Information Theories with Adversaries, Intrinsic Information, and Entanglement

There are aspects of privacy theory that are analogous to quantum theory. In particular one can define distillable key and key cost in parallel to distillable entanglement and entanglement cost. We present here classical privacy theory as a particular case of information theory with adversaries, where similar general laws hold as in entanglement theory. We place the result of Renner and Wolf—that intrinsic information is lower bound for key cost—into this general formalism. Then we show that the question of whether intrinsic information is equal to key cost is equivalent to the question of whether Alice and Bob can create a distribution product with Eve using IM bits of secret key. We also propose a natural analogue of relative entropy of entanglement in privacy theory and show that it is equal to the intrinsic information. We also provide a formula analogous to the entanglement of formation for classical distributions.

[1]  Aaron D. Wyner,et al.  The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.

[2]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[3]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[4]  Charles H. Bennett,et al.  Concentrating partial entanglement by local operations. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[5]  Charles H. Bennett,et al.  Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[6]  M. Plenio,et al.  Quantifying Entanglement , 1997, quant-ph/9702027.

[7]  G. Vidal On the characterization of entanglement , 1998 .

[8]  V. Vedral,et al.  Entanglement measures and purification procedures , 1997, quant-ph/9707035.

[9]  M. Horodecki Limits for compression of quantum information carried by ensembles of mixed states , 1997, quant-ph/9712035.

[10]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.

[11]  M. Horodecki,et al.  Limits for entanglement measures. , 1999, Physical review letters.

[12]  M. Nielsen Continuity bounds for entanglement , 1999, quant-ph/9908086.

[13]  Oliver Rudolph The uniqueness theorem for entanglement measures , 2001, quant-ph/0105104.

[14]  M. Horodecki,et al.  The asymptotic entanglement cost of preparing a quantum state , 2000, quant-ph/0008134.

[15]  J. Cirac,et al.  Visible compression of commuting mixed states , 2001, quant-ph/0101111.

[16]  S. Massar,et al.  Multipartite classical and quantum secrecy monotones , 2002, quant-ph/0202103.

[17]  S. Popescu,et al.  Classical analog of entanglement , 2001, quant-ph/0107082.

[18]  Ujjwal Sen,et al.  Local information as a resource in distributed quantum systems. , 2003, Physical review letters.

[19]  N. Gisin,et al.  Equivalence between two-qubit entanglement and secure key distribution. , 2003, Physical review letters.

[20]  Are there phase transitions in information space? , 2002, Physical review letters.

[21]  M. Horodecki,et al.  Reversible transformations from pure to mixed states and the unique measure of information , 2002, quant-ph/0212019.

[22]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[23]  J. Oppenheim,et al.  Secure key from bound entanglement. , 2003, Physical Review Letters.

[24]  A. Winter,et al.  Distillation of secret key and entanglement from quantum states , 2003, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences.