Linking Classical and Quantum Key Agreement: Is There "Bound Information"?

After carrying out a protocol for quantum key agreement over a noisy quantum channel, the parties Alice and Bob must process the raw key in order to end up with identical keys about which the adversary has virtually no information. In principle, both classical and quantum protocols can be used for this processing. It is a natural question which type of protocols is more powerful. We show that the limits of tolerable noise are identical for classical and quantum protocols in many cases. More specifically, we prove that a quantum state between two parties is entangled if and only if the classical random variables resulting from optimal measurements provide some mutual classical information between the parties. In addition, we present evidence which strongly suggests that the potentials of classical and of quantum protocols are equal in every situation. An important consequence, in the purely classical regime, of such a correspondence would be the existence of a classical counterpart of so-called bound entanglement, namely "bound information" that cannot be used for generating a secret key by any protocol. This stands in sharp contrast to what was previously believed.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Charles H. Bennett,et al.  Purification of noisy entanglement and faithful teleportation via noisy channels. , 1995, Physical review letters.

[3]  Nicolas Gisin,et al.  Quantum cloning, eavesdropping and Bell's inequality , 1997 .

[4]  S. Popescu,et al.  Thermodynamics and the measure of entanglement , 1996, quant-ph/9610044.

[5]  Ashish V. Thapliyal,et al.  Evidence for bound entangled states with negative partial transpose , 1999, quant-ph/9910026.

[6]  P. Horodecki Separability criterion and inseparable mixed states with positive partial transposition , 1997, quant-ph/9703004.

[7]  Buzek,et al.  Quantum copying: Beyond the no-cloning theorem. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[8]  N. Gisin Stochastic quantum dynamics and relativity , 1989 .

[9]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[10]  S. Wolf,et al.  Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols , 1999, quant-ph/9902048.

[11]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[12]  N. Gisin,et al.  Quantum cryptography , 1998 .

[13]  N. Mermin,et al.  The Ithaca interpretation of quantum mechanics , 1996, quant-ph/9609013.

[14]  N. Mermin Quantum theory: Concepts and methods , 1997 .

[15]  M. Horodecki,et al.  BOUND ENTANGLEMENT CAN BE ACTIVATED , 1998, quant-ph/9806058.

[16]  Ueli Maurer,et al.  Unconditionally Secure Key Agreement and the Intrinsic Conditional Information , 1999, IEEE Trans. Inf. Theory.

[17]  M. Horodecki,et al.  Mixed-State Entanglement and Distillation: Is there a “Bound” Entanglement in Nature? , 1998, quant-ph/9801069.

[18]  Stefan Wolf,et al.  Information-theoretically and computationally secure key agreement in cryptography , 1999 .

[19]  Ivan Damgård,et al.  Improved Non-committing Encryption Schemes Based on a General Complexity Assumption , 2000, CRYPTO.

[20]  Ueli Maurer,et al.  Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free , 2000, EUROCRYPT.

[21]  N. Gisin,et al.  OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .

[22]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[23]  Pérès Separability Criterion for Density Matrices. , 1996, Physical review letters.

[24]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[25]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[26]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[27]  S. Massar,et al.  Optimal Quantum Cloning Machines , 1997, quant-ph/9705046.

[28]  N. Gisin,et al.  Automated 'plug & play' quantum key distribution , 1998, quant-ph/9812052.

[29]  R. Jozsa,et al.  A Complete Classification of Quantum Ensembles Having a Given Density Matrix , 1993 .

[30]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.