-
LDPC-cat codes for low-overhead quantum computing in 2D
Authors:
Diego Ruiz,
Jérémie Guillaud,
Anthony Leverrier,
Mazyar Mirrahimi,
Christophe Vuillot
Abstract:
Quantum low-density parity-check (qLDPC) codes are a promising construction for drastically reducing the overhead of fault-tolerant quantum computing (FTQC) architectures. However, all of the known hardware implementations of these codes require advanced technologies, such as long-range qubit connectivity, high-weight stabilizers, or multi-layered chip layouts. An alternative approach to reduce th…
▽ More
Quantum low-density parity-check (qLDPC) codes are a promising construction for drastically reducing the overhead of fault-tolerant quantum computing (FTQC) architectures. However, all of the known hardware implementations of these codes require advanced technologies, such as long-range qubit connectivity, high-weight stabilizers, or multi-layered chip layouts. An alternative approach to reduce the hardware overhead of fault-tolerance is to use bosonic cat qubits where bit-flip errors are exponentially suppressed by design. In this work, we combine both approaches and propose an architecture based on cat qubits concatenated in classical LDPC codes correcting for phase-flips. We find that employing such phase-flip LDPC codes provides two major advantages. First, the hardware implementation of the code can be realised using short-range qubit interactions in 2D and low-weight stabilizers, which makes it readily compatible with current superconducting circuit technologies. Second, we demonstrate how to implement a fault-tolerant universal set of logical gates with a second layer of cat qubits while maintaining the local connectivity. We conduct a numerical brute force optimisation of these classical codes to find the ones with the best encoding rate for algorithmically relevant code distances. We discover that some of the best codes benefit from a cellular automaton structure. This allows us to define families of codes with high encoding rates and distances. Finally, we numerically assess the performance of our codes under circuit-level noise. Assuming a physical phase-flip error probability $ε\approx 0.1\%$, our $[165+8\ell, 34+2\ell, 22]$ code family allows to encode $100$ logical qubits with a total logical error probability (including both logical phase-flip and bit-flip) per cycle and per logical qubit $ε_L \leq 10^{-8}$ on a $758$ cat qubit chip.
△ Less
Submitted 6 February, 2024; v1 submitted 17 January, 2024;
originally announced January 2024.
-
Information reconciliation for discretely-modulated continuous-variable quantum key distribution
Authors:
Anthony Leverrier
Abstract:
The goal of this note is to explain the reconciliation problem for continuous-variable quantum key distribution protocols with a discrete modulation. Such modulation formats are attractive since they significantly simplify experimental implementations compared to protocols with a Gaussian modulation. Previous security proofs that relied crucially on the Gaussian distribution of the input states ar…
▽ More
The goal of this note is to explain the reconciliation problem for continuous-variable quantum key distribution protocols with a discrete modulation. Such modulation formats are attractive since they significantly simplify experimental implementations compared to protocols with a Gaussian modulation. Previous security proofs that relied crucially on the Gaussian distribution of the input states are rendered inapplicable, and new proofs based on the entropy accumulation theorem have emerged. Unfortunately, these proofs are not compatible with existing reconciliation procedures, and necessitate a reevaluation of the reconciliation problem. We argue that this problem is nontrivial and deserves further attention. In particular, assuming it can be solved with optimal efficiency leads to overly optimistic predictions for the performance of the key distribution protocol, in particular for long distances.
△ Less
Submitted 26 October, 2023;
originally announced October 2023.
-
Robust sparse IQP sampling in constant depth
Authors:
Louis Paletta,
Anthony Leverrier,
Alain Sarlette,
Mazyar Mirrahimi,
Christophe Vuillot
Abstract:
Between NISQ (noisy intermediate scale quantum) approaches without any proof of robust quantum advantage and fully fault-tolerant quantum computation, we propose a scheme to achieve a provable superpolynomial quantum advantage (under some widely accepted complexity conjectures) that is robust to noise with minimal error correction requirements. We choose a class of sampling problems with commuting…
▽ More
Between NISQ (noisy intermediate scale quantum) approaches without any proof of robust quantum advantage and fully fault-tolerant quantum computation, we propose a scheme to achieve a provable superpolynomial quantum advantage (under some widely accepted complexity conjectures) that is robust to noise with minimal error correction requirements. We choose a class of sampling problems with commuting gates known as sparse IQP (Instantaneous Quantum Polynomial-time) circuits and we ensure its fault-tolerant implementation by introducing the tetrahelix code. This new code is obtained by merging several tetrahedral codes (3D color codes) and has the following properties: each sparse IQP gate admits a transversal implementation, and the depth of the logical circuit can be traded for its width. Combining those, we obtain a depth-1 implementation of any sparse IQP circuit up to the preparation of encoded states. This comes at the cost of a space overhead which is only polylogarithmic in the width of the original circuit. We furthermore show that the state preparation can also be performed in constant depth with a single step of feed-forward from classical computation. Our construction thus exhibits a robust superpolynomial quantum advantage for a sampling problem implemented on a constant depth circuit with a single round of measurement and feed-forward.
△ Less
Submitted 1 May, 2024; v1 submitted 20 July, 2023;
originally announced July 2023.
-
Multimode bosonic cat codes with an easily implementable universal gate set
Authors:
Aurélie Denys,
Anthony Leverrier
Abstract:
We present a method for designing quantum error correcting codes such that a specific group of logical operations is implemented using simple physical operations such as transversal gates for qubit codes, or Gaussian unitaries for bosonic codes. In the latter case, we exploit this approach to define a multimode extension of the cat qubit with logical states given by superpositions of 48 coherent s…
▽ More
We present a method for designing quantum error correcting codes such that a specific group of logical operations is implemented using simple physical operations such as transversal gates for qubit codes, or Gaussian unitaries for bosonic codes. In the latter case, we exploit this approach to define a multimode extension of the cat qubit with logical states given by superpositions of 48 coherent states, wherein all single-qubit Clifford logical gates are passive Gaussian unitaries. If a quartic Hamiltonian is also available, then it can be used to implement the $CZ$ and $T$ gates, providing a universal gate set.
△ Less
Submitted 21 September, 2023; v1 submitted 20 June, 2023;
originally announced June 2023.
-
The $2T$-qutrit, a two-mode bosonic qutrit
Authors:
Aurélie Denys,
Anthony Leverrier
Abstract:
Quantum computers often manipulate physical qubits encoded on two-level quantum systems. Bosonic qubit codes depart from this idea by encoding information in a well-chosen subspace of an infinite-dimensional Fock space. This larger physical space provides a natural protection against experimental imperfections and allows bosonic codes to circumvent no-go results that apply to states constrained by…
▽ More
Quantum computers often manipulate physical qubits encoded on two-level quantum systems. Bosonic qubit codes depart from this idea by encoding information in a well-chosen subspace of an infinite-dimensional Fock space. This larger physical space provides a natural protection against experimental imperfections and allows bosonic codes to circumvent no-go results that apply to states constrained by a 2-dimensional Hilbert space. A bosonic qubit is usually defined in a single bosonic mode but it makes sense to look for multimode versions that could exhibit better performance.
In this work, building on the observation that the cat code lives in the span of coherent states indexed by a finite subgroup of the complex numbers, we consider a two-mode generalisation living in the span of 24 coherent states indexed by the binary tetrahedral group $2T$ of the quaternions. The resulting $2T$-qutrit naturally inherits the algebraic properties of the group $2T$ and appears to be quite robust in the low-loss regime. We initiate its study and identify stabilisers as well as some logical operators for this bosonic code.
△ Less
Submitted 31 May, 2023; v1 submitted 28 October, 2022;
originally announced October 2022.
-
Decoding quantum Tanner codes
Authors:
Anthony Leverrier,
Gilles Zémor
Abstract:
We introduce sequential and parallel decoders for quantum Tanner codes. When the Tanner code construction is applied to a sufficiently expanding square complex with robust local codes, we obtain a family of asymptotically good quantum low-density parity-check codes. In this case, our decoders provably correct arbitrary errors of weight linear in the code length, respectively in linear or logarithm…
▽ More
We introduce sequential and parallel decoders for quantum Tanner codes. When the Tanner code construction is applied to a sufficiently expanding square complex with robust local codes, we obtain a family of asymptotically good quantum low-density parity-check codes. In this case, our decoders provably correct arbitrary errors of weight linear in the code length, respectively in linear or logarithmic time. The same decoders are easily adapted to the expander lifted product codes of Panteleev and Kalachev. Along the way, we exploit recently established bounds on the robustness of random tensor codes to give a tighter bound on the minimum distance of quantum Tanner codes.
△ Less
Submitted 8 December, 2022; v1 submitted 10 August, 2022;
originally announced August 2022.
-
Fast erasure decoder for a class of quantum LDPC codes
Authors:
Nicholas Connolly,
Vivien Londe,
Anthony Leverrier,
Nicolas Delfosse
Abstract:
We propose a decoder for the correction of erasures with hypergraph product codes, which form one of the most popular families of quantum LDPC codes. Our numerical simulations show that this decoder provides a close approximation of the maximum likelihood decoder that can be implemented in O(N^2) bit operations where N is the length of the quantum code. A probabilistic version of this decoder can…
▽ More
We propose a decoder for the correction of erasures with hypergraph product codes, which form one of the most popular families of quantum LDPC codes. Our numerical simulations show that this decoder provides a close approximation of the maximum likelihood decoder that can be implemented in O(N^2) bit operations where N is the length of the quantum code. A probabilistic version of this decoder can be implemented in O(N^1.5) bit operations.
△ Less
Submitted 7 March, 2023; v1 submitted 1 August, 2022;
originally announced August 2022.
-
Experimental Demonstration of Discrete Modulation Formats for Continuous Variable Quantum Key Distribution
Authors:
François Roumestan,
Amirhossein Ghazisaeidi,
Jérémie Renaudier,
Luis Trigo Vidarte,
Anthony Leverrier,
Eleni Diamanti,
Philippe Grangier
Abstract:
Quantum key distribution (QKD) enables the establishment of secret keys between users connected via a channel vulnerable to eavesdrop**, with information-theoretic security, that is, independently of the power of a malevolent party. QKD systems based on the encoding of the key information on continuous variables (CV), such as the values of the quadrature components of coherent states, present th…
▽ More
Quantum key distribution (QKD) enables the establishment of secret keys between users connected via a channel vulnerable to eavesdrop**, with information-theoretic security, that is, independently of the power of a malevolent party. QKD systems based on the encoding of the key information on continuous variables (CV), such as the values of the quadrature components of coherent states, present the major advantage that they only require standard telecommunication technology. However, the most general security proofs for CV-QKD required until now the use of Gaussian modulation by the transmitter, complicating practical implementations. Here, we experimentally implement a protocol that allows for arbitrary, Gaussian-like, discrete modulations, whose security is based on a theoretical proof that applies very generally to such situations. These modulation formats are compatible with the use of powerful tools of coherent optical telecommunication, allowing our system to reach a performance of tens of megabit per second secret key rates over 25 km.
△ Less
Submitted 24 July, 2022;
originally announced July 2022.
-
Efficient decoding up to a constant fraction of the code length for asymptotically good quantum codes
Authors:
Anthony Leverrier,
Gilles Zémor
Abstract:
We introduce and analyse an efficient decoder for the quantum Tanner codes of that can correct adversarial errors of linear weight. Previous decoders for quantum low-density parity-check codes could only handle adversarial errors of weight $O(\sqrt{n \log n})$. We also work on the link between quantum Tanner codes and the Lifted Product codes of Panteleev and Kalachev, and show that our decoder ca…
▽ More
We introduce and analyse an efficient decoder for the quantum Tanner codes of that can correct adversarial errors of linear weight. Previous decoders for quantum low-density parity-check codes could only handle adversarial errors of weight $O(\sqrt{n \log n})$. We also work on the link between quantum Tanner codes and the Lifted Product codes of Panteleev and Kalachev, and show that our decoder can be adapted to the latter. The decoding algorithm alternates between sequential and parallel procedures and converges in linear time.
△ Less
Submitted 25 October, 2022; v1 submitted 15 June, 2022;
originally announced June 2022.
-
Quantum Tanner codes
Authors:
Anthony Leverrier,
Gilles Zémor
Abstract:
Tanner codes are long error correcting codes obtained from short codes and a graph, with bits on the edges and parity-check constraints from the short codes enforced at the vertices of the graph. Combining good short codes together with a spectral expander graph yields the celebrated expander codes of Sipser and Spielman, which are asymptotically good classical LDPC codes.
In this work we apply…
▽ More
Tanner codes are long error correcting codes obtained from short codes and a graph, with bits on the edges and parity-check constraints from the short codes enforced at the vertices of the graph. Combining good short codes together with a spectral expander graph yields the celebrated expander codes of Sipser and Spielman, which are asymptotically good classical LDPC codes.
In this work we apply this prescription to the left-right Cayley complex that lies at the heart of the recent construction of a $c^3$ locally testable code by Dinur et al. Specifically, we view this complex as two graphs that share the same set of edges. By defining a Tanner code on each of those graphs we obtain two classical codes that together define a quantum code. This construction can be seen as a simplified variant of the Panteleev and Kalachev asymptotically good quantum LDPC code, with improved estimates for its minimum distance. This quantum code is closely related to the Dinur et al. code in more than one sense: indeed, we prove a theorem that simultaneously gives a linearly growing minimum distance for the quantum code and recovers the local testability of the Dinur et al. code.
△ Less
Submitted 16 September, 2022; v1 submitted 28 February, 2022;
originally announced February 2022.
-
Explicit asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation
Authors:
Aurélie Denys,
Peter Brown,
Anthony Leverrier
Abstract:
We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. Previously, such bounds were only available for protocols with a Gaussian modulation, and numerical bounds existed in the case of simple phase-shift-keying modulations. The latter bounds were obtained as a solution of convex optim…
▽ More
We establish an analytical lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with an arbitrary modulation of coherent states. Previously, such bounds were only available for protocols with a Gaussian modulation, and numerical bounds existed in the case of simple phase-shift-keying modulations. The latter bounds were obtained as a solution of convex optimization problems and our new analytical bound matches the results of Ghorai et al. (2019), up to numerical precision. The more relevant case of quadrature amplitude modulation (QAM) could not be analyzed with the previous techniques, due to their large number of coherent states. Our bound shows that relatively small constellation sizes, with say 64 states, are essentially sufficient to obtain a performance close to a true Gaussian modulation and are therefore an attractive solution for large-scale deployment of continuous-variable quantum key distribution. We also derive similar bounds when the modulation consists of arbitrary states, not necessarily pure.
△ Less
Submitted 6 September, 2021; v1 submitted 25 March, 2021;
originally announced March 2021.
-
Quantum XYZ Product Codes
Authors:
Anthony Leverrier,
Simon Apers,
Christophe Vuillot
Abstract:
We study a three-fold variant of the hypergraph product code construction, differing from the standard homological product of three classical codes. When instantiated with 3 classical LDPC codes, this "XYZ product" yields a non CSS quantum LDPC code which might display a large minimum distance. The simplest instance of this construction, corresponding to the product of 3 repetition codes, is a non…
▽ More
We study a three-fold variant of the hypergraph product code construction, differing from the standard homological product of three classical codes. When instantiated with 3 classical LDPC codes, this "XYZ product" yields a non CSS quantum LDPC code which might display a large minimum distance. The simplest instance of this construction, corresponding to the product of 3 repetition codes, is a non CSS variant of the 3-dimensional toric code known as the Chamon code. The general construction was introduced in Denise Maurice's PhD thesis, but has remained poorly understood so far. The reason is that while hypergraph product codes can be analyzed with combinatorial tools, the XYZ product codes also depend crucially on the algebraic properties of the parity-check matrices of the three classical codes, making their analysis much more involved.
Our main motivation for studying XYZ product codes is that the natural representatives of logical operators are two-dimensional objects. This contrasts with standard hypergraph product codes in 3 dimensions which always admit one-dimensional logical operators. In particular, specific instances of XYZ product codes with constant rate might display a minimum distance as large as $Θ(N^{2/3})$. While we do not prove this result here, we obtain the dimension of a large class of XYZ product codes, and when restricting to codes with dimension 1, we reduce the problem of computing the minimum distance to a more elementary combinatorial problem involving binary 3-tensors. We also discuss in detail some families of XYZ product codes that can be embedded in three dimensions with local interaction. Some of these codes seem to share properties with Haah's cubic codes and might be interesting candidates for self-correcting quantum memories with a logarithmic energy barrier.
△ Less
Submitted 12 July, 2022; v1 submitted 19 November, 2020;
originally announced November 2020.
-
Combining hard and soft decoders for hypergraph product codes
Authors:
Antoine Grospellier,
Lucien Grouès,
Anirudh Krishna,
Anthony Leverrier
Abstract:
Hypergraph product codes are a class of constant-rate quantum low-density parity-check (LDPC) codes equipped with a linear-time decoder called small-set-flip (SSF). This decoder displays sub-optimal performance in practice and requires very large error correcting codes to be effective. In this work, we present new hybrid decoders that combine the belief propagation (BP) algorithm with the SSF deco…
▽ More
Hypergraph product codes are a class of constant-rate quantum low-density parity-check (LDPC) codes equipped with a linear-time decoder called small-set-flip (SSF). This decoder displays sub-optimal performance in practice and requires very large error correcting codes to be effective. In this work, we present new hybrid decoders that combine the belief propagation (BP) algorithm with the SSF decoder. We present the results of numerical simulations when codes are subject to independent bit-flip and phase-flip errors. We provide evidence that the threshold of these codes is roughly 7.5% assuming an ideal syndrome extraction, and remains close to 3% in the presence of syndrome noise. This result subsumes and significantly improves upon an earlier work by Grospellier and Krishna (arXiv:1810.03681). The low-complexity high-performance of these heuristic decoders suggests that decoding should not be a substantial difficulty when moving from zero-rate surface codes to constant-rate LDPC codes and gives a further hint that such codes are well-worth investigating in the context of building large universal quantum computers.
△ Less
Submitted 8 April, 2021; v1 submitted 23 April, 2020;
originally announced April 2020.
-
Feasibility of satellite-to-ground continuous-variable quantum key distribution
Authors:
Daniele Dequal,
Luis Trigo Vidarte,
Victor Roman Rodriguez,
Giuseppe Vallone,
Paolo Villoresi,
Anthony Leverrier,
Eleni Diamanti
Abstract:
Establishing secure communication links at a global scale is a major potential application of quantum information science but also extremely challenging for the underlying technology. While milestone experiments using satellite-to-ground links and exploiting singe-photon encoding for implementing quantum key distribution have shown recently that this goal is achievable, it is still necessary to fu…
▽ More
Establishing secure communication links at a global scale is a major potential application of quantum information science but also extremely challenging for the underlying technology. While milestone experiments using satellite-to-ground links and exploiting singe-photon encoding for implementing quantum key distribution have shown recently that this goal is achievable, it is still necessary to further investigate practical solutions compatible with classical optical communication systems. Here we examine the feasibility of establishing secret keys in a satellite-to-ground downlink configuration using continuous-variable encoding, which can be implemented using standard telecommunication components certified for space environment and able to operate at high symbol rates. Considering a realistic channel model and state-of-the-art technology, and exploiting an orbit subdivision technique for mitigating fluctuations in the transmission efficiency, we find positive secret key rates for a low-Earth-orbit scenario, while finite-size effects can be a limiting factor for higher orbits. Our analysis determines regions of values for important experimental parameters where secret key exchange is possible and can be used as a guideline for experimental efforts in this direction.
△ Less
Submitted 20 July, 2020; v1 submitted 5 February, 2020;
originally announced February 2020.
-
Towards local testability for quantum coding
Authors:
Anthony Leverrier,
Vivien Londe,
Gilles Zémor
Abstract:
We introduce the hemicubic codes, a family of quantum codes obtained by associating qubits with the $p$-faces of the $n$-cube (for $n>p$) and stabilizer constraints with faces of dimension $(p\pm1)$. The quantum code obtained by identifying antipodal faces of the resulting complex encodes one logical qubit into $N = 2^{n-p-1} \tbinom{n}{p}$ physical qubits and displays local testability with a sou…
▽ More
We introduce the hemicubic codes, a family of quantum codes obtained by associating qubits with the $p$-faces of the $n$-cube (for $n>p$) and stabilizer constraints with faces of dimension $(p\pm1)$. The quantum code obtained by identifying antipodal faces of the resulting complex encodes one logical qubit into $N = 2^{n-p-1} \tbinom{n}{p}$ physical qubits and displays local testability with a soundness of $Ω(1/\log(N))$ beating the current state-of-the-art of $1/\log^{2}(N)$ due to Hastings. We exploit this local testability to devise an efficient decoding algorithm that corrects arbitrary errors of size less than the minimum distance, up to polylog factors.
We then extend this code family by considering the quotient of the $n$-cube by arbitrary linear classical codes of length $n$. We establish the parameters of these generalized hemicubic codes. Interestingly, if the soundness of the hemicubic code could be shown to be constant, similarly to the ordinary $n$-cube, then the generalized hemicubic codes could yield quantum locally testable codes of length not exceeding an exponential or even polynomial function of the code dimension.
△ Less
Submitted 18 February, 2022; v1 submitted 8 November, 2019;
originally announced November 2019.
-
Asymptotic security of continuous-variable quantum key distribution with a discrete modulation
Authors:
Shouvik Ghorai,
Philippe Grangier,
Eleni Diamanti,
Anthony Leverrier
Abstract:
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states. The bound is valid against collective attacks and is obtained by formulating the problem as a semidefinite program. We illustrate our general approach with the quadrature phase-shift keying (QPSK) modulation scheme and show that distances over…
▽ More
We establish a lower bound on the asymptotic secret key rate of continuous-variable quantum key distribution with a discrete modulation of coherent states. The bound is valid against collective attacks and is obtained by formulating the problem as a semidefinite program. We illustrate our general approach with the quadrature phase-shift keying (QPSK) modulation scheme and show that distances over 100 km are achievable for realistic values of noise. We also discuss the application to more complex quadrature amplitude modulations (QAM) schemes. This work is a major step towards establishing the full security of continuous-variable protocols with a discrete modulation in the finite-size regime and opens the way to large-scale deployment of these protocols for quantum key distribution.
△ Less
Submitted 26 June, 2019; v1 submitted 4 February, 2019;
originally announced February 2019.
-
Constant overhead quantum fault-tolerance with quantum expander codes
Authors:
Omar Fawzi,
Antoine Grospellier,
Anthony Leverrier
Abstract:
We prove that quantum expander codes can be combined with quantum fault-tolerance techniques to achieve constant overhead: the ratio between the total number of physical qubits required for a quantum computation with faulty hardware and the number of logical qubits involved in the ideal computation is asymptotically constant, and can even be taken arbitrarily close to 1 in the limit of small physi…
▽ More
We prove that quantum expander codes can be combined with quantum fault-tolerance techniques to achieve constant overhead: the ratio between the total number of physical qubits required for a quantum computation with faulty hardware and the number of logical qubits involved in the ideal computation is asymptotically constant, and can even be taken arbitrarily close to 1 in the limit of small physical error rate. This improves on the polylogarithmic overhead promised by the standard threshold theorem.
To achieve this, we exploit a framework introduced by Gottesman together with a family of constant rate quantum codes, quantum expander codes. Our main technical contribution is to analyze an efficient decoding algorithm for these codes and prove that it remains robust in the presence of noisy syndrome measurements, a property which is crucial for fault-tolerant circuits. We also establish two additional features of the decoding algorithm that make it attractive for quantum computation: it can be parallelized to run in logarithmic depth, and is single-shot, meaning that it only requires a single round of noisy syndrome measurement.
△ Less
Submitted 11 August, 2018;
originally announced August 2018.
-
Composable security of two-way continuous-variable quantum key distribution without active symmetrization
Authors:
Shouvik Ghorai,
Eleni Diamanti,
Anthony Leverrier
Abstract:
We present a general framework encompassing a number of continuous-variable quantum key distribution protocols, including standard one-way protocols, measurement-device-independent protocols as well as some two-way protocols, or any other continuous-variable protocol involving only a Gaussian modulation of coherent states and heterodyne detection. The main interest of this framework is that the co…
▽ More
We present a general framework encompassing a number of continuous-variable quantum key distribution protocols, including standard one-way protocols, measurement-device-independent protocols as well as some two-way protocols, or any other continuous-variable protocol involving only a Gaussian modulation of coherent states and heterodyne detection. The main interest of this framework is that the corresponding protocols are all covariant with respect to the action of the unitary group $U(n)$, implying that their security can be established thanks to a Gaussian de Finetti reduction. In particular, we give a composable security proof of two-way continuous-variable quantum key distribution against general attacks. We also prove that no active symmetrization procedure is required for these protocols, which would otherwise make them prohibitively costly to implement.
△ Less
Submitted 14 January, 2019; v1 submitted 29 June, 2018;
originally announced June 2018.
-
Golden codes: quantum LDPC codes built from regular tessellations of hyperbolic 4-manifolds
Authors:
Vivien Londe,
Anthony Leverrier
Abstract:
We adapt a construction of Guth and Lubotzky [arXiv:1310.5555] to obtain a family of quantum LDPC codes with non-vanishing rate and minimum distance scaling like $n^{0.1}$ where $n$ is the number of physical qubits. Similarly as in [arXiv:1310.5555], our homological code family stems from hyperbolic 4-manifolds equipped with tessellations. The main novelty of this work is that we consider a regula…
▽ More
We adapt a construction of Guth and Lubotzky [arXiv:1310.5555] to obtain a family of quantum LDPC codes with non-vanishing rate and minimum distance scaling like $n^{0.1}$ where $n$ is the number of physical qubits. Similarly as in [arXiv:1310.5555], our homological code family stems from hyperbolic 4-manifolds equipped with tessellations. The main novelty of this work is that we consider a regular tessellation consisting of hypercubes. We exploit this strong local structure to design and analyze an efficient decoding algorithm.
△ Less
Submitted 18 June, 2019; v1 submitted 22 December, 2017;
originally announced December 2017.
-
Efficient decoding of random errors for quantum expander codes
Authors:
Omar Fawzi,
Antoine Grospellier,
Anthony Leverrier
Abstract:
We show that quantum expander codes, a constant-rate family of quantum LDPC codes, with the quasi-linear time decoding algorithm of Leverrier, Tillich and Zémor can correct a constant fraction of random errors with very high probability. This is the first construction of a constant-rate quantum LDPC code with an efficient decoding algorithm that can correct a linear number of random errors with a…
▽ More
We show that quantum expander codes, a constant-rate family of quantum LDPC codes, with the quasi-linear time decoding algorithm of Leverrier, Tillich and Zémor can correct a constant fraction of random errors with very high probability. This is the first construction of a constant-rate quantum LDPC code with an efficient decoding algorithm that can correct a linear number of random errors with a negligible failure probability. Finding codes with these properties is also motivated by Gottesman's construction of fault tolerant schemes with constant space overhead.
In order to obtain this result, we study a notion of $α$-percolation: for a random subset $W$ of vertices of a given graph, we consider the size of the largest connected $α$-subset of $W$, where $X$ is an $α$-subset of $W$ if $|X \cap W| \geq α|X|$.
△ Less
Submitted 25 March, 2018; v1 submitted 22 November, 2017;
originally announced November 2017.
-
Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction
Authors:
Anthony Leverrier
Abstract:
Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and…
▽ More
Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group $U(n)$ (instead of the symmetric group $S_n$ as in usual de Finetti theorems), and by introducing generalized $SU(2,2)$ coherent states. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.
△ Less
Submitted 16 May, 2017; v1 submitted 12 January, 2017;
originally announced January 2017.
-
Relativistic (or $2$-prover $1$-round) zero-knowledge protocol for $\mathsf{NP}$ secure against quantum adversaries
Authors:
André Chailloux,
Anthony Leverrier
Abstract:
In this paper, we show that the zero-knowledge construction for Hamiltonian cycle remains secure against quantum adversaries in the relativistic setting. Our main technical contribution is a tool for studying the action of consecutive measurements on a quantum state which in turn gives upper bounds on the value of some entangled games. This allows us to prove the security of our protocol against q…
▽ More
In this paper, we show that the zero-knowledge construction for Hamiltonian cycle remains secure against quantum adversaries in the relativistic setting. Our main technical contribution is a tool for studying the action of consecutive measurements on a quantum state which in turn gives upper bounds on the value of some entangled games. This allows us to prove the security of our protocol against quantum adversaries. We also prove security bounds for the (single-round) relativistic string commitment and bit commitment in parallel against quantum adversaries. As an additional consequence of our result, we answer an open question from [Unr12] and show tight bounds on the quantum knowledge error of some $Σ$-protocols.
△ Less
Submitted 22 May, 2017; v1 submitted 22 December, 2016;
originally announced December 2016.
-
$SU(p,q)$ coherent states and a Gaussian de Finetti theorem
Authors:
Anthony Leverrier
Abstract:
We prove a generalization of the quantum de Finetti theorem when the local space is an infinite-dimensional Fock space. In particular, instead of considering the action of the permutation group on $n$ copies of that space, we consider the action of the unitary group $U(n)$ on the creation operators of the $n$ modes and define a natural generalization of the symmetric subspace as the space of state…
▽ More
We prove a generalization of the quantum de Finetti theorem when the local space is an infinite-dimensional Fock space. In particular, instead of considering the action of the permutation group on $n$ copies of that space, we consider the action of the unitary group $U(n)$ on the creation operators of the $n$ modes and define a natural generalization of the symmetric subspace as the space of states invariant under unitaries in $U(n)$. Our first result is a complete characterization of this subspace, which turns out to be spanned by a family of generalized coherent states related to the special unitary group $SU(p,q)$ of signature $(p,q)$. More precisely, this construction yields a unitary representation of the noncompact simple real Lie group $SU(p,q)$. We therefore find a dual unitary representation of the pair of groups $U(n)$ and $SU(p,q)$ on an $n(p+q)$-mode Fock space.
The (Gaussian) $SU(p,q)$ coherent states resolve the identity on the symmetric subspace, which implies a Gaussian de Finetti theorem stating that tracing over a few modes of a unitary-invariant state yields a state close to a mixture of Gaussian states. As an application of this de Finetti theorem, we show that the $n\times n$ upper-left submatrix of an $n\times n$ Haar-invariant unitary matrix is close in total variation distance to a matrix of independent normal variables if $n^3 =O(m)$.
△ Less
Submitted 19 July, 2017; v1 submitted 15 December, 2016;
originally announced December 2016.
-
Robust Relativistic Bit Commitment
Authors:
Kaushik Chakraborty,
André Chailloux,
Anthony Leverrier
Abstract:
Relativistic cryptography exploits the fact that no information can travel faster than the speed of light in order to obtain security guarantees that cannot be achieved from the laws of quantum mechanics alone. Recently, Lunghi et al [Phys. Rev. Lett. 2015] presented a bit commitment scheme where each party uses two agents that exchange classical information in a synchronized fashion, and that is…
▽ More
Relativistic cryptography exploits the fact that no information can travel faster than the speed of light in order to obtain security guarantees that cannot be achieved from the laws of quantum mechanics alone. Recently, Lunghi et al [Phys. Rev. Lett. 2015] presented a bit commitment scheme where each party uses two agents that exchange classical information in a synchronized fashion, and that is both hiding and binding. A caveat is that the commitment time is intrinsically limited by the spatial configuration of the players, and increasing this time requires the agents to exchange messages during the whole duration of the protocol. While such a solution remains computationally attractive, its practicality is severely limited in realistic settings since all communication must remain perfectly synchronized at all times.
In this work, we introduce a robust protocol for relativistic bit commitment that tolerates failures of the classical communication network. This is done by adding a third agent to both parties. Our scheme provides a quadratic improvement in terms of expected sustain time compared to the original protocol, while retaining the same level of security.
△ Less
Submitted 11 August, 2016;
originally announced August 2016.
-
Breaking Symmetric Cryptosystems using Quantum Period Finding
Authors:
Marc Kaplan,
Gaëtan Leurent,
Anthony Leverrier,
María Naya-Plasencia
Abstract:
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantu…
▽ More
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantum superposition of different states. This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it.
We study applications of a quantum procedure called Simon's algorithm (the simplest quantum period finding algorithm) in order to attack symmetric cryptosystems in this model. Following previous works in this direction, we show that several classical attacks based on finding collisions can be dramatically sped up using Simon's algorithm: finding a collision requires $Ω(2^{n/2})$ queries in the classical setting, but when collisions happen with some hidden periodicity, they can be found with only $O(n)$ queries in the quantum model.
We obtain attacks with very strong implications. First, we show that the most widely used modes of operation for authentication and authenticated encryption e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model. Our attacks are also applicable to many CAESAR candidates: CLOC, AEZ, COPA, OTR, POET, OMD, and Minalpher. This is quite surprising compared to the situation with encryption modes: Anand et al. show that standard modes are secure with a quantum-secure PRF.
Second, we show that Simon's algorithm can also be applied to slide attacks, leading to an exponential speed-up of a classical symmetric cryptanalysis technique in the quantum model.
△ Less
Submitted 8 June, 2016; v1 submitted 18 February, 2016;
originally announced February 2016.
-
Quantum Differential and Linear Cryptanalysis
Authors:
Marc Kaplan,
Gaëtan Leurent,
Anthony Leverrier,
María Naya-Plasencia
Abstract:
Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many asymmetric primitives are insecure against an adversary with quantum capabilities. Cryptographers are already anticipating this threat by proposing and studying a number of potentially quantum-safe alternatives for those primitives. On the other hand, symmetric primitives…
▽ More
Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many asymmetric primitives are insecure against an adversary with quantum capabilities. Cryptographers are already anticipating this threat by proposing and studying a number of potentially quantum-safe alternatives for those primitives. On the other hand, symmetric primitives seem less vulnerable against quantum computing: the main known applicable result is Grover's algorithm that gives a quadratic speed-up for exhaustive search.
In this work, we examine more closely the security of symmetric ciphers against quantum attacks. Since our trust in symmetric ciphers relies mostly on their ability to resist cryptanalysis techniques, we investigate quantum cryptanalysis techniques. More specifically, we consider quantum versions of differential and linear cryptanalysis. We show that it is usually possible to use quantum computations to obtain a quadratic speed-up for these attack techniques, but the situation must be nuanced: we don't get a quadratic speed-up for all variants of the attacks. This allows us to demonstrate the following non-intuitive result: the best attack in the classical world does not necessarily lead to the best quantum one. We give some examples of application on ciphers LAC and KLEIN. We also discuss the important difference between an adversary that can only perform quantum computations, and an adversary that can also make quantum queries to a keyed primitive.
△ Less
Submitted 7 March, 2017; v1 submitted 20 October, 2015;
originally announced October 2015.
-
Practical Position-Based Quantum Cryptography
Authors:
Kaushik Chakraborty,
Anthony Leverrier
Abstract:
We study a general family of quantum protocols for position verification and present a new class of attacks based on the Clifford hierarchy. These attacks outperform current strategies based on port-based teleportation for a large class of practical protocols. We then introduce the Interleaved Product protocol, a new scheme for position verification involving only the preparation and measurement o…
▽ More
We study a general family of quantum protocols for position verification and present a new class of attacks based on the Clifford hierarchy. These attacks outperform current strategies based on port-based teleportation for a large class of practical protocols. We then introduce the Interleaved Product protocol, a new scheme for position verification involving only the preparation and measurement of single-qubit states for which the best available attacks have a complexity exponential in the number of classical bits transmitted.
△ Less
Submitted 6 October, 2015; v1 submitted 2 July, 2015;
originally announced July 2015.
-
Arbitrarily long relativistic bit commitment
Authors:
Kaushik Chakraborty,
André Chailloux,
Anthony Leverrier
Abstract:
We consider the recent relativistic bit commitment protocol introduced by Lunghi et al. [Phys. Rev. Lett. 2015] and present a new security analysis against classical attacks. In particular, while the initial complexity of the protocol scaled double-exponentially with the commitment time, our analysis shows that the correct dependence is only linear. This has dramatic implications in terms of imple…
▽ More
We consider the recent relativistic bit commitment protocol introduced by Lunghi et al. [Phys. Rev. Lett. 2015] and present a new security analysis against classical attacks. In particular, while the initial complexity of the protocol scaled double-exponentially with the commitment time, our analysis shows that the correct dependence is only linear. This has dramatic implications in terms of implementation: in particular, the commitment time can easily be made arbitrarily long, by only requiring both parties to communicate classically and perform efficient classical computation.
△ Less
Submitted 1 July, 2015;
originally announced July 2015.
-
A largely self-contained and complete security proof for quantum key distribution
Authors:
Marco Tomamichel,
Anthony Leverrier
Abstract:
In this work we present a security analysis for quantum key distribution, establishing a rigorous tradeoff between various protocol and security parameters for a class of entanglement-based and prepare-and-measure protocols. The goal of this paper is twofold: 1) to review and clarify the state-of-the-art security analysis based on entropic uncertainty relations, and 2) to provide an accessible res…
▽ More
In this work we present a security analysis for quantum key distribution, establishing a rigorous tradeoff between various protocol and security parameters for a class of entanglement-based and prepare-and-measure protocols. The goal of this paper is twofold: 1) to review and clarify the state-of-the-art security analysis based on entropic uncertainty relations, and 2) to provide an accessible resource for researchers interested in a security analysis of quantum cryptographic protocols that takes into account finite resource effects. For this purpose we collect and clarify several arguments spread in the literature on the subject with the goal of making this treatment largely self-contained.
More precisely, we focus on a class of prepare-and-measure protocols based on the Bennett-Brassard (BB84) protocol as well as a class of entanglement-based protocols similar to the Bennett-Brassard-Mermin (BBM92) protocol. We carefully formalize the different steps in these protocols, including randomization, measurement, parameter estimation, error correction and privacy amplification, allowing us to be mathematically precise throughout the security analysis. We start from an operational definition of what it means for a quantum key distribution protocol to be secure and derive simple conditions that serve as sufficient condition for secrecy and correctness. We then derive and eventually discuss tradeoff relations between the block length of the classical computation, the noise tolerance, the secret key length and the security parameters for our protocols. Our results significantly improve upon previously reported tradeoffs.
△ Less
Submitted 10 July, 2017; v1 submitted 28 June, 2015;
originally announced June 2015.
-
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
Authors:
Eleni Diamanti,
Anthony Leverrier
Abstract:
The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reachin…
▽ More
The ability to distribute secret keys between two parties with information-theoretic security, that is, regardless of the capacities of a malevolent eavesdropper, is one of the most celebrated results in the field of quantum information processing and communication. Indeed, quantum key distribution illustrates the power of encoding information on the quantum properties of light and has far reaching implications in high-security applications. Today, quantum key distribution systems operate in real-world conditions and are commercially available. As with most quantum information protocols, quantum key distribution was first designed for qubits, the individual quanta of information. However, the use of quantum continuous variables for this task presents important advantages with respect to qubit based protocols, in particular from a practical point of view, since it allows for simple implementations that require only standard telecommunication technology. In this review article, we describe the principle of continuous-variable quantum key distribution, focusing in particular on protocols based on coherent states. We discuss the security of these protocols and report on the state-of-the-art in experimental implementations, including the issue of side-channel attacks. We conclude with promising perspectives in this research field.
△ Less
Submitted 31 August, 2015; v1 submitted 9 June, 2015;
originally announced June 2015.
-
Quantum Expander Codes
Authors:
Anthony Leverrier,
Jean-Pierre Tillich,
Gilles Zémor
Abstract:
We present an efficient decoding algorithm for constant rate quantum hypergraph-product LDPC codes which provably corrects adversarial errors of weight $Ω(\sqrt{n})$ for codes of length $n$. The algorithm runs in time linear in the number of qubits, which makes its performance the strongest to date for linear-time decoding of quantum codes. The algorithm relies on expanding properties, not of the…
▽ More
We present an efficient decoding algorithm for constant rate quantum hypergraph-product LDPC codes which provably corrects adversarial errors of weight $Ω(\sqrt{n})$ for codes of length $n$. The algorithm runs in time linear in the number of qubits, which makes its performance the strongest to date for linear-time decoding of quantum codes. The algorithm relies on expanding properties, not of the quantum code's factor graph directly, but of the factor graph of the original classical code it is constructed from.
△ Less
Submitted 3 April, 2015;
originally announced April 2015.
-
Composable security proof for continuous-variable quantum key distribution with coherent states
Authors:
Anthony Leverrier
Abstract:
We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the Postselection technique then shows the security of the protocol against gen…
▽ More
We give the first composable security proof for continuous-variable quantum key distribution with coherent states against collective attacks. Crucially, in the limit of large blocks the secret key rate converges to the usual value computed from the Holevo bound. Combining our proof with either the de Finetti theorem or the Postselection technique then shows the security of the protocol against general attacks, thereby confirming the long-standing conjecture that Gaussian attacks are optimal asymptotically in the composable security framework.
We expect that our parameter estimation procedure, which does not rely on any assumption, will find applications elsewhere, for instance for the reliable quantification of continuous-variable entanglement in finite-size settings.
△ Less
Submitted 3 February, 2015; v1 submitted 25 August, 2014;
originally announced August 2014.
-
Dimension of physical systems, information processing, and thermodynamics
Authors:
Nicolas Brunner,
Marc Kaplan,
Anthony Leverrier,
Paul Skrzypczyk
Abstract:
We ask how quantum theory compares to more general physical theories from the point of view of dimension. To do so, we first give two model independent definition of the dimension of physical systems, based on measurements and on the capacity of storing information. While both definitions are equivalent in classical and quantum mechanics, they are in general different in generalized probabilistic…
▽ More
We ask how quantum theory compares to more general physical theories from the point of view of dimension. To do so, we first give two model independent definition of the dimension of physical systems, based on measurements and on the capacity of storing information. While both definitions are equivalent in classical and quantum mechanics, they are in general different in generalized probabilistic theories. We discuss in detail the case of a theory known as 'boxworld', and show that such a theory features systems with a dimension mismatch. This dimension mismatch can be made arbitrarily large by using an amplification procedure. Furthermore, we show that the dimension mismatch of boxworld has strong consequences on its power for performing information-theoretic tasks, leading to the collapse of communication complexity and to the violation of information causality. Finally, we discuss the consequences of a dimension mismatch from the perspective of thermodynamics, and ask whether this effect could break Landauer's erasure principle and thus the second law.
△ Less
Submitted 18 December, 2014; v1 submitted 17 January, 2014;
originally announced January 2014.
-
Exploring the Local Orthogonality Principle
Authors:
A. B. Sainz,
T. Fritz,
R. Augusiak,
J. Bohr Brask,
R. Chaves,
A. Leverrier,
A. Acín
Abstract:
Nonlocality is arguably one of the most fundamental and counterintuitive aspects of quantum theory. Nonlocal correlations could, however, be even more nonlocal than quantum theory allows, while still complying with basic physical principles such as no-signaling. So why is quantum mechanics not as nonlocal as it could be? Are there other physical or information-theoretic principles which prohibit t…
▽ More
Nonlocality is arguably one of the most fundamental and counterintuitive aspects of quantum theory. Nonlocal correlations could, however, be even more nonlocal than quantum theory allows, while still complying with basic physical principles such as no-signaling. So why is quantum mechanics not as nonlocal as it could be? Are there other physical or information-theoretic principles which prohibit this? So far, the proposed answers to this question have been only partially successful, partly because they are lacking genuinely multipartite formulations. In Nat. Comm. 4, 2263 (2013) we introduced the principle of Local Orthogonality (LO), an intrinsically multipartite principle which is satisfied by quantum mechanics but is violated by non-physical correlations.
Here we further explore the LO principle, presenting new results and explaining some of its subtleties. In particular, we show that the set of no-signaling boxes satisfying LO is closed under wirings, present a classification of all LO inequalities in certain scenarios, show that all extremal tripartite boxes with two binary measurements per party violate LO, and explain the connection between LO inequalities and unextendible product bases.
△ Less
Submitted 2 March, 2014; v1 submitted 26 November, 2013;
originally announced November 2013.
-
Analysis of circuit imperfections in BosonSampling
Authors:
Anthony Leverrier,
Raúl García-Patrón
Abstract:
BosonSampling is a problem where a quantum computer offers a provable speedup over classical computers. Its main feature is that it can be solved with current linear optics technology, without the need for a full quantum computer. In this work, we investigate whether an experimentally realistic BosonSampler can really solve BosonSampling without any fault-tolerance mechanism. More precisely, we st…
▽ More
BosonSampling is a problem where a quantum computer offers a provable speedup over classical computers. Its main feature is that it can be solved with current linear optics technology, without the need for a full quantum computer. In this work, we investigate whether an experimentally realistic BosonSampler can really solve BosonSampling without any fault-tolerance mechanism. More precisely, we study how the unavoidable errors linked to an imperfect calibration of the optical elements affect the final result of the computation. We show that the fidelity of each optical element must be at least $1 - O(1/n^2)$, where $n$ refers to the number of single photons in the scheme. Such a requirement seems to be achievable with state-of-the-art equipment.
△ Less
Submitted 5 November, 2014; v1 submitted 18 September, 2013;
originally announced September 2013.
-
Probabilistic models on contextuality scenarios
Authors:
Tobias Fritz,
Anthony Leverrier,
Ana Belén Sainz
Abstract:
We introduce a framework to describe probabilistic models in Bell experiments, and more generally in contextuality scenarios. Such a scenario is a hypergraph whose vertices represent elementary events and hyperedges correspond to measurements. A probabilistic model on such a scenario associates to each event a probability, in such a way that events in a given measurement have a total probability e…
▽ More
We introduce a framework to describe probabilistic models in Bell experiments, and more generally in contextuality scenarios. Such a scenario is a hypergraph whose vertices represent elementary events and hyperedges correspond to measurements. A probabilistic model on such a scenario associates to each event a probability, in such a way that events in a given measurement have a total probability equal to one. We discuss the advantages of this framework, like the unification of the notions of contexuality and nonlocality, and give a short overview of results obtained elsewhere.
△ Less
Submitted 29 December, 2014; v1 submitted 29 June, 2013;
originally announced July 2013.
-
A Combinatorial Approach to Nonlocality and Contextuality
Authors:
Antonio Acín,
Tobias Fritz,
Anthony Leverrier,
Ana Belén Sainz
Abstract:
So far, most of the literature on (quantum) contextuality and the Kochen-Specker theorem seems either to concern particular examples of contextuality, or be considered as quantum logic. Here, we develop a general formalism for contextuality scenarios based on the combinatorics of hypergraphs which significantly refines a similar recent approach by Cabello, Severini and Winter (CSW). In contrast to…
▽ More
So far, most of the literature on (quantum) contextuality and the Kochen-Specker theorem seems either to concern particular examples of contextuality, or be considered as quantum logic. Here, we develop a general formalism for contextuality scenarios based on the combinatorics of hypergraphs which significantly refines a similar recent approach by Cabello, Severini and Winter (CSW). In contrast to CSW, we explicitly include the normalization of probabilities, which gives us a much finer control over the various sets of probabilistic models like classical, quantum and generalized probabilistic. In particular, our framework specializes to (quantum) nonlocality in the case of Bell scenarios, which arise very naturally from a certain product of contextuality scenarios due to Foulis and Randall. In the spirit of CSW, we find close relationships to several graph invariants. The recently proposed Local Orthogonality principle turns out to be a special case of a general principle for contextuality scenarios related to the Shannon capacity of graphs. Our results imply that it is strictly dominated by a low level of the Navascués-Pironio-Acín hierarchy of semidefinite programs, which we also apply to contextuality scenarios.
We derive a wealth of results in our framework, many of these relating to quantum and supraquantum contextuality and nonlocality, and state numerous open problems. For example, we show that the set of quantum models on a contextuality scenario can in general not be characterized in terms of a graph invariant.
In terms of graph theory, our main result is this: there exist two graphs $G_1$ and $G_2$ with the properties \begin{align*} α(G_1) &= Θ(G_1), & α(G_2) &= \vartheta(G_2), \\[6pt] Θ(G_1\boxtimes G_2) & > Θ(G_1)\cdot Θ(G_2),& Θ(G_1 + G_2) & > Θ(G_1) + Θ(G_2). \end{align*}
△ Less
Submitted 12 January, 2015; v1 submitted 17 December, 2012;
originally announced December 2012.
-
Device-independent quantum key distribution secure against adversaries with no long-term quantum memory
Authors:
Stefano Pironio,
Lluis Masanes,
Anthony Leverrier,
Antonio Acin
Abstract:
Device-Independent Quantum Key Distribution (DIQKD) is a formalism that supersedes traditional quantum key distribution, as its security does not rely on any detailed modelling of the internal working of the devices. This strong form of security is possible only using devices producing correlations that violate a Bell inequality. Full security proofs of DIQKD have been recently reported, but they…
▽ More
Device-Independent Quantum Key Distribution (DIQKD) is a formalism that supersedes traditional quantum key distribution, as its security does not rely on any detailed modelling of the internal working of the devices. This strong form of security is possible only using devices producing correlations that violate a Bell inequality. Full security proofs of DIQKD have been recently reported, but they tolerate zero or small amounts of noise and are restricted to protocols based on specific Bell inequalities. Here, we provide a security proof of DIQKD that is both more efficient and noise resistant, and also more general as it applies to protocols based on arbitrary Bell inequalities and can be adapted to cover supra-quantum eavesdroppers limited by the no-signalling principle only. It requires, however, the extra assumption that the adversary does not have a long-term quantum memory, a condition that is not a limitation at present since the best existing quantum memories have very short coherence times.
△ Less
Submitted 30 November, 2012; v1 submitted 6 November, 2012;
originally announced November 2012.
-
Experimental demonstration of long-distance continuous-variable quantum key distribution
Authors:
Paul Jouguet,
Sébastien Kunz-Jacques,
Anthony Leverrier,
Philippe Grangier,
Eleni Diamanti
Abstract:
Distributing secret keys with information-theoretic security is arguably one of the most important achievements of the field of quantum information processing and communications. The rapid progress in this field has enabled quantum key distribution (QKD) in real-world conditions and commercial devices are now readily available. QKD systems based on continuous variables present the major advantage…
▽ More
Distributing secret keys with information-theoretic security is arguably one of the most important achievements of the field of quantum information processing and communications. The rapid progress in this field has enabled quantum key distribution (QKD) in real-world conditions and commercial devices are now readily available. QKD systems based on continuous variables present the major advantage that they only require standard telecommunication technology, and in particular, that they do not use photon counters. However, these systems were considered up till now unsuitable for long-distance communication. Here, we overcome all previous limitations and demonstrate for the first time continuous-variable quantum key distribution over 80 km of optical fibre. The demonstration includes all aspects of a practical scenario, with real-time generation of secret keys, stable operation in a regular environment, and use of finite-size data blocks for secret information computation and key distillation. Our results correspond to an implementation guaranteeing the strongest level of security for QKD reported to date for such long distances and pave the way to practical applications of secure quantum communications.
△ Less
Submitted 23 October, 2012;
originally announced October 2012.
-
Local orthogonality as a multipartite principle for quantum correlations
Authors:
T. Fritz,
A. B. Sainz,
R. Augusiak,
J. B. Brask,
R. Chaves,
A. Leverrier,
A. Acín
Abstract:
In recent years, the use of information principles to understand quantum correlations has been very successful. Unfortunately, all principles considered so far have a bipartite formulation, but intrinsically multipartite principles, yet to be discovered, are necessary for reproducing quantum correlations. Here, we introduce local orthogonality, an intrinsically multipartite principle stating that…
▽ More
In recent years, the use of information principles to understand quantum correlations has been very successful. Unfortunately, all principles considered so far have a bipartite formulation, but intrinsically multipartite principles, yet to be discovered, are necessary for reproducing quantum correlations. Here, we introduce local orthogonality, an intrinsically multipartite principle stating that events involving different outcomes of the same local measurement must be exclusive, or orthogonal. We prove that it is equivalent to no-signaling in the bipartite scenario but more restrictive for more than two parties. By exploiting this non-equivalence, it is then demonstrated that some bipartite supra-quantum correlations do violate local orthogonality when distributed among several parties. Finally, we show how its multipartite character allows revealing the non-quantumness of correlations for which any bipartite principle fails. We believe that local orthogonality is a crucial ingredient for understanding no-signaling and quantum correlations.
△ Less
Submitted 28 February, 2014; v1 submitted 10 October, 2012;
originally announced October 2012.
-
Security of continuous-variable quantum key distribution against general attacks
Authors:
Anthony Leverrier,
Raúl García-Patrón,
Renato Renner,
Nicolas J. Cerf
Abstract:
We prove the security of Gaussian continuous-variable quantum key distribution against arbitrary attacks in the finite-size regime. The novelty of our proof is to consider symmetries of quantum key distribution in phase space in order to show that, to good approximation, the Hilbert space of interest can be considered to be finite-dimensional, thereby allowing for the use of the postselection tech…
▽ More
We prove the security of Gaussian continuous-variable quantum key distribution against arbitrary attacks in the finite-size regime. The novelty of our proof is to consider symmetries of quantum key distribution in phase space in order to show that, to good approximation, the Hilbert space of interest can be considered to be finite-dimensional, thereby allowing for the use of the postselection technique introduced by Christandl, Koenig and Renner (Phys. Rev. Lett. 102, 020504 (2009)). Our result greatly improves on previous work based on the de Finetti theorem which could not provide security for realistic, finite-size, implementations.
△ Less
Submitted 24 August, 2012;
originally announced August 2012.
-
Analysis of Imperfections in Practical Continuous-Variable Quantum Key Distribution
Authors:
Paul Jouguet,
Sébastien Kunz-Jacques,
Eleni Diamanti,
Anthony Leverrier
Abstract:
As quantum key distribution becomes a mature technology, it appears clearly that some assumptions made in the security proofs cannot be justified in practical implementations. This might open the door to possible side-channel attacks. We examine several discrepancies between theoretical models and experimental setups in the case of continuous-variable quantum key distribution. We study in particul…
▽ More
As quantum key distribution becomes a mature technology, it appears clearly that some assumptions made in the security proofs cannot be justified in practical implementations. This might open the door to possible side-channel attacks. We examine several discrepancies between theoretical models and experimental setups in the case of continuous-variable quantum key distribution. We study in particular the impact of an imperfect modulation on the security of Gaussian protocols and show that approximating the theoretical Gaussian modulation with a discrete one is sufficient in practice. We also address the issue of properly calibrating the detection setup, and in particular the value of the shot noise. Finally, we consider the influence of phase noise in the preparation stage of the protocol and argue that taking this noise into account can improve the secret key rate because this source of noise is not controlled by the eavesdropper.
△ Less
Submitted 27 June, 2012;
originally announced June 2012.
-
Improving the maximum transmission distance of continuous-variable quantum key distribution using a noiseless amplifier
Authors:
Rémi Blandino,
Anthony Leverrier,
Marco Barbieri,
Jean Etesse,
Philippe Grangier,
Rosa Tualle-Brouri
Abstract:
We show that the maximum transmission distance of continuous-variable quantum key distribution in presence of a Gaussian noisy lossy channel can be arbitrarily increased using a linear noiseless amplifier. We explicitly consider a protocol using amplitude and phase modulated coherent states with reverse reconciliation. We find that a noiseless amplifier with amplitude gain g can increase the maxim…
▽ More
We show that the maximum transmission distance of continuous-variable quantum key distribution in presence of a Gaussian noisy lossy channel can be arbitrarily increased using a linear noiseless amplifier. We explicitly consider a protocol using amplitude and phase modulated coherent states with reverse reconciliation. We find that a noiseless amplifier with amplitude gain g can increase the maximum admissible losses by a factor 1/g^2.
△ Less
Submitted 4 May, 2012;
originally announced May 2012.
-
Bell tests for continuous variable systems using hybrid measurements and heralded amplifiers
Authors:
Jonatan Bohr Brask,
Nicolas Brunner,
Daniel Cavalcanti,
Anthony Leverrier
Abstract:
We present Bell tests for optical continuous variable systems, combining both hybrid measurements (i.e. measuring both particle and wave aspects of light) and heralded amplifiers. We discuss two types of schemes, in which the amplifier is located either at the source, or at the parties' laboratories. The inclusion of amplifiers helps to reduce the detrimental effect of losses in the setup. In part…
▽ More
We present Bell tests for optical continuous variable systems, combining both hybrid measurements (i.e. measuring both particle and wave aspects of light) and heralded amplifiers. We discuss two types of schemes, in which the amplifier is located either at the source, or at the parties' laboratories. The inclusion of amplifiers helps to reduce the detrimental effect of losses in the setup. In particular, we show that the requirements in terms of detection efficiency and transmission losses are significantly reduced, approaching the experimentally accessible regime.
△ Less
Submitted 1 March, 2012;
originally announced March 2012.
-
Field Test of Classical Symmetric Encryption with Continuous Variable Quantum Key Distribution
Authors:
Paul Jouguet,
Sébastien Kunz-Jacques,
Thierry Debuisschert,
Simon Fossier,
Eleni Diamanti,
Romain Alléaume,
Rosa Tualle-Brouri,
Philippe Grangier,
Anthony Leverrier,
Philippe Pache,
Philippe Painchault
Abstract:
We report on the design and performance of a point-to-point classical symmetric encryption link with fast key renewal provided by a Continuous Variable Quantum Key Distribution (CVQKD) system. Our system was operational and able to encrypt point-to-point communications during more than six months, from the end of July 2010 until the beginning of February 2011. This field test was the first demonst…
▽ More
We report on the design and performance of a point-to-point classical symmetric encryption link with fast key renewal provided by a Continuous Variable Quantum Key Distribution (CVQKD) system. Our system was operational and able to encrypt point-to-point communications during more than six months, from the end of July 2010 until the beginning of February 2011. This field test was the first demonstration of the reliability of a CVQKD system over a long period of time in a server room environment. This strengthens the potential of CVQKD for information technology security infrastructure deployments.
△ Less
Submitted 13 March, 2012; v1 submitted 18 January, 2012;
originally announced January 2012.
-
Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks
Authors:
Fabian Furrer,
Torsten Franz,
Mario Berta,
Anthony Leverrier,
Volkher B. Scholz,
Marco Tomamichel,
Reinhard F. Werner
Abstract:
We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under g…
▽ More
We provide a security analysis for continuous variable quantum key distribution protocols based on the transmission of squeezed vacuum states measured via homodyne detection. We employ a version of the entropic uncertainty relation for smooth entropies to give a lower bound on the number of secret bits which can be extracted from a finite number of runs of the protocol. This bound is valid under general coherent attacks, and gives rise to keys which are composably secure. For comparison, we also give a lower bound valid under the assumption of collective attacks. For both scenarios, we find positive key rates using experimental parameters reachable today.
△ Less
Submitted 20 January, 2014; v1 submitted 9 December, 2011;
originally announced December 2011.
-
A symmetrization technique for continuous-variable quantum key distribution
Authors:
Anthony Leverrier
Abstract:
We introduce a symmetrization technique which can be used as an extra step in some continuous-variable quantum key distribution protocols. By randomizing the data in phase space, one can dramatically simplify the security analysis of the protocols, in particular in the case of collective attacks. The main application of this procedure concerns protocols with postselection, for which security was e…
▽ More
We introduce a symmetrization technique which can be used as an extra step in some continuous-variable quantum key distribution protocols. By randomizing the data in phase space, one can dramatically simplify the security analysis of the protocols, in particular in the case of collective attacks. The main application of this procedure concerns protocols with postselection, for which security was established only against Gaussian attacks until now. Here, we prove that under some experimentally verifiable conditions, Gaussian attacks are optimal among all collective attacks.
△ Less
Submitted 20 February, 2012; v1 submitted 22 October, 2011;
originally announced October 2011.
-
Long Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation
Authors:
Paul Jouguet,
Sébastien Kunz-Jacques,
Anthony Leverrier
Abstract:
We designed high-efficiency error correcting codes allowing to extract an errorless secret key in a continuous-variable quantum key distribution protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signal-to-noise ratios on an AWGN channel with a binary modulation and can be combined with a multidimensional reconciliation m…
▽ More
We designed high-efficiency error correcting codes allowing to extract an errorless secret key in a continuous-variable quantum key distribution protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signal-to-noise ratios on an AWGN channel with a binary modulation and can be combined with a multidimensional reconciliation method proven secure against arbitrary collective attacks. This improved reconciliation procedure considerably extends the secure range of a continuous-variable quantum key distribution with a Gaussian modulation, giving a secret key rate of about 10^{-3} bit per pulse at a distance of 120 km for reasonable physical parameters.
△ Less
Submitted 7 December, 2011; v1 submitted 1 October, 2011;
originally announced October 2011.
-
Universal Blind Quantum Computing with Weak Coherent Pulses
Authors:
Vedran Dunjko,
Elham Kashefi,
Anthony Leverrier
Abstract:
The recently proposed Universal Blind Quantum Computation (UBQC) protocol allows a client to perform an arbitrary quantum computation on a remote server such that perfect privacy is guaranteed if the client is capable of producing random separable single qubit states. While from a theoretical point of view, this arguably constitutes the lowest possible quantum requirement, from a pragmatic point o…
▽ More
The recently proposed Universal Blind Quantum Computation (UBQC) protocol allows a client to perform an arbitrary quantum computation on a remote server such that perfect privacy is guaranteed if the client is capable of producing random separable single qubit states. While from a theoretical point of view, this arguably constitutes the lowest possible quantum requirement, from a pragmatic point of view, generation of random single qubits which can be sent along long distances without loss is quite challenging and can never be achieved perfectly.
In analogy to the concept of approximate security developed for other cryptographic protocols, we introduce here the concept of approximate blindness for UBQC, allowing us to characterize the robustness of the protocol to possible imperfections.
Following this, we present a remote blind single qubit preparation protocol, by which a client with access to realistic quantum devices (such as coherent laser light) can in a delegated fashion prepare quantum states arbitrarily close to perfect random single qubit states. We finally prove that access to coherent states is sufficient to efficiently achieve approximate blindness with arbitrary small security parameter.
△ Less
Submitted 16 May, 2012; v1 submitted 29 August, 2011;
originally announced August 2011.
-
Percolation of secret correlations in a network
Authors:
Anthony Leverrier,
Raul Garcia-Patron
Abstract:
In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks, more precisely the question of percolation of secret correlations in a network. It is known that entanglement percolation in quantum networks can display a highly nontrivial behavior depending on the topology of the network and on the presence of entanglement between the no…
▽ More
In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks, more precisely the question of percolation of secret correlations in a network. It is known that entanglement percolation in quantum networks can display a highly nontrivial behavior depending on the topology of the network and on the presence of entanglement between the nodes. Here we show that this behavior, thought to be of a genuine quantum nature, also occurs in a classical context.
△ Less
Submitted 27 September, 2011; v1 submitted 8 July, 2011;
originally announced July 2011.