Randomizing Quantum States: Constructions and Applications

The construction of a perfectly secure private quantum channel in dimension d is known to require 2 log d shared random key bits between the sender and receiver. We show that if only near-perfect security is required, the size of the key can be reduced by a factor of two. More specifically, we show that there exists a set of roughly d log d unitary operators whose average effect on every input pure state is almost perfectly randomizing, as compared to the d2 operators required to randomize perfectly. Aside from the private quantum channel, variations of this construction can be applied to many other tasks in quantum information processing. We show, for instance, that it can be used to construct LOCC data hiding schemes for bits and qubits that are much more efficient than any others known, allowing roughly  log d qubits to be hidden in 2 log d qubits. The method can also be used to exhibit the existence of quantum states with locked classical correlations, an arbitrarily large amplification of the correlation being accomplished by sending a negligibly small classical key. Our construction also provides the basic building block for a method of remotely preparing arbitrary d-dimensional pure quantum states using approximately  log d bits of communication and  log d ebits of entanglement.

[1]  M. Fannes A continuity property of the entropy density for spin lattice systems , 1973 .

[2]  Alexander Semenovich Holevo Statistical problems in quantum physics , 1973 .

[3]  D. Deutsch Uncertainty in Quantum Measurements , 1983 .

[4]  F. Burk Euler's Constant , 1985 .

[5]  V. Milman,et al.  Asymptotic Theory Of Finite Dimensional Normed Spaces , 1986 .

[6]  Maassen,et al.  Generalized entropic uncertainty relations. , 1988, Physical review letters.

[7]  R. Young,et al.  75.9 Euler’s Constant , 1991, The Mathematical Gazette.

[8]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[9]  D. Petz,et al.  Quantum Entropy and Its Use , 1993 .

[10]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[11]  William K. Wootters,et al.  A ‘Pretty Good’ Measurement for Distinguishing Quantum States , 1994 .

[12]  R. Jozsa,et al.  Lower bound for accessible information in quantum mechanics. , 1994, Physical review. A, Atomic, molecular, and optical physics.

[13]  Schumacher,et al.  Quantum coding. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[14]  Schumacher,et al.  Classical information capacity of a quantum channel. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[15]  Junesang Choi,et al.  ON THE EULER'S CONSTANT , 1997 .

[16]  Amir Dembo,et al.  Large Deviations Techniques and Applications , 1998 .

[17]  C. H. Bennett,et al.  Quantum nonlocality without entanglement , 1998, quant-ph/9804053.

[18]  H. Sommers,et al.  Truncations of random unitary matrices , 1999, chao-dyn/9910032.

[19]  Jeroen van de Graaf,et al.  Cryptographic Distinguishability Measures for Quantum-Mechanical States , 1997, IEEE Trans. Inf. Theory.

[20]  Andris Ambainis,et al.  Private quantum channels , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[21]  H. Lo Classical-communication cost in distributed quantum-information processing: A generalization of quantum-communication complexity , 1999, quant-ph/9912009.

[22]  Debbie W. Leung,et al.  Quantum vernam cipher , 2000, Quantum Inf. Comput..

[23]  David P. DiVincenzo,et al.  Hiding Quantum Data , 2002 .

[24]  Debbie W. Leung,et al.  Quantum data hiding , 2002, IEEE Trans. Inf. Theory.

[25]  R F Werner,et al.  Hiding classical data in multipartite quantum states. , 2002, Physical review letters.

[26]  F Verstraete,et al.  Quantum nonlocality in the presence of superselection rules and data hiding protocols. , 2003, Physical review letters.

[27]  Quantum-nonlocality in the presence of superselection rules and some applications , 2003 .

[28]  V. Roychowdhury,et al.  Optimal encryption of quantum bits , 2000, quant-ph/0003059.

[29]  Debbie W Leung,et al.  Oblivious remote state preparation. , 2003, Physical review letters.

[30]  M. Horodecki,et al.  Locking classical correlations in quantum States. , 2003, Physical review letters.

[31]  Debbie W. Leung,et al.  Remote preparation of quantum states , 2005, IEEE Transactions on Information Theory.