Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024;405(11):261.
doi: 10.1007/s00220-024-05121-4. Epub 2024 Oct 12.

Generalised Entropy Accumulation

Affiliations

Generalised Entropy Accumulation

Tony Metger et al. Commun Math Phys. 2024.

Abstract

Consider a sequential process in which each step outputs a system A i and updates a side information register E. We prove that if this process satisfies a natural "non-signalling" condition between past outputs and future side information, the min-entropy of the outputs A 1 , , A n conditioned on the side information E at the end of the process can be bounded from below by a sum of von Neumann entropies associated with the individual steps. This is a generalisation of the entropy accumulation theorem (EAT) (Dupuis et al. in Commun Math Phys 379: 867-913, 2020), which deals with a more restrictive model of side information: there, past side information cannot be updated in subsequent rounds, and newly generated side information has to satisfy a Markov condition. Due to its more general model of side-information, our generalised EAT can be applied more easily and to a broader range of cryptographic protocols. As examples, we give the first multi-round security proof for blind randomness expansion and a simplified analysis of the E91 QKD protocol. The proof of our generalised EAT relies on a new variant of Uhlmann's theorem and new chain rules for the Rényi divergence and entropy, which might be of independent interest.

PubMed Disclaimer

Conflict of interest statement

Conflict of interestThe authors have no Conflict of interest to declare.

Figures

Fig. 1
Fig. 1
Circuit diagram of N:Ri-1Ei-1AiRiTiXiYiBiEi. For every round of the protocol, a circuit of this form is applied, where A and B are the (arbitrary) channels applied by Alice’s device and Eve, respectively. As in the protocol, Ti is a bit equal to 1 with probability γ, and Xi and Yi are generated according to q whenever Ti=1, and are fixed to x,y otherwise. We did not include the register Ci in the figure as it is a deterministic function of TiXiYiAiBi
Fig. 2
Fig. 2
Lower bound on the conditional entropy H(Ai|BiXiYiTiEi)ρ|Ti=0 for any state generated as in Fig. 1 and such that on test rounds the obtained winning probability for the CHSH game is ω. This lower bound was obtained by using the method from [22]. For each input yY, the channel By is modelled as By(ω)=bΠy(b)ωΠy(b), where {Πy(b)}bB are orthogonal projectors summing to the identity, and similarly for the map A. It is simple to see that this is without loss of generality

References

    1. Dupuis, F., Fawzi, O., Renner, R.: Entropy accumulation. Commun. Math. Phys. 379(3), 867–913 (2020) - PMC - PubMed
    1. Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 6(01), 1–127 (2008)
    1. Tomamichel, M., Colbeck, R., Renner, R.: A fully quantum asymptotic equipartition property. IEEE Trans. Inf. Theory 55(12), 5840–5847 (2009)
    1. Arnon-Friedman, R., Dupuis, F., Fawzi, O., Renner, R., Vidick, T.: Practical device-independent quantum cryptography via entropy accumulation. Nat. Commun. 9(1), 459 (2018) - PMC - PubMed
    1. Bamps, C., Massar, S., Pironio, S.: Device-independent randomness generation with sublinear shared quantum resources. Quantum 2, 86 (2018)

LinkOut - more resources