.
- denotes the sub-string of Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle A_1^n} whose bit are in .
- Let us define the following function.
,
where , and .
We will use the shorthand Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle A_1^n}
to denote the string . We denote Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle [n]}
for the set . Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle H}
is the Hadamard gate, and by convention Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle H^0=\mathcal{I}}
and .
Hardware Requirements
- Network Stage: Prepare and Measure.
- Relevant Network Parameters: , Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \Delta M} (see Prepare and Measure Network Stage)
- The parties need a random number generator.
Properties
Pseudo Code
Further Information
- The Bounded Storage Model was introduced in (5), (4)
- The Bounded Storage Model can generalized into the Noisy Storage Models (3), (1)
- The security of Weak String Erasure has been analyzed in the presence of noise and losses (2)