Quantum Information Processing with Adversarial Devices

We consider several applications in black-box quantum computation in which untrusted physical quantum devices are connected together to produce an experiment. By examining the outcome statistics of such an experiment, and comparing them against the desired experiment, we may hope to certify that the physical experiment is implementing the desired experiment. This is useful in order to verify that a calculation has been performed correctly, that measurement outcomes are secure, or that the devices are producing the desired state.

[1]  Absolute Valued Real Algebras , 1947 .

[2]  Lluis Masanes,et al.  Universally-composable privacy amplification from causality constraints , 2008, Physical review letters.

[3]  Andreas Winter,et al.  Security of key distribution from causality constraints , 2006 .

[4]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[5]  Stefano Pironio,et al.  Maximally Non-Local and Monogamous Quantum Correlations , 2006, Physical review letters.

[6]  A. Doherty,et al.  Better Bell-inequality violation by collective measurements , 2006, quant-ph/0604045.

[7]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[8]  A. Winter,et al.  Information causality as a physical principle , 2009, Nature.

[9]  Samuel L. Braunstein,et al.  Wringing out better Bell inequalities , 1989 .

[10]  Elad Eban,et al.  Interactive Proofs For Quantum Computations , 2017, 1704.04487.

[11]  S. Popescu,et al.  Quantum nonlocality as an axiom , 1994 .

[12]  Michele Mosca,et al.  Generalized Self-testing and the Security of the 6-State Protocol , 2010, TQC.

[13]  R. Renner Symmetry of large physical systems implies independence of subsystems , 2007 .

[14]  Eberhard,et al.  Background level and counter efficiencies required for a loophole-free Einstein-Podolsky-Rosen experiment. , 1993, Physical review. A, Atomic, molecular, and optical physics.

[15]  S. Massar,et al.  Efficient quantum key distribution secure against no-signalling eavesdroppers , 2006, quant-ph/0605246.

[16]  Frédéric Magniez,et al.  Self-testing of universal and fault-tolerant sets of quantum gates , 2000, STOC '00.

[17]  Terry Rudolph,et al.  A 2 rebit gate universal for quantum computing , 2002 .

[18]  T. V'ertesi,et al.  Efficiency of higher-dimensional Hilbert spaces for the violation of Bell inequalities , 2007, 0712.4320.

[19]  N. Gisin,et al.  From Bell's theorem to secure quantum key distribution. , 2005, Physical review letters.

[20]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[21]  S. Adler,et al.  Quaternionic quantum mechanics and quantum fields , 1995 .

[22]  Man-Duen Choi Completely positive linear maps on complex matrices , 1975 .

[23]  Christian Kurtsiefer,et al.  Breaking a quantum key distribution system through a timing side channel. , 2007, Optics express.

[24]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[25]  Adrian Kent,et al.  No signaling and quantum key distribution. , 2004, Physical review letters.

[26]  G. M. Il'mushkin Spectral functions of a regular symmetric difference operator , 1979 .

[27]  M. Mckague,et al.  Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices , 2009, 0908.0503.

[28]  V. Scarani,et al.  Device-independent quantum key distribution secure against collective attacks , 2009, 0903.4460.

[29]  M. Horodecki,et al.  Violating Bell inequality by mixed spin- {1}/{2} states: necessary and sufficient condition , 1995 .

[30]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[31]  Seth Lloyd,et al.  Adiabatic quantum computation is equivalent to standard quantum computation , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[32]  Elham Kashefi,et al.  Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[33]  Andrew Chi-Chih Yao,et al.  Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[34]  B. S. Cirel'son Quantum generalizations of Bell's inequality , 1980 .

[35]  N. Gisin,et al.  Maximal violation of Bell's inequality for arbitrarily large spin , 1992 .

[36]  H. Buhrman,et al.  Limit on nonlocality in any world in which communication complexity is not trivial. , 2005, Physical review letters.

[37]  Frank Verstraete,et al.  Entanglement versus bell violations and their behavior under local filtering operations. , 2002, Physical review letters.

[38]  S. Massar,et al.  Nonlocal correlations as an information-theoretic resource , 2004, quant-ph/0404097.

[39]  Ueli Maurer,et al.  Small accessible quantum information does not imply security. , 2007, Physical review letters.

[40]  N. Gisin Bell Inequalities: Many Questions, a Few Answers , 2007, quant-ph/0702021.

[41]  N. Gisin,et al.  Simulating quantum systems using real Hilbert spaces. , 2008, Physical review letters.

[42]  Wim van Dam Implausible consequences of superstrong nonlocality , 2012, Natural Computing.

[43]  John Watrous Cs 798: Theory of Quantum Information Operator Decompositions and Norms; Operator-vector Correspondence 1.1 the Spectral Decomposition , 2007 .

[44]  R Raussendorf,et al.  A one-way quantum computer. , 2001, Physical review letters.

[45]  L. Masanes Asymptotic violation of Bell inequalities and distillability. , 2005, Physical review letters.

[46]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[47]  Andrew Chi-Chih Yao,et al.  Self testing quantum apparatus , 2004, Quantum Inf. Comput..

[48]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[49]  S. Massar,et al.  Device-independent state estimation based on Bell’s inequalities , 2009, 0907.2170.

[50]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[51]  A. J. Short,et al.  Quantum nonlocality and beyond: limits from nonlocal computation. , 2007, Physical review letters.

[52]  Frédéric Magniez,et al.  Self-testing of Quantum Circuits , 2006, ICALP.

[53]  Quaternionic quantum mechanics allows non-local boxes , 2009, 0911.1761.

[54]  William Rowan Hamilton,et al.  ON QUATERNIONS, OR ON A NEW SYSTEM OF IMAGINARIES IN ALGEBRA , 1847 .

[55]  J. Kowski Linear transformations which preserve trace and positive semidefiniteness of operators , 1972 .