Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation

We investigate sampling procedures that certify that an arbitrary quantum state on $n$ subsystems is close to an ideal mixed state $\varphi^{\otimes n}$ for a given reference state $\varphi$, up to errors on a few positions. This task makes no sense classically: it would correspond to certifying that a given bitstring was generated according to some desired probability distribution. However, in the quantum case, this is possible if one has access to a prover who can supply a purification of the mixed state. In this work, we introduce the concept of mixed-state certification, and we show that a natural sampling protocol offers secure certification in the presence of a possibly dishonest prover: if the verifier accepts then he can be almost certain that the state in question has been correctly prepared, up to a small number of errors. We then apply this result to two-party quantum coin-tossing. Given that strong coin tossing is impossible, it is natural to ask "how close can we get". This question has been well studied and is nowadays well understood from the perspective of the bias of individual coin tosses. We approach and answer this question from a different---and somewhat orthogonal---perspective, where we do not look at individual coin tosses but at the global entropy instead. We show how two distrusting parties can produce a common high-entropy source, where the entropy is an arbitrarily small fraction below the maximum (except with negligible probability).

[1]  Rudolf Ahlswede,et al.  Strong converse for identification via quantum channels , 2000, IEEE Trans. Inf. Theory.

[2]  T. Rudolph,et al.  Degrees of concealment and bindingness in quantum bit commitment protocols , 2001, quant-ph/0106019.

[3]  Serge Fehr,et al.  Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications , 2016, CRYPTO.

[4]  Jonathan Katz,et al.  Feasibility and Completeness of Cryptographic Tasks in the Quantum World , 2013, TCC.

[5]  Louis Salvail,et al.  Quantifying the Leakage of Quantum Protocols for Classical Two-Party Cryptography , 2015, ArXiv.

[6]  Severin Winkler,et al.  On the Efficiency of Classical and Quantum Secure Function Evaluation , 2012, IEEE Transactions on Information Theory.

[7]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[8]  Justin M. Reyneri,et al.  Coin flipping by telephone , 1984, IEEE Trans. Inf. Theory.

[9]  C. Mochon Quantum weak coin flipping with arbitrarily small bias , 2007, 0711.4114.

[10]  Matthias Christandl,et al.  Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.

[11]  Jörn Müller-Quade,et al.  On the (Im-)Possibility of Extending Coin Toss , 2006, Journal of Cryptology.

[12]  Carlos Mochon Quantum weak coin-flipping with bias of 0.192 , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[13]  Renato Renner,et al.  Simplifying information-theoretic arguments by post-selection , 2010, Quantum Cryptography and Computing.

[14]  R W Spekkens,et al.  Quantum protocol for cheat-sensitive weak coin flipping. , 2002, Physical review letters.

[15]  E. Diamanti,et al.  Experimental plug and play quantum coin flipping , 2013, Nature Communications.

[16]  H. Nagaoka,et al.  A new proof of the channel coding theorem via hypothesis testing in quantum information theory , 2002, Proceedings IEEE International Symposium on Information Theory,.

[17]  H. Sommers,et al.  Induced measures in the space of mixed quantum states , 2000, quant-ph/0012101.

[18]  Gus Gutoski,et al.  Toward a general theory of quantum games , 2006, STOC '07.

[19]  Andris Ambainis,et al.  A new protocol and lower bounds for quantum coin flipping , 2001, STOC '01.

[20]  K. Audenaert,et al.  Discriminating States: the quantum Chernoff bound. , 2006, Physical review letters.

[21]  Serge Fehr,et al.  Sampling in a Quantum Population, and Applications , 2009, CRYPTO.

[22]  R. Renner Symmetry of large physical systems implies independence of subsystems , 2007 .

[23]  Iordanis Kerenidis,et al.  Weak coin flipping with small bias , 2004, Inf. Process. Lett..

[24]  M. Hayashi Optimal sequence of quantum measurements in the sense of Stein's lemma in quantum hypothesis testing , 2002, quant-ph/0208020.

[25]  Iordanis Kerenidis,et al.  Optimal Quantum Strong Coin Flipping , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[26]  Matthias Christandl,et al.  One-and-a-Half Quantum de Finetti Theorems , 2007 .

[27]  Andreas J. Winter,et al.  Coding theorem and strong converse for quantum channels , 1999, IEEE Trans. Inf. Theory.

[28]  C. Mochon Large family of quantum weak coin-flipping protocols , 2005, quant-ph/0502068.

[29]  Ivan Damgård,et al.  On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation , 2015, International Conference on Information Technology & Systems.